Blockchain Enabled Privacy Audit Logs thumbnail
slide-image
Pause
Mute
Subtitles not available
Playback speed
0.25
0.5
0.75
1
1.25
1.5
1.75
2
Full screen

Blockchain Enabled Privacy Audit Logs

Published on Nov 28, 20171474 Views

Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between t

Related categories

Chapter list

Blockchain Enabled Privacy Audit Logs00:00
Outline00:16
Privacy Auditing in a Data Sharing Environment00:20
Linked Data Based Privacy Auditing01:20
Gap in Privacy Auditing02:46
Research Problem03:14
Research Objective03:57
Contributions04:08
Related Work04:58
Outline05:36
Privacy Audit Log Generation Process05:36
Log Event05:55
Privacy Audit Log Event Example06:20
Sign Event06:51
Signature Graph Generation07:07
Signature Graph07:38
Calculate Integrity Proof07:59
Calculate Integrity Proof08:20
Block Graph Generation08:31
Block Graph09:36
Log Integrity Verification10:00
Log Integrity Verification10:19
Experimental Evaluation11:37
Experimental Evaluation12:33
Conclusion14:11
Blockchain Enabled Privacy Audit Logs15:27