Blockchain based general data protection regulation compliant data breach detection system

Author:

Ansar Kainat1,Ahmed Mansoor2,Malik Saif Ur Rehman3,Helfert Markus2,Kim Jungsuk45

Affiliation:

1. Department of Computer Science, COMSATS University Islamabad, Islamabad, Pakistan

2. ADAPT Centre, Innovation Value Institute, Maynooth University, Maynooth, Ireland

3. Information Security Institute, Cybernetica AS, Tallinn, Estonia

4. Cellico Company R&D Lab, Seungnam-si, Gyeonggi-do, Republic of South Korea

5. Department of Biomedical Engineering, Gachon University, Incheon, Republic of South Korea

Abstract

Context Data breaches caused by insiders are on the rise, both in terms of frequency and financial impact on organizations. Insider threat originates from within the targeted organization and users with authorized access to an organization’s network, applications, or databases commit insider attacks. Motivation Insider attacks are difficult to detect because an attacker with administrator capabilities can change logs and login records to destroy the evidence of the attack. Moreover, when such a harmful insider attack goes undetected for months, it can do a lot of damage. Such data breaches may significantly impact the affected data owner’s life. Developing a system for rapidly detecting data breaches is still critical and challenging. General Data Protection Regulation (GDPR) has defined the procedures and policies to mitigate the problems of data protection. Therefore, under the GDPR implementation, the data controller must notify the data protection authority when a data breach has occurred. Problem Statement Existing data breach detection mechanisms rely on a reliable third party. Because of the presence of a third party, such systems are not trustworthy, transparent, secure, immutable, and GDPR-compliant. Contributions To overcome these issues, this study proposed a GDPR-compliant data breach detection system by leveraging the benefits of blockchain technology. Smart contracts are written in Solidity and deployed on a local Ethereum test network to implement the solution. The proposed system can generate alert notifications against every data breach. Results We tested and deployed our proposed system, and the findings indicate that it can accomplish the insider threat mitigation objective. Furthermore, the GDPR compliance analysis of our system was also evaluated to make sure that it complies with the GDPR principles (such as right to be forgotten, access control, conditions for consent, and breach notifications). The conducted analysis has confirmed that the proposed system offers capabilities to comply with the GDPR from an application standpoint.

Funder

National Research Foundation of Korea

The Energy and the Korea Institute of Industrial Technology Evaluation and Management (KEIT), in 2023

Publisher

PeerJ

Reference44 articles.

1. A semantic rule based digital fraud detection;Ahmed;PeerJ Computer Science,2021

2. An insider data leakage detection using one-hot encoding, synthetic minority oversampling and machine learning techniques;Al-Shehari;Entropy,2021

3. A blockchain-based secure data storage and trading model for wireless sensor networks;Ali,2020

4. A survey on data breach challenges in cloud computing security: issues and threats;Barona,2017

5. Data leakage detection algorithm based on task sequences and probabilities;Cesar;Knowledge-Based Systems,2017

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3