Abstract
The continuous advancements of blockchain applications impose constant improvements on their technical features. Particularly immutability, a highly secure blockchain attribute forbidding unauthorized or illicit data editing or deletion, which functions as crucial blockchain security. Nonetheless, the security function is currently being challenged due to improper data stored, such as child pornography, copyright violation, and lately the enaction of the “Right to be Forgotten (RtbF)” principle disseminated by the General Data Protection Regulation (GDPR), where it requires blockchain data to be redacted to suit current applications’ urgent demands, and even compliance with the regulation is a challenge and an unfeasible practice for various blockchain technology providers owing to the immutability characteristic. To overcome this challenge, mutable blockchain is highly demanded to solve previously mentioned issues, where controlled and supervised amendments to certain content within constrained privileges granted are suggested by several researchers through numerous blockchain redaction mechanisms using chameleon and non-chameleon hashing function approaches, and methods were proposed to achieve reasonable policies while ensuring high blockchain security levels. Accordingly, the current study seeks to thoroughly define redaction implementation challenges and security properties criteria. The analysis performed has mapped these criteria with chameleon-based research methodologies, technical approaches, and the latest cryptographic techniques implemented to resolve the challenge posed by the policy in which comparisons paved current open issues, leading to shaping future research directions in the scoped field.
Funder
Universiti Sains Malaysia
Aliraqia University
Subject
Computer Networks and Communications
Reference106 articles.
1. Blockchain for Digital Rights Management;Ma;Future Gener. Comput. Syst.,2018
2. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams;Aitzhan;IEEE Trans. Dependable Secur. Comput.,2018
3. Investigating Performance Constraints for Blockchain Based Secure E-Voting System;Khan;Future Gener. Comput. Syst.,2020
4. Khan, N., Aljoaey, H., Tabassum, M., Farzamnia, A., Sharma, T., and Tung, Y.H. (2022). Proposed Model for Secured Data Storage in Decentralized Cloud by Blockchain Ethereum. Electronics, 11.
5. Wang, B., and Li, Z. (2021). Healthchain: A Privacy Protection System for Medical Data Based on Blockchain. Future Internet, 13.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献