Version 1
: Received: 14 September 2022 / Approved: 27 September 2022 / Online: 27 September 2022 (07:35:53 CEST)
Version 2
: Received: 21 June 2023 / Approved: 25 June 2023 / Online: 25 June 2023 (04:01:48 CEST)
How to cite:
Nabih, S.; fahmy, H.; abdelgaber, S. An Approach for Data Privacy Management for Banking Using Consortium Blockchain. Preprints2022, 2022090413. https://doi.org/10.20944/preprints202209.0413.v1
Nabih, S.; fahmy, H.; abdelgaber, S. An Approach for Data Privacy Management for Banking Using Consortium Blockchain. Preprints 2022, 2022090413. https://doi.org/10.20944/preprints202209.0413.v1
Nabih, S.; fahmy, H.; abdelgaber, S. An Approach for Data Privacy Management for Banking Using Consortium Blockchain. Preprints2022, 2022090413. https://doi.org/10.20944/preprints202209.0413.v1
APA Style
Nabih, S., fahmy, H., & abdelgaber, S. (2022). An Approach for Data Privacy Management for Banking Using Consortium Blockchain. Preprints. https://doi.org/10.20944/preprints202209.0413.v1
Chicago/Turabian Style
Nabih, S., hanan fahmy and sayed abdelgaber. 2022 "An Approach for Data Privacy Management for Banking Using Consortium Blockchain" Preprints. https://doi.org/10.20944/preprints202209.0413.v1
Abstract
Banking sectors commit modern working frameworks and models smooth development based on decentralization with keeping money confront in unused ranges and differing activities. Consortium Blockchain Privacy becomes a major concern and the challenge of Most of banking sectors.Development without being hampered being a major concern it can store confirmed, Data privacy includes assuring protection for both insider ad outsider threats therefore access control of Ring signature could help to secure Privacy of inside and outside threats by secure process by RSBAC using CIA triad privacy Confidentiality, Availability, Integrity.This paper proposes a ring signature-based on access control mechanism for determining who a user is and then regulating that person's access to and use of a system's resources. In a nutshell, access control restricts who has access to a system. It also restricts access to system resources to users who have been identified as having the necessary privileges and permissions. The proposed paradigm satisfies the needs of both workflow and non-workflow systems in an enterprise setting. The traits of the conditional purposes, roles, responsibilities, and policies provide the foundation for it. It ensures that internal risks such as database administrators are protected.Finally, it provides the necessary protection in the event that the data is published.
Keywords
Consortium Blockchain; Ring signature; Blockchain privacy; Blockchain security; Access Control; Blockchain big data
Subject
Computer Science and Mathematics, Information Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.