{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T20:52:33Z","timestamp":1778273553554,"version":"3.51.4"},"reference-count":211,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T00:00:00Z","timestamp":1739923200000},"content-version":"vor","delay-in-days":49,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000836","name":"The University of Liverpool","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000836","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>This paper thoroughly explores the complex interplay between blockchain technology and the General Data Protection Regulation (GDPR) of the European Union, alongside the substantial challenges and potential opportunities stemming from their interaction. While the challenges of decentralization and immutability in blockchain are well-documented, this paper advances the discussion by incorporating legal developments, such as evolving interpretations of joint controllership and new advisory opinions. It also evaluates emerging use cases, including blockchain integration in digital currencies like Worldcoin, highlighting contemporary compliance challenges and innovative solutions. By proposing actionable frameworks that leverage technological advancements like chameleon hashes and zero-knowledge proofs, this paper provides a forward-looking analysis of how blockchain systems can align with GDPR principles, offering theoretical insights and practical pathways for compliance. The conclusion underscores the urgent need for clear regulatory frameworks. These frameworks are crucial to enable a balanced approach that fosters innovation while ensuring robust data protection compliance, and their absence could hinder the potential impact of the research.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf002","type":"journal-article","created":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T14:44:11Z","timestamp":1739976251000},"source":"Crossref","is-referenced-by-count":30,"title":["Reconciling blockchain technology and data protection laws: regulatory challenges, technical solutions, and practical pathways"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-0367-8139","authenticated-orcid":false,"given":"Ammar","family":"Zafar","sequence":"first","affiliation":[{"name":"University of Liverpool, School of Law and Social Justice , Liverpool L69 7ZR ,","place":["United Kingdom"]}]}],"member":"286","published-online":{"date-parts":[[2025,2,19]]},"reference":[{"key":"2025021914435852700_bib1","doi-asserted-by":"publisher","first-page":"042005","DOI":"10.1088\/1742-6596\/1964\/4\/042005","article-title":"Blockchain and GDPR\u2014a study on compatibility issues of the distributed ledger technology with GDPR data processing","volume":"1964","author":"Suripeddi","year":"2021","journal-title":"J Phys: Conf Ser"},{"key":"2025021914435852700_bib2","doi-asserted-by":"crossref","volume-title":"Blockchain and the General Data Protection Regulation: Can Distributed Ledgers Be Squared with European Data Protection Law?","author":"Finck","DOI":"10.1017\/9781108609708.004"},{"key":"2025021914435852700_bib3","doi-asserted-by":"publisher","first-page":"14743","DOI":"10.1007\/s10586-018-2387-5","article-title":"Analysis of blockchain technology: pros, cons and SWOT","volume":"22","author":"Niranjanamurthy","year":"2019","journal-title":"Cluster Comput"},{"key":"2025021914435852700_bib4"},{"key":"2025021914435852700_bib5","doi-asserted-by":"publisher","first-page":"102753","DOI":"10.1016\/j.ijinfomgt.2024.102753","article-title":"Blockchain technology and privacy regulation: reviewing frictions and synthesizing opportunities","volume":"76","author":"Akanfe","year":"2024","journal-title":"Int J Inf Manage"},{"key":"2025021914435852700_bib6","first-page":"1","article-title":"The immutable blockchain confronts the unstoppable GDPR","volume":"14","author":"Shoaib","year":"2024","journal-title":"Seattle J Technol Environ Innov Law"},{"key":"2025021914435852700_bib7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-60328-0_1","article-title":"GDPR-compliant data breach detection: leveraging semantic web and blockchain","volume-title":"Good Practices and New Perspectives in Information Systems and Technologies. WorldCIST 2024, Lecture Notes in Networks and Systems","author":"Ansar","year":"2024"},{"key":"2025021914435852700_bib8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-49593-9_14","article-title":"Decentralized technology and blockchain in healthcare administration","volume-title":"Blockchain Transformations","author":"Tiwari","year":"2024"},{"key":"2025021914435852700_bib9","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1186\/s42400-023-00163-y","article-title":"Evolution of blockchain consensus algorithms: a review on the latest milestones of blockchain consensus algorithms","volume":"6","author":"Hussein","year":"2023","journal-title":"Cybersecur"},{"key":"2025021914435852700_bib10","doi-asserted-by":"publisher","first-page":"e0163477","DOI":"10.1371\/journal.pone.0163477","article-title":"Where is current research on blockchain technology?\u2014A systematic review","volume":"11","author":"Yli-Huumo","year":"2016","journal-title":"PLoS One"},{"key":"2025021914435852700_bib11","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1109\/BigDataCongress.2017.85","article-title":"An overview of blockchain technology: architecture, consensus, and future trends","volume-title":"IEEE International Congress on Big Data (BigData Congress)","author":"Zheng","year":"2017"},{"key":"2025021914435852700_bib12","doi-asserted-by":"publisher","first-page":"100344","DOI":"10.1016\/j.dajour.2023.100344","article-title":"A comprehensive review of blockchain technology: underlying principles and historical background with future challenges","volume":"9","author":"Tripathi","year":"2023","journal-title":"Decis Anal J"},{"key":"2025021914435852700_bib13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-50733-5_6","article-title":"Data protection challenges in distributed ledger and blockchain technologies: a combined legal and technical analysis","volume-title":"Building Cybersecurity Applications with Blockchain and Smart Contracts","author":"Pov\u0161e","year":"2024"},{"key":"2025021914435852700_bib14","doi-asserted-by":"publisher","DOI":"10.4337\/9781035300884.00012","article-title":"Risks and the regulatory issues arising from the use of DLT","volume-title":"Financial Services Law and Distributed Ledger Technology","author":"McGurk","year":"2024"},{"key":"2025021914435852700_bib15","doi-asserted-by":"publisher","first-page":"1958","DOI":"10.1002\/spe.3237","article-title":"Managing data replication and distribution in the fog with Fred","volume":"53","author":"Pfandzelter","year":"2023","journal-title":"Softw Pract Exp"},{"key":"2025021914435852700_bib16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3645104","article-title":"Blockchain data storage optimisations: a comprehensive survey","volume":"56","author":"Heo","year":"2024","journal-title":"ACM Comput Surv"},{"key":"2025021914435852700_bib17","doi-asserted-by":"publisher","first-page":"102329","DOI":"10.1016\/j.techsoc.2023.102329","article-title":"A DLT-based framework for secure IoT infrastructure in smart communities","volume":"74","author":"Gkogkos","year":"2023","journal-title":"Technol Soc"},{"key":"2025021914435852700_bib18","first-page":"1","article-title":"Distributed ledger and decentralised technology adoption for smart digital transition in collaborative enterprise","volume":"17","author":"Anthony\u00a0Jnr","year":"2023","journal-title":"Enterp Inf Syst"},{"key":"2025021914435852700_bib19","article-title":"Blockchain-empowered