Risk Analysis of a GDPR-Compliant Deletion Technique for Consortium Blockchains Based on Pseudonymization

Blockchains provide a valid and profitable support for the implementation of trustable and secure distributed ledgers, in support to groups of subjects that are potentially competitors in conflict of interest but need to share progressive information recording processes. Blockchains prevent data sto...

Full description

Saved in:
Bibliographic Details
Published inComputational Science and Its Applications - ICCSA 2021 Vol. 12956; pp. 3 - 14
Main Authors Campanile, Lelio, Cantiello, Pasquale, Iacono, Mauro, Marulli, Fiammetta, Mastroianni, Michele
Format Book Chapter
LanguageEnglish
Published Switzerland Springer International Publishing AG 2021
Springer International Publishing
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783030870096
303087009X
ISSN0302-9743
1611-3349
DOI10.1007/978-3-030-87010-2_1

Cover

Abstract Blockchains provide a valid and profitable support for the implementation of trustable and secure distributed ledgers, in support to groups of subjects that are potentially competitors in conflict of interest but need to share progressive information recording processes. Blockchains prevent data stored in blocks from being altered or deleted, but there are situations in which stored information must be deleted or made inaccessible on request or periodically, such as the ones in which GDPR is applicable. In this paper we present literature solutions and design an implementation in the context of a traffic management system for the Internet of Vehicles based on the Pseudonymization/Cryptography solution, evaluating its viability, its GDPR compliance and its level of risk.
AbstractList Blockchains provide a valid and profitable support for the implementation of trustable and secure distributed ledgers, in support to groups of subjects that are potentially competitors in conflict of interest but need to share progressive information recording processes. Blockchains prevent data stored in blocks from being altered or deleted, but there are situations in which stored information must be deleted or made inaccessible on request or periodically, such as the ones in which GDPR is applicable. In this paper we present literature solutions and design an implementation in the context of a traffic management system for the Internet of Vehicles based on the Pseudonymization/Cryptography solution, evaluating its viability, its GDPR compliance and its level of risk.
Author Iacono, Mauro
Campanile, Lelio
Cantiello, Pasquale
Marulli, Fiammetta
Mastroianni, Michele
Author_xml – sequence: 1
  givenname: Lelio
  orcidid: 0000-0003-4021-4137
  surname: Campanile
  fullname: Campanile, Lelio
– sequence: 2
  givenname: Pasquale
  orcidid: 0000-0002-3664-3759
  surname: Cantiello
  fullname: Cantiello, Pasquale
– sequence: 3
  givenname: Mauro
  orcidid: 0000-0002-2089-975X
  surname: Iacono
  fullname: Iacono, Mauro
– sequence: 4
  givenname: Fiammetta
  orcidid: 0000-0001-5226-2326
  surname: Marulli
  fullname: Marulli, Fiammetta
– sequence: 5
  givenname: Michele
  orcidid: 0000-0001-6415-1180
  surname: Mastroianni
  fullname: Mastroianni, Michele
  email: michele.mastroianni@unicampania.it
BookMark eNpNkEFPAyEQhVGrsdX-Ai_8ARQYCstRW60mTWyMngndZRW7hXXZHuqvl6qJnmby3rxJ3jdCgxCDQ-iC0UtGqbrSqiBAKFBSKMoo4YYdoHFWIWvfEj9EQyYZIwBCH_33qJYDNMw7J1oJOEEjxmXBpQahTtE4pXdKKVecStBD5J98WuPrYJtd8gnHGls8ny2fyDRu2sbb0OOZa1zvY8DPrnwL_mPrcB07PI0hxa732w2-aWK5Lt-sDwnf2OQqnK-XyW2rGHYb_2n38XN0XNsmufHvPEMvd7fP03uyeJw_TK8XpOWge6I5KCgrayu9ohNe21JURWmpg5UEa4tyIoTT1spKFKqqa-CqlrnKxK204g7gDLGfv6ntfHh1nVnFuE6GUbNnazIpAybzMd8gTWb7l2m7mPul3rh9qHSh72yTm7W965KRigsplFFGMPgC2WB54w
ContentType Book Chapter
Copyright Springer Nature Switzerland AG 2021
Copyright_xml – notice: Springer Nature Switzerland AG 2021
DBID FFUUA
DEWEY 004
DOI 10.1007/978-3-030-87010-2_1
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 9783030870102
3030870103
EISSN 1611-3349
Editor Misra, Sanjay
Apduhan, Bernady O
Murgante, Beniamino
Torre, Carmelo Maria
Gervasi, Osvaldo
Taniar, David
Tarantino, Eufemia
Blečić, Ivan
Rocha, Ana Maria A. C
Garau, Chiara
Editor_xml – sequence: 1
  fullname: Misra, Sanjay
– sequence: 2
  fullname: Murgante, Beniamino
– sequence: 3
  fullname: Apduhan, Bernady O
– sequence: 4
  fullname: Torre, Carmelo Maria
– sequence: 5
  fullname: Gervasi, Osvaldo
– sequence: 6
  fullname: Taniar, David
– sequence: 7
  fullname: Tarantino, Eufemia
– sequence: 8
