Information Privacy in Decentralized Applications

Publication Name

EAI/Springer Innovations in Communication and Computing

Abstract

Numerous reviews of decentralized applications using Blockchain have been published in recent years. However, these have predominantly focused on how applications map to the characteristics of underlying protocols and discuss privacy only in passing. This chapter takes a more focused perspective by analyzing recently proposed prominent decentralized applications, categorizing them according to information privacy requirements. Three dimensions emerge as key differentiators: accessibility requirements (i.e., whether an application needs to be publicly accessible), hierarchicality requirements (i.e., the notion of different types of participants with fundamentally different permissions), and requirements on joint verifiability of transaction data (i.e., which subset of an application’s data model needs to be verifiable by others). Grouping applications along these dimensions, it becomes clear that use cases with closed accessibility requirements are most dominant in the market today. These use cases can establish information privacy through governance, deliberate data modeling, and role-based access management.

Open Access Status

This publication is not available as open access

First Page

85

Last Page

104

Share

COinS
 

Link to publisher version (DOI)

http://dx.doi.org/10.1007/978-3-030-75107-4_4