trustworthy data sharing: fundamentals, applications, and challenges","author":"Nguyen","year":"2023"},{"key":"2025021914435852700_bib20","doi-asserted-by":"crossref","first-page":"e1705","DOI":"10.7717\/peerj-cs.1705","article-title":"Blockchain technology and application: an overview","volume":"9","author":"Dong","year":"2023","journal-title":"PeerJ Comput Sci"},{"key":"2025021914435852700_bib21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-50733-5_6","article-title":"Data protection challenges in distributed ledger and blockchain technologies: a combined legal and technical analysis","volume-title":"Building Cybersecurity Applications with Blockchain and Smart Contracts","author":"Pov\u0161e","year":"2024"},{"key":"2025021914435852700_bib22","first-page":"100175","article-title":"The real estate time-stamping and registration system based on Ethereum blockchain","volume":"5","author":"Zhang","year":"2024","journal-title":"Blockchain: Res Appl"},{"key":"2025021914435852700_bib23","article-title":"Global trends to 2035\u2014economy and society","author":"European Parliament","year":"2018"},{"key":"2025021914435852700_bib24","doi-asserted-by":"publisher","first-page":"1879","DOI":"10.3390\/electronics12081879","article-title":"Blockchain-based security configuration management for ICT systems","volume":"12","author":"Chatziamanetoglou","year":"2023","journal-title":"Electronics"},{"key":"2025021914435852700_bib25","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1109\/IDCIoT59759.2024.10467298","article-title":"An empirical review of security models used for issuing tamper proof certificates for authentic credentials","volume-title":"2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT)","author":"Dhote","year":"2024"},{"key":"2025021914435852700_bib26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/I2CT61223.2024.10543225","article-title":"From whitepaper to market trends: unraveling Bitcoin\u2019s evolution and business implications","volume-title":"2024 IEEE 9th International Conference for Convergence in Technology (I2CT)","author":"Panwar","year":"2024"},{"key":"2025021914435852700_bib27","doi-asserted-by":"publisher","first-page":"10698","DOI":"10.1109\/JIOT.2023.3242959","article-title":"Permissioned blockchain-based secure and privacy-preserving data sharing protocol","volume":"10","author":"Wang","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"2025021914435852700_bib28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/09537325.2021.1976748","article-title":"A comparative study of blockchain\u2019s largest permissionless networks","volume":"409","author":"Fernandez-Vazquez","year":"2021","journal-title":"Technol Anal Strateg Manag"},{"key":"2025021914435852700_bib29","doi-asserted-by":"publisher","DOI":"10.1017\/9781009327442","volume-title":"Better Money: Gold, Fiat, or Bitcoin?","author":"White","year":"2023"},{"key":"2025021914435852700_bib30","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/s12083-022-01410-8","article-title":"Tamper-proof multitenant data storage using blockchain","volume":"16","author":"Sharma","year":"2023","journal-title":"Peer-to-Peer Netw Appl"},{"key":"2025021914435852700_bib31","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.comcom.2023.11.017","article-title":"Blockchain-based access control system for efficient and GDPR-compliant personal data management","volume":"214","author":"Daud\u00e9n-Esmel","year":"2024","journal-title":"Comput Commun"},{"key":"2025021914435852700_bib32","first-page":"5","article-title":"The immutable blockchain confronts the unstoppable GDPR","volume":"14","author":"Shoaib","year":"2023","journal-title":"Seattle J Technol Environ Innov Law"},{"key":"2025021914435852700_bib33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s43151-024-00137-y","article-title":"Becoming a digital citizen in Estonia? New migrants\u00a0Interpretations of their digital participation","volume":"7","author":"Allaste","year":"2024","journal-title":"J Appl Youth Stud"},{"key":"2025021914435852700_bib34","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1145\/3592813.3592935","article-title":"A systematic study on the impact of GDPR compliance on organizations","volume-title":"Proceedings of the XIX Brazilian Symposium on Information Systems","author":"Machado","year":"2023"},{"key":"2025021914435852700_bib35","first-page":"164","article-title":"Complexities of blockchain technology and distributed ledger technologies: a detailed inspection","volume":"2","author":"Andr\u00e9","year":"2021","journal-title":"Fusion Multidiscip Res"},{"key":"2025021914435852700_bib36","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1108\/JOIC-10-2020-0037","article-title":"Blockchain can both enhance and undermine compliance but is not inherently at odds with EU privacy laws","volume":"22","author":"Moerel","year":"2021","journal-title":"J Invest Compliance"},{"key":"2025021914435852700_bib37"},{"key":"2025021914435852700_bib38","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198759393.003.528","article-title":"Article 8 CFR","volume-title":"The EU Treaties and the Charter of Fundamental Rights: A Commentary","author":"Lock","year":"2019","edition":"Online edn"},{"key":"2025021914435852700_bib39","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198759393.003.21","article-title":"Article 16 TEU","volume-title":"The EU Treaties and the Charter of Fundamental Rights: A Commentary","author":"Loewenthal","year":"2019","edition":"Online edn"},{"key":"2025021914435852700_bib40"},{"key":"2025021914435852700_bib41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14763\/2021.2.1563","article-title":"Decentralisation: a multidisciplinary perspective","volume":"10","author":"Bod\u00f3","year":"2021","journal-title":"Internet Policy Rev"},{"key":"2025021914435852700_bib42","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1093\/idpl\/ipz026","article-title":"They who must not be identified\u2014distinguishing personal from non-personal data under the GDPR","volume":"10","author":"Finck","year":"2020","journal-title":"Int Data Priv Law"},{"key":"2025021914435852700_bib43","first-page":"482","article-title":"A tamper-resistant and decentralized service for cloud storage based on layered blockchain","volume-title":"Proceedings of the International Conference on Collaborative Computing: Networking, Applications and Worksharing","author":"Zhou","year":"2020"},{"key":"2025021914435852700_bib44","article-title":"Reviving purpose limitation and data minimisation in data-driven systems","author":"Biega","year":"2021"},{"key":"2025021914435852700_bib45","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1109\/Blockchain50366.2020.00057","article-title":"Towards enabling deletion in append-only blockchains to support data growth management and GDPR compliance","volume-title":"2020 IEEE International Conference on Blockchain (Blockchain)","author":"Kuperberg","year":"2020"},{"key":"2025021914435852700_bib46","volume-title":"General Data Protection Regulation: The Right to Erasure","author":"Bika","year":"2020"},{"key":"2025021914435852700_bib47","doi-asserted-by":"publisher","first-page":"50593","DOI":"10.1109\/ACCESS.2021.3069877","article-title":"GDPR compliant blockchains\u2014a systematic literature review","volume":"9","author":"Haque","year":"2021","journal-title":"IEEE Access"},{"key":"2025021914435852700_bib48","doi-asserted-by":"publisher","first-page":"1583","DOI":"10.1017\/glj.2021.79","article-title":"The difficulty of defining sensitive data\u2014the concept of sensitive data in the EU Data Protection