Data Capsule: A Self-Contained Data Model as an Access Policy Enforcement Strategy

02/16/2022
by   Reza Soltani, et al.
0

In this paper, we introduce a data capsule model, a self-contained and self-enforcing data container based on emerging self-sovereign identity standards, blockchain, and attribute-based encryption. A data capsule allows for a transparent, privacy-respecting, and secure exchange of personal data, enabling a progressive trust scheme in a semi-trusted environment. Each data capsule is bundled with its own access policy structure and verifiable data, drastically reducing the number of interactions needed among the user, the service providers, and data custodians. Moreover, by relying on the decentralized nature of blockchain and attribute-based encryption our proposed model ensures the access policies published by service providers are public, transparent, and strictly followed.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/01/2010

A Data Capsule Framework For Web Services: Providing Flexible Data Access Control To Users

This paper introduces the notion of a secure data capsule, which refers ...
research
11/21/2019

Self-Expiring Data Capsule using Trusted Execution Environment

Data privacy is unarguably of extreme importance. Nonetheless, there exi...
research
12/18/2020

Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based Encryption

Recently, Government of India has taken several initiatives to make Indi...
research
02/08/2020

Data User-Based Attribute-Based Encryption

Attribute-Based Encryption (ABE) has emerged as an information-centric p...
research
05/16/2018

Practical Decentralized Attribute-Based Delegation using Secure Name Systems

Identity and trust in the modern Internet are centralized around an olig...
research
04/28/2022

Design of Blockchain-based Travel Rule Compliance System

In accordance with the guidelines of the Financial Action Task Force (FA...
research
08/28/2023

Human-Scale Computing: A Case for Progressive Narrow Waist for Internet Applications

In the era where personal devices and applications are pervasive, indivi...

Please sign up or login with your details

Forgot password? Click here to reset