Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

An Approach for Data Privacy Management for Banking Using Consortium Blockchain

Version 1 : Received: 14 September 2022 / Approved: 27 September 2022 / Online: 27 September 2022 (07:35:53 CEST)
Version 2 : Received: 21 June 2023 / Approved: 25 June 2023 / Online: 25 June 2023 (04:01:48 CEST)

How to cite: Nabih, S.; fahmy, H.; abdelgaber, S. An Approach for Data Privacy Management for Banking Using Consortium Blockchain. Preprints 2022, 2022090413. https://doi.org/10.20944/preprints202209.0413.v1 Nabih, S.; fahmy, H.; abdelgaber, S. An Approach for Data Privacy Management for Banking Using Consortium Blockchain. Preprints 2022, 2022090413. https://doi.org/10.20944/preprints202209.0413.v1

Abstract

Banking sectors commit modern working frameworks and models smooth development based on decentralization with keeping money confront in unused ranges and differing activities. Consortium Blockchain Privacy becomes a major concern and the challenge of Most of banking sectors.Development without being hampered being a major concern it can store confirmed, Data privacy includes assuring protection for both insider ad outsider threats therefore access control of Ring signature could help to secure Privacy of inside and outside threats by secure process by RSBAC using CIA triad privacy Confidentiality, Availability, Integrity.This paper proposes a ring signature-based on access control mechanism for determining who a user is and then regulating that person's access to and use of a system's resources. In a nutshell, access control restricts who has access to a system. It also restricts access to system resources to users who have been identified as having the necessary privileges and permissions. The proposed paradigm satisfies the needs of both workflow and non-workflow systems in an enterprise setting. The traits of the conditional purposes, roles, responsibilities, and policies provide the foundation for it. It ensures that internal risks such as database administrators are protected.Finally, it provides the necessary protection in the event that the data is published.

Keywords

Consortium Blockchain; Ring signature; Blockchain privacy; Blockchain security; Access Control; Blockchain big data

Subject

Computer Science and Mathematics, Information Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.