Risk Analysis of a GDPR-Compliant Deletion Technique for Consortium Blockchains Based on Pseudonymization
Blockchains provide a valid and profitable support for the implementation of trustable and secure distributed ledgers, in support to groups of subjects that are potentially competitors in conflict of interest but need to share progressive information recording processes. Blockchains prevent data sto...
Saved in:
Published in | Computational Science and Its Applications - ICCSA 2021 Vol. 12956; pp. 3 - 14 |
---|---|
Main Authors | , , , , |
Format | Book Chapter |
Language | English |
Published |
Switzerland
Springer International Publishing AG
2021
Springer International Publishing |
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
ISBN | 9783030870096 303087009X |
ISSN | 0302-9743 1611-3349 |
DOI | 10.1007/978-3-030-87010-2_1 |
Cover
Abstract | Blockchains provide a valid and profitable support for the implementation of trustable and secure distributed ledgers, in support to groups of subjects that are potentially competitors in conflict of interest but need to share progressive information recording processes. Blockchains prevent data stored in blocks from being altered or deleted, but there are situations in which stored information must be deleted or made inaccessible on request or periodically, such as the ones in which GDPR is applicable. In this paper we present literature solutions and design an implementation in the context of a traffic management system for the Internet of Vehicles based on the Pseudonymization/Cryptography solution, evaluating its viability, its GDPR compliance and its level of risk. |
---|---|
AbstractList | Blockchains provide a valid and profitable support for the implementation of trustable and secure distributed ledgers, in support to groups of subjects that are potentially competitors in conflict of interest but need to share progressive information recording processes. Blockchains prevent data stored in blocks from being altered or deleted, but there are situations in which stored information must be deleted or made inaccessible on request or periodically, such as the ones in which GDPR is applicable. In this paper we present literature solutions and design an implementation in the context of a traffic management system for the Internet of Vehicles based on the Pseudonymization/Cryptography solution, evaluating its viability, its GDPR compliance and its level of risk. |
Author | Iacono, Mauro Campanile, Lelio Cantiello, Pasquale Marulli, Fiammetta Mastroianni, Michele |
Author_xml | – sequence: 1 givenname: Lelio orcidid: 0000-0003-4021-4137 surname: Campanile fullname: Campanile, Lelio – sequence: 2 givenname: Pasquale orcidid: 0000-0002-3664-3759 surname: Cantiello fullname: Cantiello, Pasquale – sequence: 3 givenname: Mauro orcidid: 0000-0002-2089-975X surname: Iacono fullname: Iacono, Mauro – sequence: 4 givenname: Fiammetta orcidid: 0000-0001-5226-2326 surname: Marulli fullname: Marulli, Fiammetta – sequence: 5 givenname: Michele orcidid: 0000-0001-6415-1180 surname: Mastroianni fullname: Mastroianni, Michele email: michele.mastroianni@unicampania.it |