Framework","volume":"22","author":"Quinn","year":"2021","journal-title":"Ger Law J"},{"key":"2025021914435852700_bib49","doi-asserted-by":"publisher","first-page":"119697","DOI":"10.1109\/ACCESS.2020.3005509","article-title":"GDPR compliance verification in the internet of things","volume":"8","author":"Barati","year":"2020","journal-title":"IEEE Access"},{"key":"2025021914435852700_bib50","author":"The European Data Protection Board (EDPB) is an independent European body with a legal personality"},{"key":"2025021914435852700_bib51","volume-title":"Guidelines 8\/2022 on Identifying a Controller or Processor\u2019s Lead Supervisory Authority. (Version 2.1, adopted on 28 March 2023)","author":"European Data Protection Board"},{"key":"2025021914435852700_bib52","doi-asserted-by":"publisher","first-page":"105762","DOI":"10.1016\/j.clsr.2022.105762","article-title":"Device manufacturers as controllers\u2014expanding the concept of controllership in the GDPR","volume":"47","author":"Dahi","year":"2022","journal-title":"Comput Law Secur Rev"},{"key":"2025021914435852700_bib53","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198868422.003.0003","article-title":"Control as a Central notion in the discussion on data subject rights","volume-title":"Data Subject Rights under the GDPR","author":"Vrabec","year":"2021","edition":"Online edn"},{"key":"2025021914435852700_bib54","doi-asserted-by":"publisher","first-page":"105762","DOI":"10.46941\/2021.se1.167-179","article-title":"Device manufacturers as controllers\u2014expanding the concept of controllership in the GDPR","volume":"47","author":"Dahi","year":"2022","journal-title":"Comput Law Secur Rev"},{"key":"2025021914435852700_bib55","doi-asserted-by":"publisher","DOI":"10.5771\/9783748921561","article-title":"Accountability\u2014the gravity centre of GDPR","author":"Kahler","year":"2020","journal-title":"Turning Point in Data Protection Law"},{"key":"2025021914435852700_bib56","volume-title":"Case C-131\/12 Google Spain [2014]EU"},{"key":"2025021914435852700_bib57","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1093\/hrlr\/ngu033","article-title":"Further developments in the right to be forgotten: the European Court of Justice\u2019s judgment in Case C-131\/12, Google Spain, SL, Google Inc v Agencia Espanola de Proteccion de Datos","volume":"14","author":"Frantziou","year":"2014","journal-title":"Hum Rights Law Rev"},{"key":"2025021914435852700_bib58","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198826491.003.0013","article-title":"Article 4(7). Controller","volume-title":"The EU General Data Protection Regulation (GDPR): A Commentary","author":"Bygrave","year":"2020","edition":"Online edn"},{"key":"2025021914435852700_bib59","author":"Previously known as \u201cArticle 29 Working Party\u201d until replaced by EDPB on 25 May 2018 under the EU General Data Protection Regulation (GDPR)"},{"key":"2025021914435852700_bib60","volume-title":"Opinion 10\/2006 on the Processing of Personal Data by the Society for Worldwide Interbank Financial Telecommunication (SWIFT) (WP128, 01935\/06\/EN","author":"ARTICLE 29 Data Protection Working Party","year":"2006"},{"key":"2025021914435852700_bib61","doi-asserted-by":"publisher","first-page":"341","DOI":"10.3390\/fi14110341","article-title":"Blockchain technology: benefits, challenges, applications, and integration of Blockchain technology with cloud computing","volume":"14","author":"Habib","year":"2022","journal-title":"Future Internet"},{"key":"2025021914435852700_bib63","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-030-54494-2_5","article-title":"Data integrity, control and tokenization","volume-title":"Digital Disruption: Implications and Opportunities for Economies, Society, Policy Makers and Business Leaders","author":"Vagadia","year":"2020"},{"key":"2025021914435852700_bib64","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198826491.003.0061","article-title":"Article 26 joint controllers","volume-title":"The EU General Data Protection Regulation (GDPR): A Commentary","author":"Millard","year":"2020","edition":"Online edn"},{"key":"2025021914435852700_bib65","author":"Wirtschaftsakademie Schleswig-Holstein GmbH v Unabh\u00e4ngiges Landeszentrum f\u00fcr Datenschutz Schleswig-Holstein\u00a0(C-210\/16) [2018]ECLI:EU:C:2018:388"},{"key":"2025021914435852700_bib66","volume-title":"Opinion of AG Bobek in Case C-40\/17\u00a0Fashion ID"},{"key":"2025021914435852700_bib67","doi-asserted-by":"crossref","volume-title":"Blockchain and the General Data Protection Regulation: Can Distributed Ledgers Be Squared with European Data Protection Law?","author":"Finck","DOI":"10.1017\/9781108609708.004"},{"key":"2025021914435852700_bib68","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1093\/clp\/cuad009","article-title":"Complete and effective data protection","volume":"76","author":"Lynskey","year":"2023","journal-title":"Curr Leg Probl"},{"key":"2025021914435852700_bib69","doi-asserted-by":"publisher","first-page":"100015","DOI":"10.1016\/j.csa.2023.100015","article-title":"Securing distributed systems: a survey on access control techniques for cloud, Blockchain, IoT and SDN","volume":"1","author":"Golightly","year":"2023","journal-title":"Cyber Secur Appl"},{"key":"2025021914435852700_bib70","first-page":"15","article-title":"Distributed ledgers and their implications in information technology law","volume":"5","author":"\u00d6zdemir","year":"2023","journal-title":"Ki\u015fisel Verileri Koruma Dergisi"},{"key":"2025021914435852700_bib71","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1109\/SIST58284.2023.10223536","article-title":"Exploring the privacy concerns in permissionless blockchain networks and potential solutions","volume-title":"2023 IEEE International Conference on Smart Information Systems and Technologies (SIST)","author":"Bayan","year":"2023"},{"key":"2025021914435852700_bib72","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.comcom.2023.01.018","article-title":"A comparative study on consensus mechanism with security threats and future scopes: blockchain","volume":"201","author":"Yadav","year":"2023","journal-title":"Comput Commun"},{"key":"2025021914435852700_bib73","volume-title":"Guidelines 01\/2022 on Data Subject Rights\u2014Right of Access. (Version 2.1, adopted on 28 March 2023)","author":"European Data Protection Board"},{"key":"2025021914435852700_bib74","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/B978-0-323-98973-2.00014-9","article-title":"Is bitcoin a real currency? An economic appraisal","volume-title":"Handbook of Digital Currency","author":"Yermack","year":"2024"},{"key":"2025021914435852700_bib75","volume-title":"Guidelines 07\/2020 on the Concepts of Controller and Processor in the GDPR. (Version 2.1, adopted on 7 July 2021)","author":"European Data Protection Board"},{"key":"2025021914435852700_bib76","doi-asserted-by":"crossref","first-page":"36","DOI":"10.34306\/bfront.v2i2.207","article-title":"Challenges of Bitcoin blockchain technology in real-world apps","volume":"2","author":"Fauzi","year":"2023","journal-title":"Blockchain-Front Technol"},{"key":"2025021914435852700_bib77","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780192870339.001.0001","volume-title":"Vulnerability and Data Protection Law\u00a0(Oxford Data Protection & Privacy Law","author":"Malgieri","year":"2023"},{"key":"2025021914435852700_bib78","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/grurint\/ikae095","article-title":"Playing regulatory catch-up?