Poster: Secure Data Sharing with Decentralised Data Ring Fencing

被引:0
|
作者
Nangia, Aditya [1 ]
Bhupal, Saksham [1 ]
Mittal, Kushagra [1 ]
Mohania, Mukesh [1 ]
Kundu, Ashish [2 ]
机构
[1] IIIT Delhi, Delhi, India
[2] Cisco Res, San Jose, CA USA
关键词
Permissioned Blockchain; Data Ring Fencing; Data Privacy; Secured Data Sharing;
D O I
10.1109/ICDCS60910.2024.00149
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The explosion of data and digital technologies has exacerbated privacy concerns. Traditional access control struggles to keep pace with the complexity of multi-party data sharing, where varying data access rules and privacy policies across institutions create significant challenges - leading to unauthorized and unintended access, especially in multi-party scenarios. Data Ring Fencing, inspired by the financial sector's concept of isolating assets, offers a multi-layered security framework for secure data sharing. It governs data access privileges, regulating who can access what data, for what purpose, and at what cost. However, the current model relies on a central system, requiring complete trust from all participating institutions. This paper addresses these limitations by proposing a Decentralized Data Ring Fencing approach that leverages permissioned blockchains. This eliminates the need for a central authority, a critical factor as it removes the inherent single point of failure and the requirement for absolute trust in a central system.
引用
收藏
页码:1456 / 1457
页数:2
相关论文
共 50 条
  • [1] Poster Abstract: Secure Data Sharing by Means of Fragmentation, Encryption, and Dispersion
    Kapusta, Katarzyna
    Qiu, Han
    Memmi, Gerard
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM 2019 WKSHPS), 2019, : 1051 - 1052
  • [2] Secured Data Movement using Data Ring Fencing
    Nangia, Aditya
    Bhupal, Saksham
    Mohania, Mukesh
    Kundu, Chinmay
    2023 5TH IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS, TPS-ISA, 2023, : 370 - 379
  • [3] Secure and useful data sharing
    Sarathy, Rathindra
    Muralidhar, Krishnamurty
    DECISION SUPPORT SYSTEMS, 2006, 42 (01) : 204 - 220
  • [4] On the secure sharing of legacy data
    Russell, Douglas
    Power, David
    Slaymaker, Mark
    Mostefaoui, Ghita Kouadri
    Ma, Xiaoqi
    Simpson, Andrew
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 1676 - 1679
  • [5] Matchbox: Secure data sharing
    Goldman, K
    Valdez, E
    IEEE INTERNET COMPUTING, 2004, 8 (06) : 18 - 24
  • [6] Secure medical data sharing scheme based on traceable ring signature and blockchain
    Chengzhe Lai
    Zhe Ma
    Rui Guo
    Dong Zheng
    Peer-to-Peer Networking and Applications, 2022, 15 : 1562 - 1576
  • [7] Secure medical data sharing scheme based on traceable ring signature and blockchain
    Lai, Chengzhe
    Ma, Zhe
    Guo, Rui
    Zheng, Dong
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (03) : 1562 - 1576
  • [8] Examining public views on decentralised health data sharing
    Neumann, Victoria
    Davidge, Gail
    Harding, Mike
    Cunningham, James
    Davies, Nigel
    Devaney, Sarah
    Leeming, Gary
    Holm, Soren
    Ainsworth, John
    PLOS ONE, 2023, 18 (03):
  • [9] A Conceptual Architecture for Contractual Data Sharing in a Decentralised Environment
    Barclay, Iain
    Preece, Alun
    Taylor, Ian
    Verma, Dinesh
    ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS, 2019, 11006
  • [10] Secure Sensitive Data Sharing on a Big Data Platform
    Dong, Xinhua
    Li, Ruixuan
    He, Heng
    Zhou, Wanwan
    Xue, Zhengyuan
    Wu, Hao
    TSINGHUA SCIENCE AND TECHNOLOGY, 2015, 20 (01) : 72 - 80