  fullname: Garau, Chiara
– sequence: 9
  fullname: Blečić, Ivan
– sequence: 10
  fullname: Rocha, Ana Maria A. C
EndPage 14
ExternalDocumentID EBC6724647_7_41
GroupedDBID 38.
AABBV
AABLV
ABNDO
ACWLQ
AEDXK
AEJLV
AEKFX
AELOD
AIYYB
ALMA_UNASSIGNED_HOLDINGS
BAHJK
BBABE
DBWEY
FFUUA
I4C
IEZ
OCUHQ
ORHYB
SBO
TPJZQ
TSXQS
Z5O
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z87
Z88
-DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RIG
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-p239t-92373cdaad9b052fac4d8ca0e3b63aa8c544e9aa6d487dff327f66395eb972e33
ISBN 9783030870096
303087009X
ISSN 0302-9743
IngestDate Tue Jul 29 20:40:16 EDT 2025
Fri Jun 06 21:47:41 EDT 2025
IsPeerReviewed true
IsScholarly true
LCCallNum TK5105.5-5105.9
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p239t-92373cdaad9b052fac4d8ca0e3b63aa8c544e9aa6d487dff327f66395eb972e33
OCLC 1268269347
ORCID 0000-0002-2089-975X
0000-0001-6415-1180
0000-0002-3664-3759
0000-0003-4021-4137
0000-0001-5226-2326
PQID EBC6724647_7_41
PageCount 12
ParticipantIDs springer_books_10_1007_978_3_030_87010_2_1
proquest_ebookcentralchapters_6724647_7_41
PublicationCentury 2000
PublicationDate 2021
PublicationDateYYYYMMDD 2021-01-01
PublicationDate_xml – year: 2021
  text: 2021
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Cham
PublicationSeriesSubtitle Theoretical Computer Science and General Issues
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate Lect.Notes Computer
PublicationSubtitle 21st International Conference, Cagliari, Italy, September 13-16, 2021, Proceedings, Part VIII
PublicationTitle Computational Science and Its Applications - ICCSA 2021
PublicationYear 2021
Publisher Springer International Publishing AG
Springer International Publishing
Publisher_xml – name: Springer International Publishing AG
– name: Springer International Publishing
RelatedPersons Hartmanis, Juris
Gao, Wen
Bertino, Elisa
Woeginger, Gerhard
Goos, Gerhard
Steffen, Bernhard
Yung, Moti
RelatedPersons_xml – sequence: 1
  givenname: Gerhard
  surname: Goos
  fullname: Goos, Gerhard
– sequence: 2
  givenname: Juris
  surname: Hartmanis
  fullname: Hartmanis, Juris
– sequence: 3
  givenname: Elisa
  surname: Bertino
  fullname: Bertino, Elisa
– sequence: 4
  givenname: Wen
  surname: Gao
  fullname: Gao, Wen
– sequence: 5
  givenname: Bernhard
  orcidid: 0000-0001-9619-1558
  surname: Steffen
  fullname: Steffen, Bernhard
– sequence: 6
  givenname: Gerhard
  orcidid: 0000-0001-8816-2693
  surname: Woeginger
  fullname: Woeginger, Gerhard
– sequence: 7
  givenname: Moti
  orcidid: 0000-0003-0848-0873
  surname: Yung
  fullname: Yung, Moti
SSID ssj0002720639
ssj0002792
Score 2.347914
Snippet Blockchains provide a valid and profitable support for the implementation of trustable and secure distributed ledgers, in support to groups of subjects that...
SourceID springer
proquest
SourceType Publisher
StartPage 3
SubjectTerms Blockchain
GDPR
IoV
Privacy
Pseudonymization
Risk analysis
Title Risk Analysis of a GDPR-Compliant Deletion Technique for Consortium Blockchains Based on Pseudonymization
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6724647&ppg=41
http://link.springer.com/10.1007/978-3-030-87010-2_1
Volume 12956
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Nb9MwFLegXGAHYIAYY8gHTlRBie3YybHNysYEaBod2s1ybEdMiA7R9MJfv2cnzhdchlRFleVGln-v9vv8PYTeUriCqSA8yrkwESO2ipTOkqjkCQcrSAlmXIHz5y_89JKdXaVXfY9NX11Sl-_1n3_WlfwPqjAGuLoq2Tsg270UBuA74AtPQBieE-V37GZteAV8P4bgywv_UZ_eW28b7TJkikfzj0XxdTEnMUmGMnLh8sqHtCRqfnJ8fhEVPs8c9hyOI0fODRKy7rheXV6ia_MJevv17ud8CbfhD_1duVSbJVyJxoUfzrd2Z5xfoa3yHPoWSDLxLQTf4sQ7OXCQLU5G9ij1BIPOLBodsCRvyMP_Oq6HGRrwUziaXWyeyKS_nUJEnk3G_BW8WhZcEMaZkEI6-oL7ImMz9GCxOvv0rXO1uVAzKGKusiesr-Ve6tfbEVI1nMOT5YzMj0nE3Csi6ydozxWnYFc1Ait8iu7ZzT56HFpz4FYK9tGjAc_kM3TtgMYBaHxTYYXHQOMANO6AxgA07oHGA6CxBxrD7CnQz9Hlh9W6OI3aHhvRL0LzOgL9XlBtlDJ5GaekUpqZTKvY0pJTpTKdMmZzpbgBy9ZUFSWiAiU1T22ZC2IpfYFmm5uNfYmwqTSjWapNnFoGn1IneWUsJ8YSReP8AL0Lmyh9JkCbfqybLdvKIZQwOWyzdHO3MvBrAzySSoBHengkwPPqLm8-RA97UX-NZvXvnT0CxbIu37SCcwtykXfH
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Computational+Science+and+Its+Applications+-+ICCSA+2021&rft.atitle=Risk+Analysis+of+a+GDPR-Compliant+Deletion+Technique+for+Consortium+Blockchains+Based+on+Pseudonymization&rft.date=2021-01-01&rft.pub=Springer+International+Publishing+AG&rft.isbn=9783030870096&rft.volume=12956&rft_id=info:doi/10.1007%2F978-3-030-87010-2_1&rft.externalDBID=41&rft.externalDocID=EBC6724647_7_41
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6724647-l.jpg