\u2014The relevance of EDPB guidelines 2\/2023 on the technical scope of art. 5(3) of the ePrivacy Directive","author":"Idelberger","year":"2024","journal-title":"GRUR Int"},{"key":"2025021914435852700_bib79","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198842187.001.0001","volume-title":"Regulating Blockchain: Techno-Social and Legal Challenges","author":"Hacker","year":"2019"},{"key":"2025021914435852700_bib80","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1093\/ulr\/unad018","article-title":"Competing claims to crypto-assets","volume":"28","author":"Woxholth","year":"2024","journal-title":"Unif Law Rev"},{"key":"2025021914435852700_bib81","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1093\/idpl\/ipu011","article-title":"\u2018A third party to whom data are disclosed\u2019: a third group among those processing data","volume":"4","author":"Aparicio\u00a0Salom","year":"2014","journal-title":"Int Data Priv Law"},{"key":"2025021914435852700_bib82","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1093\/idpl\/ipab014","article-title":"Problems with controller-based responsibility in EU Data Protection law","volume":"11","author":"Wong","year":"2021","journal-title":"Int Data Priv Law"},{"key":"2025021914435852700_bib83","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198868422.001.0001","volume-title":"Data Subject Rights under the GDPR","author":"Vrabec","year":"2021"},{"key":"2025021914435852700_bib84","volume-title":"Premiers \u00c9l\u00e9ments d'analyse de la CNIL: Blockchain","author":"Commission Nationale Informatique et Libert\u00e9s"},{"key":"2025021914435852700_bib86","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.1093\/rfs\/hhac051","article-title":"Corporate capture of blockchain governance","volume":"36","author":"Ferreira","year":"2023","journal-title":"Rev Financ Stud"},{"key":"2025021914435852700_bib87","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780192845863.003.0006","article-title":"The limits of data protection law","volume-title":"Data Protection Law and Emotion","author":"Clifford","year":"2024"},{"key":"2025021914435852700_bib88","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1093\/cmlj\/kmac003","article-title":"The DLT sandbox under the pilot-regulation","volume":"17","author":"Zetzsche","year":"2022","journal-title":"Cap Mark Law J"},{"key":"2025021914435852700_bib89","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198842187.003.0004","article-title":"In code(rs) we trust: software developers as fiduciaries in public blockchains","volume-title":"Regulating Blockchain: Techno-Social and Legal Challenges","author":"Walch","year":"2019","edition":"Online edn"},{"key":"2025021914435852700_bib90","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780197515075.003.0003","article-title":"Money\/code\/space","volume-title":"Money Code Space: Hidden Power in Bitcoin, Blockchain, and Decentralisation","author":"Parkin","year":"2020","edition":"Online edn"},{"key":"2025021914435852700_bib91","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198873617.003.0003","article-title":"Enhancing disruption: smart contracts in capital markets, or initial coin offerings: breached promises and relevant consequences","volume-title":"Technology in Financial Markets: Complex Change and Disruption","author":"Dell'Erba","year":"2024","edition":"Online edn"},{"key":"2025021914435852700_bib93","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1093\/jnlids\/idab025","article-title":"From smart contract litigation to blockchain arbitration, a new decentralized approach leading towards the blockchain arbitral order","volume":"12","author":"Chevalier","year":"2021","journal-title":"J Int Dispute Settl"},{"key":"2025021914435852700_bib94","doi-asserted-by":"publisher","first-page":"15021","DOI":"10.1038\/s41598-022-19341-y","article-title":"Analysis of solutions for a blockchain compliance with GDPR","volume":"12","author":"Godyn","year":"2022","journal-title":"Sci Rep"},{"key":"2025021914435852700_bib96","doi-asserted-by":"publisher","DOI":"10.1093\/law\/9780192855220.003.0021","article-title":"Joint controllers","volume-title":"The EU Law Enforcement Directive (LED): A Commentary","author":"Quintel","year":"2024","edition":"Online edn"},{"key":"2025021914435852700_bib97","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198826491.003.0044","article-title":"Article 13 information to be provided where personal data are collected from the data subject","volume-title":"The EU General Data Protection Regulation (GDPR): A Commentary","author":"Zanfir-Fortuna","year":"2020","edition":"Online edn"},{"key":"2025021914435852700_bib98","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780192870339.003.0002","article-title":"The notion of the data subject: an average individual?","volume-title":"Vulnerability and Data Protection Law","author":"Malgieri","year":"2023"},{"key":"2025021914435852700_bib99"},{"key":"2025021914435852700_bib100","doi-asserted-by":"publisher","first-page":"109560","DOI":"10.1109\/ACCESS.2024.3435845","article-title":"A review of security issues when integrating IoT with cloud computing and blockchain","volume":"12","author":"Albshaier","year":"2024","journal-title":"IEEE Access"},{"key":"2025021914435852700_bib101","doi-asserted-by":"publisher","first-page":"528","DOI":"10.51594\/csitrj.v5i3.859","article-title":"Data privacy laws and compliance: a comparative review of the EU GDPR and USA Regulations","volume":"5","author":"Bakare","year":"2024","journal-title":"Comput Sci IT Res J"},{"key":"2025021914435852700_bib102","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-56045-3_9","article-title":"General Data Protection Regulation: current challenges and future directions","volume-title":"E-Governance in the European Union","author":"Mesar\u010d\u00edk","year":"2024"},{"key":"2025021914435852700_bib103","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/jlb\/lsae001","article-title":"Purpose definition as a crucial step for determining the legal basis under the GDPR: implications for scientific research","volume":"11","author":"Becker","year":"2024","journal-title":"J Law Biosci"},{"key":"2025021914435852700_bib104","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198868422.003.0003","article-title":"Control as a central notion in the discussion on data subject rights","volume-title":"Data Subject Rights under the GDPR","author":"Vrabec","year":"2021","edition":"Online edn"},{"key":"2025021914435852700_bib105","doi-asserted-by":"publisher","first-page":"118704","DOI":"10.1016\/j.eswa.2022.118704","article-title":"Decision support system for blockchain (DLT) platform selection based on ITU recommendations: a systematic literature review approach","volume":"211","author":"Kubler","year":"2023","journal-title":"Expert Syst Appl"},{"key":"2025021914435852700_bib106","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41870-024-01933-8","article-title":"Blockchain-based security framework for mitigating network attacks in multi-SDN controller environment","author":"Ohri","year":"2024","journal-title":"Int J Inf Tecnol"},{"key":"2025021914435852700_bib107","first-page":"82","article-title":"Injection attacks against end-to-end encrypted applications","volume-title":"2024 IEEE Symposium on Security and Privacy (SP)","author":"F\u00e1brega","year":"2023"},{"key":"2025021914435852700_bib108","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3406724","article-title":"Challenges and enablers for GDPR compliance: systematic literature review and future research directions","volume-title":"IEEE Access\u00a0PP(99) 1","author":"Zaguir","year":"2024"},{"key":"2025021914435852700_bib109","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1093\/idpl\/ipaa011","article-title":"Who