en-es
en-fr
en-sl
en
0.25
0.5
0.75
1.25
1.5
1.75
2
Blockchain Enabled Privacy Audit Logs
Published on Nov 28, 20171478 Views
Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between t
Related categories
Chapter list
Blockchain Enabled Privacy Audit Logs00:00
Outline00:16
Privacy Auditing in a Data Sharing Environment00:20
Linked Data Based Privacy Auditing01:20
Gap in Privacy Auditing02:46
Research Problem03:14
Research Objective03:57
Contributions04:08
Related Work04:58
Outline05:36
Privacy Audit Log Generation Process05:36
Log Event05:55
Privacy Audit Log Event Example06:20
Sign Event06:51
Signature Graph Generation07:07
Signature Graph07:38
Calculate Integrity Proof07:59
Calculate Integrity Proof08:20
Block Graph Generation08:31
Block Graph09:36
Log Integrity Verification10:00
Log Integrity Verification10:19
Experimental Evaluation11:37
Experimental Evaluation12:33
Conclusion14:11
Blockchain Enabled Privacy Audit Logs15:27