簡易檢索 / 詳目顯示

研究生: 梁樂謙
Leung, Lok-Him
論文名稱: 符合GDPR規範之分散式帳本技術導向資料交易市場
GDPR-compliant Data Marketplace Framework with Distributed Ledger Technology
指導教授: 莊坤達
Chuang, Kun-Ta
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2019
畢業學年度: 107
語文別: 英文
論文頁數: 39
中文關鍵詞: GDPR資料交易市場分散式帳本技術
外文關鍵詞: GDPR, Data Marketplace, distributed ledger technology
相關次數: 點閱:94下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 本論文希望提出一個架構符合 GDPR 所規範,同時也需要有合法管道取得資料去滿足資料需求,讓資料可被流通,使得以後所有企業、服務、甚至裝置可以存取到自己需要的資料,同時在整個過程當中的資料流都需要被紀錄,即使資料最後會被刪除,也需要能被資料個體追溯,甚至更理想的情況下,可以將資料個體提供資料的行為視為一種貢獻被紀錄起來,更重要的是這些紀錄要永久被保存,不能屬於任何一方,也不能被擅自修改,並且在資料傳遞過程中以 「Privcay by Design」為考量,確保只有資料個體允許的單位取得資料,這樣才能維護資料自主權同時保有資料通透性。

    As the awareness of data privacy raising significantly, GDPR adopted on 14 April 2016, and became enforceable beginning 25 May 2018. Meanwhile, the demand of data increase rapidly for different applications. We propose a GDPR-compliant data marketplace framework with distributed ledger technology. Data marketplace aims at complying GDPR while satisfy the demand of data to allow data exchange. Therefore, business, services or even devices can access the data they need. Besides, the whole data flow should be recorded, even the data will delete eventually. Data marketplace is capable to provide the log If someone want to trace it. Furthermore, providing data should be regard as a kind of contribution which should also be recorded. Most important thing is that all records need to be stored permanently and be immutable which do not belong to anyone except the owner. "Privacy by Design" should be comply while data transmission. As a result, data sovereignty can be protected.

    中文摘要 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii Acknowledgment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi List of Figures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Challenge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1 GDPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.1 GDPR-compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.2 Distributed ledger . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.2.1 Evolution of Distributed ledger . . . . . . . . . . . . . . . . . . . . . . . 9 2.2.2 Decentralization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.2.3 Tustless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.3 Data marketplace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3 Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.2 GDPR-Compliant Data Marketplace Framework . . . . . . . . . . 15 3.2.1 Objective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.2.2 Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 3.3 Architecture . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3.4 GCDM Operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 3.5 Correspondence to GDPR . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 3.6 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 4 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 4.1 Implementation Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 4.2 Experiment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 4.2.1 Combination of different encryption algorithm . . . . . . . . . 29 4.2.2 Execution time of different operations . . . . . . . . . . . . . . . . 30 4.2.3 Time distribution on different CPU Types . . . . . . . . . . . . . 32 4.3 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 5 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

