Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Blockchain based general data protection regulation compliant data breach detection system

View through CrossRef
Context Data breaches caused by insiders are on the rise, both in terms of frequency and financial impact on organizations. Insider threat originates from within the targeted organization and users with authorized access to an organization’s network, applications, or databases commit insider attacks. Motivation Insider attacks are difficult to detect because an attacker with administrator capabilities can change logs and login records to destroy the evidence of the attack. Moreover, when such a harmful insider attack goes undetected for months, it can do a lot of damage. Such data breaches may significantly impact the affected data owner’s life. Developing a system for rapidly detecting data breaches is still critical and challenging. General Data Protection Regulation (GDPR) has defined the procedures and policies to mitigate the problems of data protection. Therefore, under the GDPR implementation, the data controller must notify the data protection authority when a data breach has occurred. Problem Statement Existing data breach detection mechanisms rely on a reliable third party. Because of the presence of a third party, such systems are not trustworthy, transparent, secure, immutable, and GDPR-compliant. Contributions To overcome these issues, this study proposed a GDPR-compliant data breach detection system by leveraging the benefits of blockchain technology. Smart contracts are written in Solidity and deployed on a local Ethereum test network to implement the solution. The proposed system can generate alert notifications against every data breach. Results We tested and deployed our proposed system, and the findings indicate that it can accomplish the insider threat mitigation objective. Furthermore, the GDPR compliance analysis of our system was also evaluated to make sure that it complies with the GDPR principles (such as right to be forgotten, access control, conditions for consent, and breach notifications). The conducted analysis has confirmed that the proposed system offers capabilities to comply with the GDPR from an application standpoint.
Title: Blockchain based general data protection regulation compliant data breach detection system
Description:
Context Data breaches caused by insiders are on the rise, both in terms of frequency and financial impact on organizations.
Insider threat originates from within the targeted organization and users with authorized access to an organization’s network, applications, or databases commit insider attacks.
Motivation Insider attacks are difficult to detect because an attacker with administrator capabilities can change logs and login records to destroy the evidence of the attack.
Moreover, when such a harmful insider attack goes undetected for months, it can do a lot of damage.
Such data breaches may significantly impact the affected data owner’s life.
Developing a system for rapidly detecting data breaches is still critical and challenging.
General Data Protection Regulation (GDPR) has defined the procedures and policies to mitigate the problems of data protection.
Therefore, under the GDPR implementation, the data controller must notify the data protection authority when a data breach has occurred.
Problem Statement Existing data breach detection mechanisms rely on a reliable third party.
Because of the presence of a third party, such systems are not trustworthy, transparent, secure, immutable, and GDPR-compliant.
Contributions To overcome these issues, this study proposed a GDPR-compliant data breach detection system by leveraging the benefits of blockchain technology.
Smart contracts are written in Solidity and deployed on a local Ethereum test network to implement the solution.
The proposed system can generate alert notifications against every data breach.
Results We tested and deployed our proposed system, and the findings indicate that it can accomplish the insider threat mitigation objective.
Furthermore, the GDPR compliance analysis of our system was also evaluated to make sure that it complies with the GDPR principles (such as right to be forgotten, access control, conditions for consent, and breach notifications).
The conducted analysis has confirmed that the proposed system offers capabilities to comply with the GDPR from an application standpoint.

Related Results

“The margin between the edge of the world and infinite possibility”
“The margin between the edge of the world and infinite possibility”
Purpose This paper aims to explore a paradoxical situation, asking whether it is possible to reconcile the immutable ledger known as blockchain with the requirements of the General...
Constraint-Force-Based (CFB) Modeling of Compliant Mechanisms
Constraint-Force-Based (CFB) Modeling of Compliant Mechanisms
Numerous works have been done on modeling compliant modules or joints, and the closed-form models of many widely-used compliant modules have been developed. However, the modeling o...
LEGAL IMPLICATIONS OF BLOCKCHAIN TECHNOLOGY FOR TAX COMPLIANCE AND FINANCIAL REGULATION
LEGAL IMPLICATIONS OF BLOCKCHAIN TECHNOLOGY FOR TAX COMPLIANCE AND FINANCIAL REGULATION
Blockchain technology has emerged as a disruptive force in the realms of tax compliance and financial regulation, presenting both opportunities and challenges for governments, busi...
Blockchain-Based Data Breach Detection: Approaches, Challenges, and Future Directions
Blockchain-Based Data Breach Detection: Approaches, Challenges, and Future Directions
In cybersecurity, personal data breaches have become one of the significant issues. This fact indicates that data breaches require unique detection systems, techniques, and solutio...
Application of the blockchain technology for digital diplomas: problems and prospects
Application of the blockchain technology for digital diplomas: problems and prospects
The purpose of this studyis to analyze possible problems in issuing digital diplomas, using the blockchain technology, and to promote solving these problems as well as to show the ...
Introduction to Blockchain Technology
Introduction to Blockchain Technology
A blockchain is a linked set of records maintained in a decentralized environment. The records in blockchain are publicly available but cryptographically secured. The interesting p...
BLOCKCHAIN TECHNOLOGY: FEATURES, PROSPECTS
BLOCKCHAIN TECHNOLOGY: FEATURES, PROSPECTS
The article examines the features of blockchain technology and the construction of its structural elements. It is based on the principle of structuring and working with databases, ...
EPD Electronic Pathogen Detection v1
EPD Electronic Pathogen Detection v1
Electronic pathogen detection (EPD) is a non - invasive, rapid, affordable, point- of- care test, for Covid 19 resulting from infection with SARS-CoV-2 virus. EPD scanning techno...

Back to Top