is responsible for data processing in smart homes? Reconsidering joint controllership and the household exemption","volume":"10","author":"Chen","year":"2021","journal-title":"Int Data Priv Law"},{"key":"2025021914435852700_bib110","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1093\/idpl\/ipac011","article-title":"Applying GDPR roles and responsibilities to scientific data sharing","volume":"12","author":"Becker","year":"2022","journal-title":"Int Data Priv Law"},{"key":"2025021914435852700_bib111","doi-asserted-by":"publisher","first-page":"15","DOI":"10.62915\/2472-2707.1167","article-title":"Privacy principles and harms: balancing protection and innovation","volume":"2024","author":"Aiello","year":"2024","journal-title":"J Cybersecur Educ Res Pract"},{"key":"2025021914435852700_bib112","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ISSE51541.2021.9582551","article-title":"Sovrin Network for Decentralized Digital Identity: analysing a self-sovereign Identity system based on distributed ledger technology","volume-title":"IEEE International Symposium on Systems Engineering (ISSE)","author":"Naik","year":"2021"},{"key":"2025021914435852700_bib113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-56599-1_27","article-title":"Blockchain-based identity management for secure data sharing","volume-title":"ITNG 2024: 21st International Conference on Information Technology-New Generations. ITNG 2024, Advances in Intelligent Systems and Computing","author":"Duraibi","year":"2024"},{"key":"2025021914435852700_bib114"},{"key":"2025021914435852700_bib115","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/978-3-031-42944-6_29","article-title":"Joint Controller Agreement: what is the function of the Joint Controller Agreement in sharing personal data with a large research consortium or Biobank infrastructures?","volume-title":"GDPR Requirements for Biobanking Activities Across Europe","author":"Colcelli","year":"2023"},{"key":"2025021914435852700_bib116","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1093\/idpl\/ipad023","article-title":"Re-thinking the allocation of roles under the GDPR in the context of cloud computing","volume":"14","author":"Fischer","year":"2024","journal-title":"Int Data Priv Law"},{"key":"2025021914435852700_bib117","doi-asserted-by":"publisher","first-page":"4515","DOI":"10.1007\/s10586-022-03691-3","article-title":"Data governance through a multi-DLT architecture in view of the GDPR","volume":"25","author":"Zichichi","year":"2022","journal-title":"Cluster Comput"},{"key":"2025021914435852700_bib118","doi-asserted-by":"crossref","first-page":"153","DOI":"10.4018\/979-8-3693-1214-8.ch008","article-title":"Revolutionizing health data management with blockchain technology: enhancing security and efficiency in a digital era","volume-title":"Emerging Technologies for Health Literacy and Medical Practice","author":"Tariq","year":"2024"},{"key":"2025021914435852700_bib119","doi-asserted-by":"crossref","first-page":"750","DOI":"10.1109\/InCACCT57535.2023.10141848","article-title":"MediBlock: a blockchain-based architecture for secure healthcare system","volume-title":"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)","author":"Shrimali","year":"2023"},{"key":"2025021914435852700_bib120","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780197617601.003.0003","article-title":"How data-opolies have exploited the current legal void, and what\u2019s being proposed to fix it","volume-title":"Breaking Away: How to Regain Control over Our Data, Privacy, and Autonomy","author":"Stucke","year":"2022","edition":"Online edn"},{"key":"2025021914435852700_bib121"},{"key":"2025021914435852700_bib122","doi-asserted-by":"publisher","first-page":"35","DOI":"10.7590\/187479823X16800083010347","article-title":"Individual rights in international personal data transfers under the General Data Protection Regulation","volume":"16","author":"Drechsler","year":"2023","journal-title":"Rev Eur Admin Law"},{"key":"2025021914435852700_bib123","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1017\/beq.2022.30","article-title":"Dark sides of data transparency: organized immaturity after GDPR?","volume":"33","author":"Schade","year":"2023","journal-title":"Bus Ethics Q"},{"key":"2025021914435852700_bib124","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-50733-5_7","article-title":"Solutions to data protection challenges in distributed ledger and blockchain technologies: a combined legal and technical approach","volume-title":"Building Cybersecurity Applications with Blockchain and Smart Contracts","author":"Pov\u0161e","year":"2024"},{"key":"2025021914435852700_bib125","doi-asserted-by":"publisher","first-page":"100113","DOI":"10.1016\/j.bcra.2022.100113","article-title":"Comparative analysis of permissioned blockchain frameworks for industrial applications","volume":"4","author":"Capocasale","year":"2023","journal-title":"Blockchain: Res Appl"},{"key":"2025021914435852700_bib126","doi-asserted-by":"publisher","first-page":"4973","DOI":"10.3390\/electronics12244973","article-title":"Privacy-first paradigm for dynamic consent management systems: empowering data subjects through decentralized data controllers and Privacy-preserving techniques","volume":"12","author":"Khalid","year":"2023","journal-title":"Electronics"},{"key":"2025021914435852700_bib127"},{"key":"2025021914435852700_bib128","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/TSUSC.2023.3303180","article-title":"Privacy evaluation of blockchain-based privacy cryptocurrencies: a comparative analysis of Dash, Monero, Verge, Zcash, and Grin","volume":"8","author":"Zhang","year":"2023","journal-title":"IEEE Trans Sustain Comput"},{"key":"2025021914435852700_bib129","first-page":"1","article-title":"Unlocking user privacy: a privacy-focused cryptocurrencies framework for concealing transactions using zero-knowledge proofs (ZKPs)","volume":"102","author":"Almaiah","year":"2024","journal-title":"J Theor Appl Inf Technol"},{"key":"2025021914435852700_bib130","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198868422.003.0006","article-title":"The right to be forgotten","volume-title":"Data Subject Rights under the GDPR","author":"Vrabec","year":"2021","edition":"Online edn"},{"key":"2025021914435852700_bib131","first-page":"100129","article-title":"A systematic literature review of the tension between the GDPR and public blockchain systems","volume":"4","author":"Belen-Saglam","year":"2023","journal-title":"Blockchain: Res Appl"},{"key":"2025021914435852700_bib132","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198847977.003.0002","article-title":"Foundations of data protection law","volume-title":"The Right to Erasure in EU Data Protection Law","author":"Ausloos","year":"2020","edition":"Online edn"},{"key":"2025021914435852700_bib133"},{"key":"2025021914435852700_bib134","doi-asserted-by":"publisher","first-page":"4741","DOI":"10.3390\/math11234741","article-title":"Less is more: understanding network bias in proof-of-work blockchains","volume":"11","author":"Mao","year":"2023","journal-title":"Mathematics"},{"key":"2025021914435852700_bib135","doi-asserted-by":"publisher","first-page":"2480","DOI":"10.1016\/j.procs.2023.01.223","article-title":"Data protection governance framework: a silver bullet for blockchain-enabled applications","volume":"218","author":"Karisma","year":"2023","journal-title":"Procedia Comput Sci"},{"key":"2025021914435852700_bib136","doi-asserted-by":"publisher","first-page":"1230","DOI":"10.1117\/12.2675469","article-title":"Two major attacks on the Ethereum smart contract application