[PDF][PDF] Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions

E Politou, E Alepis, C Patsakis - Journal of cybersecurity, 2018‏ - academic.oup.com
Abstract Upon the General Data Protection Regulation's (GDPR) application on 25 May
2018 across the European Union, new legal requirements for the protection of personal data …

Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

N Kaaniche, M Laurent, S Belguith - Journal of Network and Computer …, 2020‏ - Elsevier
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …

Design choices for central bank digital currency: Policy and technical considerations

S Allen, S Čapkun, I Eyal, G Fanti, BA Ford… - 2020‏ - nber.org
Central banks around the world are exploring and in some cases even piloting Central Bank
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …

Cybersecurity in big data era: From securing big data to data-driven security

DB Rawat, R Doku, M Garuba - IEEE Transactions on Services …, 2019‏ - ieeexplore.ieee.org
''Knowledge is power” is an old adage that has been found to be true in today's information
age. Knowledge is derived from having access to information. The ability to gather …

Secure deduplication with efficient and reliable convergent key management

J Li, X Chen, M Li, J Li, PPC Lee… - IEEE transactions on …, 2013‏ - ieeexplore.ieee.org
Data deduplication is a technique for eliminating duplicate copies of data, and has been
widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it …

Measuring large-scale social networks with high resolution

A Stopczynski, V Sekara, P Sapiezynski, A Cuttone… - PloS one, 2014‏ - journals.plos.org
This paper describes the deployment of a large-scale study designed to measure human
interactions across a variety of communication channels, with high temporal resolution and …

A survey on web tracking: Mechanisms, implications, and defenses

T Bujlow, V Carela-Español, J Sole-Pareta… - Proceedings of the …, 2017‏ - ieeexplore.ieee.org
Privacy seems to be the Achilles' heel of today's web. Most web services make continuous
efforts to track their users and to obtain as much personal information as they can from the …

Secure overlay cloud storage with access control and assured deletion

Y Tang, PPC Lee, JCS Lui… - IEEE Transactions on …, 2012‏ - ieeexplore.ieee.org
We can now outsource data backups off-site to third-party cloud storage services so as to
reduce data management costs. However, we must provide security guarantees for the …

Ephpub: Toward robust ephemeral publishing

C Castelluccia, E De Cristofaro… - 2011 19th IEEE …, 2011‏ - ieeexplore.ieee.org
The increasing amount of personal and sensitive information disseminated over the Internet
prompts commen-surately growing privacy concerns. Digital data often lingers indefinitely …

Blockchain-based publicly verifiable data deletion scheme for cloud storage

C Yang, X Chen, Y **ang - Journal of Network and Computer Applications, 2018‏ - Elsevier
With the rapid development of cloud storage, more and more data owners store their data on
the remote cloud, that can reduce data owners' overhead because the cloud server …