    [1] Carole Cadwalladr and Emma Graham-Harrison, “How to check whether Facebook shared your data with Cambridge Analytica,” https://www.theguardian.com/technology/2018/apr/10/facebook-notify-users-data-harvested-cambridge-analytica,March17,2018,ac-cessed: 2019-01-22.
    [2] European Parliament and Council of the European Union, “Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance),” http://data.europa.eu/eli/reg/2016/679/oj, pp. 1–88 (BG, ES, CS, DA, DE, ET, EL, EN, FR, GA, HR, IT, LV, LT, HU, MT, NL, PL, PT, RO, SK, SL, FI, SV), 2016, accessed: 2019-01-22.
    [3] C. Stach and F. Steimle, “Recommender-based privacy requirements elicitation-epicurean: an approach to simplify privacy settings in iot applications with respect to the gdpr,” in Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing.ACM,2019, pp. 1500–1507.
    [4] T. T. A. Dinh, R. Liu, M. Zhang, G. Chen, B. C. Ooi, and J. Wang, “Untangling blockchain: A data processing view of blockchain systems,” IEEE Transactions on Knowl-edge and Data Engineering, vol. 30, no. 7, pp. 1366–1385, 2018.
    [5] W. Dai, “B-Money,” http://www.weidai.com/bmoney.txt,1998,accessed: 2019-01-25.
    [6] H. Finney, “Reusable Proofs of Work,” https://web.archive.org/web/20071222072154/http://rpow.net/,archivedfromtheoriginalonDecember22,2007,accessed: 2019-01-25.
    [7] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008.
    [8] G. Wood, “Ethereum: A secure decentralised generalised transaction ledger,” Ethereum project yellow paper,vol. 151, pp.1–32,2014.
    [9] S. Popov, “The tangle,” cit. on,p. 131,2016.
    [10] R. Haenni, “Datum network: The decentralized data marketplace,” DATUM Whitepaper, vol. 15, p. 2017.
    [11] O. P. Foundation, “Ocean protocol:a decentralized substrate for ai data & services technical whitepaper,” Ocean Whitepaper,pp. 1–49.
    [12] D. J. Smith, “The dx network:towards open data markets,” DX Network Whitepaper,pp. 1–36.
    [13] R. v. d. V. Matthew Van Niekerk, “Databroker dao:global market for local data whitepa-per,” Databroker DAO Whitepaper,pp. 1–32.
    [14] J. Domingue, A. Third, and M. Ramachandran, “The fair trade framework for assessing decentralised data solutions,” in Companion Proceedings of The 2019 World Wide Web Conference.ACM,2019,pp.866–882.
    [15] J. E. Boritz, “Is practitioners’ views on core concepts of information integrity,” Interna-tional Journal of Accounting Information Systems, vol. 6, no. 4, pp. 260–279, 2005.
    [16] N. C. R. L. Y. Teraguchi and J. C. Mitchell, “Client-side defense against web-based iden-tity theft,” Computer Science Department, Stanford University. Available: http://crypto. stanford. edu/SpoofGuard/webspoof. pdf,2004.
    [17] A. Cavoukian et al., “Privacy by design: The 7 foundational principles,” Information and Privacy Commissioner of Ontario, Canada,vol.5, 2009.
    [18] Q. H. Dang, “Secure hash standard,” Tech. Rep., 2015.
    [19] F. Dufaux and T. Ebrahimi, “Scrambling for privacy protection in video surveillance sys-tems,” IEEE Transactions on Circuits and Systems for Video Technology,vol.18,no.8, pp. 1168–1174, 2008.
    [20] R. C. Elander, C. J. Holloway, D. B. Johnson, M. J. Kelly, A. V. Le, P. G. Lubold,S. M. Matyas, and J. D. Randall, “Commercial data masking,” Jun. 21 1994, uS Patent 5,323,464.
    [21] O. Nwokolo and D. Goodman, “Transaction data tokenization,” Nov. 7 2013, uS Patent App. 13/835,088.
    [22] W. R. Stevens, TCP/IP illustrated vol. I: the protocols. Pearson Education India.
    [23] E. Rescorla, “Http over tls,” 2000.
    [24] U. Hunkeler, H. L. Truong, and A. Stanford-Clark, “Mqtt-s—a publish/subscribe protocol for wireless sensor networks,” in 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE’08).IEEE,2008,pp. 791–798.
    [25] J. Postel and J. Reynolds, “File transfer protocol,” 1985.
    [26] F. Liang, W. Yu, D. An, Q. Yang, X. Fu, and W. Zhao, “A survey on big data market: Pricing, trading and protection,” IEEE Access,vol.6, pp.15132–15154, 2018.
    [27] M. Maksimovi´c, V. Vujovi´c, N. Davidovi´c, V. Miloˇsevi´c, and B. Periˇsi´c, “Raspberry pi as internet of things hardware: performances and constraints,” design issues,vol. 3, no.8.
    [28] M. Jakobsson and A. Juels, “Proofs of work and bread pudding protocols,” in Secure Information Networks.Springer,1999,pp.258–272.
    [29] D. Reed, M. Sporny, D. Longley, C. Allen, R. Grant, and M. Sabadello, “ decentralized identifiers (dids), data model and syntaxes for decentralized identifiers (dids),” 2018.
    [30] O. Goldreich and Y. Oren, “Definitions and properties of zero-knowledge proof systems,” Journal of Cryptology,vol.7, no.1,pp. 1–32,1994.
    [31] E. T. S. Anon, “Erc20 token standard-the ethereum wiki.”
    [32] C. Cachin, “Architecture of the hyperledger blockchain fabric,” 2016.
    [33] D. A. Patterson, “Latency lags bandwith,” Communications of the ACM,vol.47, no.10, pp. 71–75, 2004.
    [34] A. Elsts, E. Mitskas, and G. Oikonomou, “Distributed ledger technology and the internet of things: A feasibility study,” in Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems.ACM,2018,pp.7–12.

    無法下載圖示
    校外:不公開
    電子論文及紙本論文均尚未授權公開
    QR CODE