Data sharing using PDPA-compliant blockchain architecture in Malaysia.

Data privacy is undoubtedly the biggest concern for the modern society. Data privacy is also becoming a key policy in data protection regulations. Organizations assemble massive amount of personal data of the users for monetary and political purposes. These data can be sold for commercial purpose wi...

Full description

Saved in:
Bibliographic Details
Main Authors: Baskaran, Hasventhran, Yussof, Salman, Abu Bakar, Asmidar, Abdul Rahim, Fiza
Format: Article
Language:English
Published: Science and Information Organization 2023
Subjects:
Online Access:http://eprints.utm.my/105367/1/FizaAbdulRahim2023_DataSharingUsingPDPACompliantBlockchain.pdf
http://eprints.utm.my/105367/
http://dx.doi.org/10.14569/IJACSA.2023.0140515
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Data privacy is undoubtedly the biggest concern for the modern society. Data privacy is also becoming a key policy in data protection regulations. Organizations assemble massive amount of personal data of the users for monetary and political purposes. These data can be sold for commercial purpose without the prior knowledge or permission from the respective data owners. This can be mitigated by having blockchain to provide a much-needed transparency. However, blockchain’s own transparency becomes its own disadvantage when data owners want to be completely anonymous. Blockchain’s transparent nature will be conflicting with non-linkability. Since the data in blockchain is publicly viewable, any personal data or private transactions being processed through blockchain will be exposed to every node in the network. Hence, blockchain implementations also must comply with privacy acts such as Personal Data Protection Act (PDPA) to have privacy by design and by default. Hence, this paper proposes a PDPA-compliant blockchain architecture for data trading that provides complete control of data and anonymity to the users. A prototype is created using various tools to implement the proposed architecture. This study presents anonymous data sharing for users, data access, data delete features to verify the correctness of the proposed architecture.