layer","volume-title":"Third International Conference on Machine Learning and Computer Application (ICMLCA 2022)","author":"Yuan","year":"2023"},{"key":"2025021914435852700_bib137","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-60836-0_3","article-title":"Decentralized autonomous organization (DAO) fraud, hacks, and controversies","volume-title":"The Cryptocurrency and Digital Asset Fraud Casebook, Volume II","author":"Scharfman","year":"2024"},{"key":"2025021914435852700_bib138","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/ICWR61162.2024.10533322","article-title":"Comparative studies: blockchain technology applications in GDPR\u2014representing an applicability model","volume-title":"2024 10th International Conference on Web Research (ICWR)","author":"Khazaei","year":"2024"},{"key":"2025021914435852700_bib139","first-page":"1","article-title":"Case note: strengthening the role of Google? Recent developments in the right to be forgotten Case law of the CJEU (TU and RE vs. Google LLC, C-460\/20)","volume":"4","author":"Zelger","year":"2023","journal-title":"Glob Priv Law Rev"},{"key":"2025021914435852700_bib140"},{"key":"2025021914435852700_bib141","article-title":"Right to erasure","author":"Information Commissioner\u2019s Office"},{"key":"2025021914435852700_bib142","volume-title":"The Individual in EU Data Protection Law","author":"Nolan"},{"key":"2025021914435852700_bib143","doi-asserted-by":"publisher","first-page":"344","DOI":"10.4337\/9781035314751.00024","article-title":"Blockchain and privacy","volume-title":"FinTech","author":"Cooper","year":"2024"},{"key":"2025021914435852700_bib144","doi-asserted-by":"publisher","first-page":"81608","DOI":"10.1109\/ACCESS.2024.3406724","article-title":"Challenges and enablers for GDPR compliance: systematic literature review and future research directions","volume":"12","author":"Zaguir","year":"2024","journal-title":"IEEE Access"},{"key":"2025021914435852700_bib145","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ICBDS58040.2023.10346570","article-title":"Blockchain implementation with hyperledger fabric and approach for performance evaluation","volume-title":"2023 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS)","author":"Kaushal","year":"2023"},{"key":"2025021914435852700_bib146","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-0700-3_30","article-title":"Comprehensive analysis of enterprise blockchain: hyperledger Fabric\/Corda\/quorum: three different distributed ledger technologies for business","volume-title":"Mobile Radio Communications and 5G Networks, MRCN 2023, Lecture Notes in Networks and Systems, Vol 915","author":"Dar","year":"2024"},{"key":"2025021914435852700_bib147","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/s00766-024-00423-4","article-title":"Understanding the GDPR from a requirements engineering perspective\u2014a systematic mapping study on regulatory data protection requirements","volume":"29","author":"Negri-Ribalta","year":"2024","journal-title":"Requirements Eng"},{"key":"2025021914435852700_bib148","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198842187.003.0018","article-title":"Smart contracts: coding the transaction, decoding the legal debates","volume-title":"Regulating Blockchain: Techno-Social and Legal Challenges","author":"Brownsword","year":"2019","edition":"Online edn"},{"key":"2025021914435852700_bib149","doi-asserted-by":"publisher","first-page":"1391","DOI":"10.1080\/14782804.2022.2130193","article-title":"The right to privacy and an implication of the EU general Data Protection Regulation (GDPR) in Europe: challenges to the companies","volume":"31","author":"Bharti","year":"2023","journal-title":"J Contemp Eur Stud"},{"key":"2025021914435852700_bib150","volume-title":"Principles of Data Analytics","author":"Awasthi","year":"2023"},{"key":"2025021914435852700_bib152","first-page":"175","article-title":"Data controllers as Data fiduciaries: theory, definitions & burdens of proof","volume":"95","author":"Wilson","year":"2024","journal-title":"Univ Colo Law Rev"},{"key":"2025021914435852700_bib153","first-page":"166","article-title":"The right to be forgotten: google Spain as a benchmark for free speech versus privacy?","volume":"24","author":"Youm","year":"2023","journal-title":"Chicago J Int Law"},{"key":"2025021914435852700_bib154","doi-asserted-by":"publisher","first-page":"103858","DOI":"10.1016\/j.jnca.2024.103858","article-title":"AI-enhanced blockchain technology: a review of advancements and opportunities","volume":"225","author":"Ressi","year":"2024","journal-title":"J Netw Comput Appl"},{"key":"2025021914435852700_bib155","volume-title":"\u2018Commission staff working document on the free flow of data and emerging issues of the European data economy\u2019\u00a0SWD (2017) 2 final 13","author":"European Commission","year":"2017"},{"key":"2025021914435852700_bib156","doi-asserted-by":"publisher","first-page":"4838","DOI":"10.1109\/ACCESS.2023.3235838","article-title":"Reference architecture for blockchain-native distributed information system","volume":"11","author":"Aviv","year":"2023","journal-title":"IEEE Access"},{"key":"2025021914435852700_bib157","doi-asserted-by":"publisher","first-page":"146","DOI":"10.3390\/digital3030011","article-title":"Unlocking the power of digital commons: data cooperatives as a pathway for data sovereign, innovative and equitable digital communities","volume":"3","author":"B\u00fchler","year":"2023","journal-title":"Digital"},{"key":"2025021914435852700_bib158","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1177\/02683962221141456","article-title":"Building data management capabilities to address data protection regulations: learnings from EU-GDPR","volume":"38","author":"Labadie","year":"2023","journal-title":"J Inf Technol"},{"key":"2025021914435852700_bib159","article-title":"\u2018Recital 7: the framework is based on control and certainty\u2019","author":"GDPR-info.eu"},{"key":"2025021914435852700_bib160","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198826491.003.0001","article-title":"Background and evolution of the EU General Data Protection Regulation (GDPR)","volume-title":"The EU General Data Protection Regulation (GDPR): A Commentary","author":"Kuner","year":"2020","edition":"Online edn"},{"key":"2025021914435852700_bib161","doi-asserted-by":"publisher","first-page":"100159","DOI":"10.1016\/j.jjimei.2023.100159","article-title":"Monetisation of digital health data through a GDPR-compliant and blockchain enabled digital health data marketplace: a proposal to enhance patient\u2019s engagement with health data repositories","volume":"3","author":"Maher","year":"2023","journal-title":"Int J Inf Manag Data Insights"},{"key":"2025021914435852700_bib162","doi-asserted-by":"crossref","first-page":"103633","DOI":"10.1016\/j.jnca.2023.103633","article-title":"Blockchain for Healthcare systems: architecture, security challenges, trends and future directions","volume":"215","author":"Andrew","year":"2023","journal-title":"J Netw Comput Appl"},{"key":"2025021914435852700_bib163","doi-asserted-by":"publisher","first-page":"170","DOI":"10.3390\/healthcare11020170","article-title":"Sharing health information using a blockchain","volume":"11","author":"Elvas","year":"2023","journal-title":"Healthcare"},{"key":"2025021914435852700_bib164","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3653076","article-title":"Mapping distributed ledger technology characteristics to use cases in healthcare: a structured literature review","volume":"5","author":"Hu","year":"2024","journal-title":"ACM Trans Comput Healthcare"},{"key":"2025021914435852700_bib165","doi-asserted-by":"publisher","first-page":"6694","DOI":"10.3390\/app13116694","article-title":"Beneficiary contracts on a lightweight blockchain architecture using smart contracts: a smart healthcare system for medical records","volume":"13","author":"Avelar","year":"2023","journal-title":"Appl. Sci."