Poster: Secure Data Sharing with Decentralised Data Ring Fencing

被引:0
|
作者
Nangia, Aditya [1 ]
Bhupal, Saksham [1 ]
Mittal, Kushagra [1 ]
Mohania, Mukesh [1 ]
Kundu, Ashish [2 ]
机构
[1] IIIT Delhi, Delhi, India
[2] Cisco Res, San Jose, CA USA
关键词
Permissioned Blockchain; Data Ring Fencing; Data Privacy; Secured Data Sharing;
D O I
10.1109/ICDCS60910.2024.00149
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The explosion of data and digital technologies has exacerbated privacy concerns. Traditional access control struggles to keep pace with the complexity of multi-party data sharing, where varying data access rules and privacy policies across institutions create significant challenges - leading to unauthorized and unintended access, especially in multi-party scenarios. Data Ring Fencing, inspired by the financial sector's concept of isolating assets, offers a multi-layered security framework for secure data sharing. It governs data access privileges, regulating who can access what data, for what purpose, and at what cost. However, the current model relies on a central system, requiring complete trust from all participating institutions. This paper addresses these limitations by proposing a Decentralized Data Ring Fencing approach that leverages permissioned blockchains. This eliminates the need for a central authority, a critical factor as it removes the inherent single point of failure and the requirement for absolute trust in a central system.
引用
收藏
页码:1456 / 1457
页数:2
相关论文
共 50 条
  • [21] Addressing Techniques for Secure Data Sharing in Cloud
    Bhagat, Arti
    Rathee, Nisha
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 499 - 503
  • [22] Evaluation of Container Overlays for Secure Data Sharing
    Shakeri, Sara
    Veen, Lourens
    Grosso, Paola
    2020 IEEE 45TH LOCAL COMPUTER NETWORKS SYMPOSIUM ON EMERGING TOPICS IN NETWORKING (LCN SYMPOSIUM 2020), 2020, : 99 - 108
  • [23] Secure and Controlled Sharing of Data in Distributed Computing
    Thilakanathan, Danan
    Calvo, Rafael
    Chen, Shiping
    Nepal, Surya
    2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 825 - 832
  • [24] Secure Data Sharing and Processing in Heterogeneous Clouds
    Suzic, Bojan
    Reiter, Andreas
    Reimair, Florian
    Venturi, Daniele
    Kubo, Baldur
    1ST INTERNATIONAL CONFERENCE ON CLOUD FORWARD: FROM DISTRIBUTED TO COMPLETE COMPUTING, 2015, 68 : 116 - 126
  • [25] Blockchain based Secure Data Sharing Model
    Wang, Shi
    Liu, Jing
    PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, : 464 - 469
  • [26] Secure Medical Data Sharing For Healthcare System
    Chkirbene, Zina
    Hamila, Ridha
    Erbad, Aiman
    2022 IEEE 33RD ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (IEEE PIMRC), 2022, : 641 - 647
  • [27] DevSecOps for the Transition of Secure Data Sharing Technology
    Landry, Adam
    Schuette, Jason
    Schurgot, Mary R.
    OPEN ARCHITECTURE/OPEN BUSINESS MODEL NET-CENTRIC SYSTEMS AND DEFENSE TRANSFORMATION 2022, 2022, 12119
  • [28] Secure Data Sharing in Multi-Clouds
    Razaque, Abdul
    Nadimpalli, Saty Siva Varma
    Vommina, Suharsha
    Atukuri, Dinesh Kumar
    Reddy, Dammannagari Nayani
    Anne, Poojitha
    Vegi, Divya
    Malllapu, Vamsee Sai
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1909 - 1913
  • [29] Secure sharing of electronic medical data.
    Bilello, M
    Wiederhold, G
    JOURNAL OF INVESTIGATIVE MEDICINE, 1998, 46 (01) : 75A - 75A
  • [30] A Secure Data Sharing Scheme with Designated Server
    Zhu, Binrui
    Sun, Jiameng
    Qin, Jing
    Ma, Jixin
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019