ID-Based User-Centric Data Usage Auditing Scheme for Distributed Environments

Recent years have witnessed the trend of increasingly relying on remote and distributed infrastructures, mainly owned and managed by third parties. This increased the number of reported incidents of security breaches compromising users' personal data, where involved entities may massively colle...

Full description

Bibliographic Details
Main Authors: Nesrine Kaaniche, Maryline Laurent, Claire Levallois-Barth
Format: Article
Language:English
Published: Frontiers Media S.A. 2020-04-01
Series:Frontiers in Blockchain
Subjects:
Online Access:https://www.frontiersin.org/article/10.3389/fbloc.2020.00017/full