},{"key":"2025021914435852700_bib166","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/bs.adcom.2023.04.002","article-title":"A review on cancer data management using blockchain: progress and challenges","volume":"131","author":"Ray","year":"2023","journal-title":"Adv Comput"},{"key":"2025021914435852700_bib167","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s10586-022-03582-7","article-title":"Blockchain for deep learning: review and open challenges","volume":"26","author":"Shafay","year":"2023","journal-title":"Cluster Comput"},{"key":"2025021914435852700_bib168","doi-asserted-by":"publisher","first-page":"268","DOI":"10.4337\/9781035314751.00021","article-title":"Governing the blockchain: what is the applicable law?","volume-title":"FinTech","author":"Territt","year":"2024"},{"key":"2025021914435852700_bib169","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/ICIIP61524.2023.10537672","article-title":"College management system using blockchain","volume-title":"2023 Seventh International Conference on Image Information Processing (ICIIP)","author":"Singla","year":"2023"},{"key":"2025021914435852700_bib170","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1201\/9781003430452-1","article-title":"Blockchain-based identity management system in the digital industry","volume-title":"Next-Gen Technologies in Computational Intelligence","author":"Gayathri","year":"2024"},{"key":"2025021914435852700_bib171","doi-asserted-by":"publisher","first-page":"165","DOI":"10.3390\/bdcc7040165","article-title":"ZeroTrustBlock: enhancing security, privacy, and interoperability of sensitive data through ZeroTrust permissioned blockchain","volume":"7","author":"Thantharate","year":"2023","journal-title":"Big Data Cognitive Comput"},{"key":"2025021914435852700_bib172","doi-asserted-by":"publisher","first-page":"3662","DOI":"10.1109\/TIFS.2023.3285489","article-title":"sChain: an efficient and secure solution for improving blockchain storage","volume":"18","author":"Wang","year":"2023","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"2025021914435852700_bib173","first-page":"157","article-title":"Are cryptocurrency transactions private in the European Union? Examining the effects of Regulation (EU) 2015\/847\u2019s Amendment, proposed Regulation (EU) 2021\/0241, and the General Data Protection Regulation","volume":"31","author":"Holland","year":"2023","journal-title":"Mich St Int Law Rev"},{"key":"2025021914435852700_bib174","first-page":"153","article-title":"Solutions to data protection challenges in distributed ledger and blockchain technologies: a combined legal and technical approach","volume-title":"Building Cybersecurity Applications with Blockchain and Smart Contracts","author":"Pov\u0161e","year":"2023"},{"key":"2025021914435852700_bib176","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1177\/14748851221110316","article-title":"Data-owning democracy: citizen empowerment through Data ownership","volume":"23","author":"Fischli","year":"2024","journal-title":"Eur J Polit Theory"},{"key":"2025021914435852700_bib177","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1201\/9781003399384_3","article-title":"The principal projects underpinning this work","volume-title":"Personal Data-Smart Cities: How Cities Can Utilise Their Citizen's Personal Data to Help Them Become Climate Neutral","author":"Garre","year":"2023"},{"key":"2025021914435852700_bib178","first-page":"136","article-title":"Worldcoin: a decentralized currency for a unified global economy","volume":"2","author":"George","year":"2023","journal-title":"Partn Univ Int Re J"},{"key":"2025021914435852700_bib179","first-page":"71","article-title":"Digital wallet adoption: worldcoin's impact on financial technology","volume":"14","author":"Kraiwanit","year":"2023","journal-title":"Adv Bus-Relat Sci Res J"},{"key":"2025021914435852700_bib180","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1016\/j.procs.2024.05.164","article-title":"Personhood global whispers: ethical echoes of decentralization?","volume":"237","author":"Rodrigues","year":"2024","journal-title":"Procedia Comput Sci"},{"key":"2025021914435852700_bib181","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ACCESS.2024.1234567","article-title":"Twin3: pluralistic personal digital twins via blockchain","author":"Wen","year":"2024","journal-title":"12 IEEE Access"},{"key":"2025021914435852700_bib182","doi-asserted-by":"crossref","first-page":"405","DOI":"10.56553\/popets-2023-0088","article-title":"Data security on the ground: investigating technical and legal requirements under the GDPR","volume":"2023","author":"Marjanov","year":"2023","journal-title":"PoPETs"},{"key":"2025021914435852700_bib183","doi-asserted-by":"publisher","first-page":"114","DOI":"10.3390\/info14020114","article-title":"Making sense of Solid for Data governance and GDPR","volume":"14","author":"Pandit","year":"2023","journal-title":"Information"},{"key":"2025021914435852700_bib184","doi-asserted-by":"publisher","first-page":"273","DOI":"10.7765\/9781526163042.00037","article-title":"Level 6 topic: data protection does not define privacy","volume-title":"The Seven Veils of Privacy","author":"O'Hara","year":"2023"},{"key":"2025021914435852700_bib185","doi-asserted-by":"publisher","first-page":"4389","DOI":"10.1287\/mnsc.2022.4614","article-title":"Privacy rights and data security: GDPR and personal data markets","volume":"69","author":"Ke","year":"2023","journal-title":"Manag Sci"},{"key":"2025021914435852700_bib186","doi-asserted-by":"crossref","first-page":"91","DOI":"10.4337\/9781035300884.00012","article-title":"Risks and the regulatory issues arising from the use of DLT","volume-title":"Financial Services Law and Distributed Ledger Technology","author":"McGurk","year":"2024"},{"key":"2025021914435852700_bib187"},{"key":"2025021914435852700_bib188","author":"Fashion ID GmbH & Co"},{"key":"2025021914435852700_bib189","doi-asserted-by":"crossref","first-page":"105932","DOI":"10.1016\/j.clsr.2023.105932","article-title":"Clarifying \u201cpersonal data\u201d and the role of anonymisation in data protection law including and excluding data from the scope of the GDPR (More Clearly) through refining the concept of data protection","volume":"52","author":"Rupp","year":"2024","journal-title":"Comput Law Secur Rev"},{"key":"2025021914435852700_bib190","doi-asserted-by":"crossref","DOI":"10.4324\/9781003502791","article-title":"Data-driven technologies\u2014challenges for privacy and EU Data Protection law","volume-title":"Privacy, Data Protection and Data-Driven Technologies","author":"Ebers","year":"2024"},{"key":"2025021914435852700_bib191","first-page":"113","article-title":"The data trust solution to data sharing problems","volume":"25","author":"Houser","year":"2023","journal-title":"Vand J Ent Technol Law"},{"key":"2025021914435852700_bib192","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3676164","article-title":"On identity, transaction, and smart contract privacy on permissioned and permissionless blockchain: a comprehensive survey","volume":"56","author":"Liang","year":"2024","journal-title":"ACM Comput Surv"},{"key":"2025021914435852700_bib193","doi-asserted-by":"crossref","first-page":"103622","DOI":"10.1016\/j.cose.2023.103622","article-title":"Analyzing transparency and malicious insiders prevention for