BookMark | eNpNkEFPAyEQhVGrsdX-Ai_8ARQYCstRW60mTWyMngndZRW7hXXZHuqvl6qJnmby3rxJ3jdCgxCDQ-iC0UtGqbrSqiBAKFBSKMoo4YYdoHFWIWvfEj9EQyYZIwBCH_33qJYDNMw7J1oJOEEjxmXBpQahTtE4pXdKKVecStBD5J98WuPrYJtd8gnHGls8ny2fyDRu2sbb0OOZa1zvY8DPrnwL_mPrcB07PI0hxa732w2-aWK5Lt-sDwnf2OQqnK-XyW2rGHYb_2n38XN0XNsmufHvPEMvd7fP03uyeJw_TK8XpOWge6I5KCgrayu9ohNe21JURWmpg5UEa4tyIoTT1spKFKqqa-CqlrnKxK204g7gDLGfv6ntfHh1nVnFuE6GUbNnazIpAybzMd8gTWb7l2m7mPul3rh9qHSh72yTm7W965KRigsplFFGMPgC2WB54w |
ContentType | Book Chapter |
Copyright | Springer Nature Switzerland AG 2021 |
Copyright_xml | – notice: Springer Nature Switzerland AG 2021 |
DBID | FFUUA |
DEWEY | 004 |
DOI | 10.1007/978-3-030-87010-2_1 |
DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISBN | 9783030870102 3030870103 |
EISSN | 1611-3349 |
Editor | Misra, Sanjay Apduhan, Bernady O Murgante, Beniamino Torre, Carmelo Maria Gervasi, Osvaldo Taniar, David Tarantino, Eufemia Blečić, Ivan Rocha, Ana Maria A. C Garau, Chiara |
Editor_xml | – sequence: 1 fullname: Misra, Sanjay – sequence: 2 fullname: Murgante, Beniamino – sequence: 3 fullname: Apduhan, Bernady O – sequence: 4 fullname: Torre, Carmelo Maria – sequence: 5 fullname: Gervasi, Osvaldo – sequence: 6 fullname: Taniar, David – sequence: 7 fullname: Tarantino, Eufemia – sequence: 8 fullname: Garau, Chiara – sequence: 9 fullname: Blečić, Ivan – sequence: 10 fullname: Rocha, Ana Maria A. C |
EndPage | 14 |
ExternalDocumentID | EBC6724647_7_41 |
GroupedDBID | 38. AABBV AABLV ABNDO ACWLQ AEDXK AEJLV AEKFX AELOD AIYYB ALMA_UNASSIGNED_HOLDINGS BAHJK BBABE DBWEY FFUUA I4C IEZ OCUHQ ORHYB SBO TPJZQ TSXQS Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z87 Z88 -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE EJD F5P FEDTE HVGLF LAS LDH P2P RIG RNI RSU SVGTG VI1 ~02 |
ID | FETCH-LOGICAL-p239t-92373cdaad9b052fac4d8ca0e3b63aa8c544e9aa6d487dff327f66395eb972e33 |
ISBN | 9783030870096 303087009X |
ISSN | 0302-9743 |
IngestDate | Tue Jul 29 20:40:16 EDT 2025 Fri Jun 06 21:47:41 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
LCCallNum | TK5105.5-5105.9 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p239t-92373cdaad9b052fac4d8ca0e3b63aa8c544e9aa6d487dff327f66395eb972e33 |
OCLC | 1268269347 |
ORCID | 0000-0002-2089-975X 0000-0001-6415-1180 0000-0002-3664-3759 0000-0003-4021-4137 0000-0001-5226-2326 |
PQID | EBC6724647_7_41 |
PageCount | 12 |
ParticipantIDs | springer_books_10_1007_978_3_030_87010_2_1 proquest_ebookcentralchapters_6724647_7_41 |
PublicationCentury | 2000 |
PublicationDate | 2021 |
PublicationDateYYYYMMDD | 2021-01-01 |
PublicationDate_xml | – year: 2021 text: 2021 |
PublicationDecade | 2020 |
PublicationPlace | Switzerland |
PublicationPlace_xml | – name: Switzerland – name: Cham |
PublicationSeriesSubtitle | Theoretical Computer Science and General Issues |
PublicationSeriesTitle | Lecture Notes in Computer Science |
PublicationSeriesTitleAlternate | Lect.Notes Computer |
