Acknowledgement
Grant : O2O 서비스를 위한 무자각 증강인증 및 프라이버시가 보장되는 블록체인 ID 관리 기술 개발
Supported by : 정보통신기획평가원
References
- DELL EMC, "New Dell EMC Research: Most Businesses Worldwide Now Recognize Value of Data Yet Struggle with Adequate Data Protection," 2019, https://www.emc.com/about/news/press/2019/20190321-01.htm
- D. Rushe, "Facebook Sorry-Almost-for Secret Psychological Experiment on Users," The Guardian, Oct. 2, 2014.
- C. Cadwalladr, E Mraham-Harrison, "Revealed: 50 Million Facebook Profiles Harvested for Cambridge Analytica in Major Data Breach," The Guardian, Mar. 17, 2018.
- S. de Capitani di Vimercati et al., "Encryption Policies for Regulating Access to Outsourced Data," ACM Trans. Database Syst. (TODS), vol. 35, no. 2, Apr. 2010, pp. 12:1-46.
- C. Dwork, "Differential privacy," in Encyclopedia of Cryptography and Security, Springer: New York, USA, 2011, pp. 338-340.
- G. Zyskind, O. Nathan, A. Pentland, "Decentralizing Privacy: Using Blockchain to Protect Personal Data," in IEEE Security Privacy Workshops, San jose, CA, USA, May 2015, pp. 180-184.
- M. Crosby et al., "Blockchain Technology: Beyond Bitcoin," Appl. Innovation Rev., vol. 2, 2016, pp. 7-19.
- K. Christidis, M. Devetsikiotis, "Blockchains and Smart Contracts for the Internet of Things," IEEE Access, vol. 4, 2016, pp. 2292-2303. https://doi.org/10.1109/ACCESS.2016.2566339
- M. Pilkington, "11 Blockchain technology: principles and applications," in Research Handbook on Digital Transformations, Sept. 2016, pp. 225-253.
- M. Vukolic, "The Quest for Scalable Blockchain Fabric: Proofof- Work vs. BFT Replication," in International Workshop on Open Problems in Network Security, Springer: New York, USA, 2015, pp. 112-125.
- J. Zheng et al., "Dynamic Role-Based Access control model," J. Softw., vol. 6, no. 6, 2011, pp. 1096-1102.
- J.L. Hernandez-Ramos et al., "Distributed Capability-Based Access Control for the Internet of Things," J. Internet Services Inf. Security (JISIS), vol. 3, no. 3/4, 2013, pp. 1-16. https://doi.org/10.22667/JISIS.2013.11.31.001
- E. Bertino, "Big Data-Security and Privacy," in IEEE Int. Congress Big Data, New York, USA, 2015, pp. 757-761.
- T. Salman et al., "Security Services Using Blockchains: A State of the Art Survey," IEEE Commun. Surveys Tuts., vol. 21, no. 1, 2018, pp. 858-880. https://doi.org/10.1109/COMST.2018.2863956
- A. Ouaddah et al., "FairAccess: A New Blockchain‐Based Access Control Framework for the Internet of Things," Security Commun. Netw., vol. 9, no. 18, 2016, pp. 5943-5964. https://doi.org/10.1002/sec.1748
- N. Zhang et al., "PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution," in Data Privacy Management, Cryptocurrencies and Blockchain Technology, Springer: New York, USA, 2018. pp. 345-353.
- N. Kaaniche, M. Laurent, "A Blockchain-Based Data Usage Auditing Architecture with Enhanced Privacy and Availability," in IEEE 16th Int. Symp. Netw. Comput. Applicat (NCA), Cambridge, MA, USA, 2017, pp. 1-5.
- C. Gentry, S. Halevi, "Hierarchical Identity Based Encryption with Polynomially Many Levels," in Theory of Cryptography Conference, Springer, New York, USA, 2009. pp. 437-456.