Towards Using Public Blockchain in Information-Centric Networks: Challenges Imposed by the European Union’s General Data Protection Regulation

Advances in computer science have raised concerns about the privacy of personal information. Therefore solutions to address these concerns have to be found. Blockchain enables new approaches to solve privacy issues in distributed systems, but at the same time also raises new concerns with its openness and immutability. The European Union has taken steps towards addressing information privacy concerns and define rights of data subjects and obligations of controllers and processors of personal data. We will apply and discuss these in light of current Blockchain implementations. This will result in a guideline for GDPR compliant Blockchain developments in the future.

[1]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[2]  Peter Schaar,et al.  Privacy by Design , 2010 .

[3]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[4]  Juan Carlos De Martin,et al.  Blockchain for the Internet of Things: A systematic literature review , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[5]  Sarah Meiklejohn,et al.  An Empirical Analysis of Anonymity in Zcash , 2018, USENIX Security Symposium.

[6]  S A R A H M E I K L E J O H N,et al.  A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .

[7]  Sergei Tikhomirov,et al.  Ethereum: State of Knowledge and Research Perspectives , 2017, FPS.

[8]  Yves Mersch: Virtual or virtueless? The evolution of money in the digital age , 2018 .

[9]  Massimo Bartoletti,et al.  A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.

[10]  Fergal Reid,et al.  An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.

[11]  Sarah Underwood,et al.  Blockchain beyond bitcoin , 2016, Commun. ACM.

[12]  Herbert Burkert,et al.  Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. , 1996 .

[13]  Ethan Heilman,et al.  An Empirical Analysis of Traceability in the Monero Blockchain , 2017, Proc. Priv. Enhancing Technol..

[14]  Michael S. Kester,et al.  Bitcoin Transaction Graph Analysis , 2015, ArXiv.

[15]  D. Guégan Public Blockchain versus Private blockhain , 2017 .

[16]  Alex Biryukov,et al.  Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.

[17]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[18]  Guillermo Navarro-Arribas,et al.  Analysis of the Bitcoin UTXO set , 2018, IACR Cryptol. ePrint Arch..

[19]  Jef Ausloos,et al.  The Right to Be Forgotten Across the Pond , 2013, Journal of Information Policy.

[20]  Björn Scheuermann,et al.  Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.

[21]  Khaled El Emam,et al.  A critical appraisal of the Article 29 Working Party Opinion 05/2014 on data anonymization techniques , 2015 .

[22]  Adi Shamir,et al.  Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.

[23]  Kevin Lee,et al.  An Empirical Analysis of Linkability in the Monero Blockchain , 2017, ArXiv.

[24]  Qi Liu,et al.  Behavior pattern clustering in blockchain networks , 2017, Multimedia Tools and Applications.