cloud computing environment","volume":"137","author":"Rizvi","year":"2024","journal-title":"Comput Secur"},{"key":"2025021914435852700_bib194","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198826491.003.0035","article-title":"Article 6 lawfulness of processing","volume-title":"The EU General Data Protection Regulation (GDPR): A Commentary","author":"Kotschy","year":"2020"},{"key":"2025021914435852700_bib195","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1093\/idpl\/ipad022","article-title":"Transferring personal data to international organizations under the GDPR: an analysis of the transfer mechanisms","volume":"14","author":"Marelli","year":"2024","journal-title":"Int Data Priv Law"},{"key":"2025021914435852700_bib196","doi-asserted-by":"publisher","first-page":"105932","DOI":"10.1016\/j.clsr.2023.105932","article-title":"Clarifying \u201cpersonal data\u201d and the role of anonymisation in data protection law including and excluding data from the scope of the GDPR (More Clearly) through refining the concept of data protection","volume":"52","author":"Rupp","year":"2024","journal-title":"Comput Law Secur Rev"},{"key":"2025021914435852700_bib197","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780192899248.003.0005","article-title":"EU framework for transfers of personal data: critique and directions for reform","volume-title":"Governing Cross-Border Data Flows: Reconciling EU Data Protection and International Trade Law","author":"Yakovleva","year":"2024"},{"key":"2025021914435852700_bib198","doi-asserted-by":"publisher","first-page":"20","DOI":"10.35940\/ijmh.G1696.10070324","article-title":"Review on data privacy, protection, and security challenges in blockchain adoption across diverse domains","volume":"10","author":"Garg","year":"2024","journal-title":"IJMH"},{"key":"2025021914435852700_bib199","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2406.05084","article-title":"On ambiguity and the expressive function of law: the role of pragmatics in smart legal ecosystems","author":"Casanovas","year":"2024"},{"key":"2025021914435852700_bib200","doi-asserted-by":"publisher","first-page":"3881","DOI":"10.1109\/ACCESS.2023.3349019","article-title":"On the integration of artificial intelligence and blockchain technology: a perspective about security","volume":"12","author":"Kuznetsov","year":"2024","journal-title":"IEEE Access"},{"key":"2025021914435852700_bib201","doi-asserted-by":"crossref","first-page":"73","DOI":"10.51594\/ijarss.v6i1.733","article-title":"Privacy law challenges in the digital age: a global review of legislation and enforcement","volume":"6","author":"Reis","year":"2024","journal-title":"Int J Appl Res Soc Sci."},{"key":"2025021914435852700_bib202","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1080\/13600834.2023.2260687","article-title":"The regulation of cloud computing: why the European Union failed to get it right","volume":"33","author":"Bania","year":"2023","journal-title":"Inf Commun Technol Law"},{"key":"2025021914435852700_bib203","volume-title":"Data Protection and Privacy: Ideas That Drive Our Digital World","author":"Hallinan","year":"2024"},{"key":"2025021914435852700_bib204","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-41820-4_2","article-title":"Getting critical: making sense of the EU cybersecurity framework for cloud providers","volume-title":"Legal Developments on Cybersecurity and Related Fields,\u00a0Law, Governance and Technology Series","author":"Walden","year":"2024"},{"key":"2025021914435852700_bib205","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-43118-0_17","article-title":"Complying with the European Union General Data Protection Regulation (GDPR)","volume-title":"Information Security Planning","author":"Lincke","year":"2024"},{"key":"2025021914435852700_bib206","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1080\/13600869.2023.2269498","article-title":"Certification as guidance for data protection by design","volume":"38","author":"Koulierakis","year":"2023","journal-title":"Int Rev Law Comput Technol"},{"key":"2025021914435852700_bib207","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13132-024-02007-7","article-title":"Navigating the blockchain-driven transformation in industry 4.0: opportunities and challenges for economic and management innovations","volume":"15","author":"Wang","year":"2024","journal-title":"J Knowl Econ"},{"key":"2025021914435852700_bib208","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1007\/s11036-020-01646-9","article-title":"An analysis of blockchain and GDPR under the data lifecycle perspective","volume":"26","author":"Freund","year":"2021","journal-title":"Mobile Netw Appl"},{"key":"2025021914435852700_bib209","doi-asserted-by":"publisher","first-page":"100168","DOI":"10.1016\/j.hcc.2023.100168","article-title":"Redactable consortium blockchain with access control: leveraging chameleon hash and multi-authority attribute-based encryption","volume":"4","author":"Dong","year":"2024","journal-title":"High-Conf Comput"},{"key":"2025021914435852700_bib210","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1007\/s10207-023-00782-z","article-title":"Olympus: a GDPR compliant blockchain system","volume":"23","author":"Gon\u00e7alves","year":"2024","journal-title":"Int J Inf Secur"},{"key":"2025021914435852700_bib211","article-title":"Notus: dynamic proofs of liabilities from zero-knowledge RSA accumulators","author":"Xin","year":"2024","journal-title":"Cryptology ePrint Archive"},{"key":"2025021914435852700_bib212","volume-title":"Data Privacy and Protection: Embracing a Global Standard","author":"ESCAP, U","year":"2024"},{"key":"2025021914435852700_bib213","doi-asserted-by":"publisher","first-page":"lsae001","DOI":"10.1093\/jlb\/lsae001","article-title":"Purpose definition as a crucial step for determining the legal basis under the GDPR: implications for scientific research","volume":"11","author":"Becker","year":"2024","journal-title":"J Law Biosci"},{"key":"2025021914435852700_bib214","doi-asserted-by":"crossref","first-page":"eaae006","DOI":"10.1093\/ijlit\/eaae006","article-title":"Will the real data sovereign please stand up? An EU policy response to sovereignty in data spaces","volume":"32","author":"Ryan","year":"2024","journal-title":"Int J Law Inf Technol"},{"key":"2025021914435852700_bib215","doi-asserted-by":"crossref","volume-title":"Blockchain and the General Data Protection Regulation: Can Distributed Ledgers Be Squared with European Data Protection Law?","author":"Finck","DOI":"10.1017\/9781108609708.004"},{"key":"2025021914435852700_bib216","doi-asserted-by":"publisher","first-page":"4515","DOI":"10.1007\/s10586-022-03691-3","article-title":"Data governance through a multi-DLT architecture in view of the GDPR","volume":"25","author":"Zichichi","year":"2022","journal-title":"Cluster Comput"},{"key":"2025021914435852700_bib217","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1093\/idpl\/ipac018","article-title":"GDPR codes of conduct and their (extra)territorial features: a tale of two systems","volume":"12","author":"Vander\u00a0Maelen","year":"2022","journal-title":"Int Data Priv Law"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf002\/61986970\/tyaf002.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf002\/61986970\/tyaf002.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T14:44:41Z","timestamp":1739976281000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf002\/8024082"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":211,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf002","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf002"}}