ID-Based User-Centric Data Usage Auditing Scheme for Distributed Environments
Recent years have witnessed the trend of increasingly relying on remote and distributed infrastructures, mainly owned and managed by third parties. This increased the number of reported incidents of security breaches compromising users' personal data, where involved entities may massively colle...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Frontiers Media S.A.
2020-04-01
|
Series: | Frontiers in Blockchain |
Subjects: | |
Online Access: | https://www.frontiersin.org/article/10.3389/fbloc.2020.00017/full |