PublicationSubtitle | 21st International Conference, Cagliari, Italy, September 13-16, 2021, Proceedings, Part VIII |
PublicationTitle | Computational Science and Its Applications - ICCSA 2021 |
PublicationYear | 2021 |
Publisher | Springer International Publishing AG Springer International Publishing |
Publisher_xml | – name: Springer International Publishing AG – name: Springer International Publishing |
RelatedPersons | Hartmanis, Juris Gao, Wen Bertino, Elisa Woeginger, Gerhard Goos, Gerhard Steffen, Bernhard Yung, Moti |
RelatedPersons_xml | – sequence: 1 givenname: Gerhard surname: Goos fullname: Goos, Gerhard – sequence: 2 givenname: Juris surname: Hartmanis fullname: Hartmanis, Juris – sequence: 3 givenname: Elisa surname: Bertino fullname: Bertino, Elisa – sequence: 4 givenname: Wen surname: Gao fullname: Gao, Wen – sequence: 5 givenname: Bernhard orcidid: 0000-0001-9619-1558 surname: Steffen fullname: Steffen, Bernhard – sequence: 6 givenname: Gerhard orcidid: 0000-0001-8816-2693 surname: Woeginger fullname: Woeginger, Gerhard – sequence: 7 givenname: Moti orcidid: 0000-0003-0848-0873 surname: Yung fullname: Yung, Moti |
SSID | ssj0002720639 ssj0002792 |
Score | 2.347914 |
Snippet | Blockchains provide a valid and profitable support for the implementation of trustable and secure distributed ledgers, in support to groups of subjects that... |
SourceID | springer proquest |
SourceType | Publisher |
StartPage | 3 |
SubjectTerms | Blockchain GDPR IoV Privacy Pseudonymization Risk analysis |
Title | Risk Analysis of a GDPR-Compliant Deletion Technique for Consortium Blockchains Based on Pseudonymization |
URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6724647&ppg=41 http://link.springer.com/10.1007/978-3-030-87010-2_1 |
Volume | 12956 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Nb9MwFLegXGAHYIAYY8gHTlRBie3YybHNysYEaBod2s1ybEdMiA7R9MJfv2cnzhdchlRFleVGln-v9vv8PYTeUriCqSA8yrkwESO2ipTOkqjkCQcrSAlmXIHz5y_89JKdXaVXfY9NX11Sl-_1n3_WlfwPqjAGuLoq2Tsg270UBuA74AtPQBieE-V37GZteAV8P4bgywv_UZ_eW28b7TJkikfzj0XxdTEnMUmGMnLh8sqHtCRqfnJ8fhEVPs8c9hyOI0fODRKy7rheXV6ia_MJevv17ud8CbfhD_1duVSbJVyJxoUfzrd2Z5xfoa3yHPoWSDLxLQTf4sQ7OXCQLU5G9ij1BIPOLBodsCRvyMP_Oq6HGRrwUziaXWyeyKS_nUJEnk3G_BW8WhZcEMaZkEI6-oL7ImMz9GCxOvv0rXO1uVAzKGKusiesr-Ve6tfbEVI1nMOT5YzMj0nE3Csi6ydozxWnYFc1Ait8iu7ZzT56HFpz4FYK9tGjAc_kM3TtgMYBaHxTYYXHQOMANO6AxgA07oHGA6CxBxrD7CnQz9Hlh9W6OI3aHhvRL0LzOgL9XlBtlDJ5GaekUpqZTKvY0pJTpTKdMmZzpbgBy9ZUFSWiAiU1T22ZC2IpfYFmm5uNfYmwqTSjWapNnFoGn1IneWUsJ8YSReP8AL0Lmyh9JkCbfqybLdvKIZQwOWyzdHO3MvBrAzySSoBHengkwPPqLm8-RA97UX-NZvXvnT0CxbIu37SCcwtykXfH |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Computational+Science+and+Its+Applications+-+ICCSA+2021&rft.atitle=Risk+Analysis+of+a+GDPR-Compliant+Deletion+Technique+for+Consortium+Blockchains+Based+on+Pseudonymization&rft.date=2021-01-01&rft.pub=Springer+International+Publishing+AG&rft.isbn=9783030870096&rft.volume=12956&rft_id=info:doi/10.1007%2F978-3-030-87010-2_1&rft.externalDBID=41&rft.externalDocID=EBC6724647_7_41 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6724647-l.jpg |