Abstract
This paper discusses the privacy protection and security application of personal data from the perspective of building private chains. Individuals have control over their private chains, and their data can be transferred based on the owner’s active hashed interactions, which is a mechanism allowing the step of reaching consensus to be separated from the data ontology, keeping a balance among efficiency, security and privacy. Confronting with heterogeneous and multi-modal personal data, it is able to trace, verify and promote transactions of tokenized data with personal trustworthy AI agents. The system is conducive to attracting high-quality data into transactions by making it easier for superior data to be circulated, and the circulation records further increasing endorsement and adding values for the high-quality data, so as to break through “the Market for Lemons”.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Skare, M., Maria, D. L. M. D. O., Ribeiro-Navarrete, S.: Digital transformation and European small and medium enterprises (SMES): a comparative study using digital economy and society index data. International journal of information management (2023)
Xu, H.: Legal protection of personal medical data in the context of big data. Library 11, 38–45 (2019)
Zhao, Y.: The governance of big data promotes lean operations in public hospitals. China Health Human Resources 10, 10–14 (2021)
Gu, R., Wu, Z., Shi, H.: New approach for graded and classified cloud data access control for publish security based on TFR model. Comput. Sci. 47(z1), 400–403 (2020)
Zhao, Q.: Construction and application of the special disease database based on the scientific research platform of big data. China Digit. Med. 15(12), 89–92 (2020)
Akerlof, G.A.: The market for “lemons”: Quality uncertainty and the market mechanism. Uncertainty in economics. Academic Press, Cambridge, pp. 235–251 (1978)
Dagher, G.G., Mohler, J., Milojkovic, M., et al.: Ancile: privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain. Cities Soc. 39, 283–297 (2018)
Lenz, R., Reichert, M., Weber, B.: A framework for integrating process-oriented information systems and data-driven decision support systems. Decis. Support. Syst. 56, 219–235 (2013)
Chenthara, S., Ahmed, K., Wang, H., et al.: Healthchain: a novel framework on privacy preservation of electronic health records using blockchain technology. PLoS ONE 15(12), e0243043 (2020)
He, J.: Secure and trustworthy artificial intelligence. Inf. Secur. Commun. Priv. 310(10), 7–10 (2019)
Kumar, A., Braud, T., Tarkoma, S., Hui, P.: Trustworthy AI in the age of pervasive computing and big data. In: 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 1–6. IEEE (2020)
Reyes, M., Meier, R., Pereira, S., et al.: On the interpretability of artificial intelligence in radiology: challenges and opportunities. Radiol. Artif. Intell. 2(3), e190043 (2020)
Ribeiro, M.T., Singh, S., Guestrin, C.: “Why should I trust you?”: Explaining the predictions of any classifier, pp. 1135–1144. ACM (2016)
Singh, C., Chauhan, D., Deshmukh, S.A., et al.: Medi-Block record: Secure data sharing using block chain technology. Inf. Med. Unlocked 24(9), 100624 (2021)
Jardine, J., Fisher, J., Carrick, B.: Apple’s ResearchKit: smart data collection for the smartphone era? J. R. Soc. Med. 108(8), 294–296 (2015)
Brandt, R., Rice, R.: Building a better PHR paradigm: lessons from the discontinuation of Google health. Health Policy Technol. 3(3), 200–207 (2014)
Cai, H., Cai, T.: An architecture for web 3.0 and the emergence of spontaneous time order. https://arxiv.org/abs/2202.10619. Accessed 30 Aug 2023
Cai, T., Cai, H., Wang, H., et al.: Analysis of blockchain system with token-based bookkeeping method. IEEE Access 7, 50823–50832 (2019)
Cai, T., Cai, H., Lee, D., et al.: ITO: the sponsored token technology. J. Br. Blockchain Assoc. 4(1), 1–12 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Cai, T. et al. (2024). A Secure Circulation Mechanism of Personal Data Based on Blockchains. In: Jin, H., Pan, Y., Lu, J. (eds) Data Science and Information Security. IAIC 2023. Communications in Computer and Information Science, vol 2059. Springer, Singapore. https://doi.org/10.1007/978-981-97-1280-9_3
Download citation
DOI: https://doi.org/10.1007/978-981-97-1280-9_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-1279-3
Online ISBN: 978-981-97-1280-9
eBook Packages: Computer ScienceComputer Science (R0)