{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:49:31Z","timestamp":1767340171073,"version":"3.41.0"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T00:00:00Z","timestamp":1686182400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Distrib. Ledger Technol."],"published-print":{"date-parts":[[2023,6,30]]},"abstract":"<jats:p>\n            <jats:bold>Distributed ledger technology (DLT)<\/jats:bold>\n            , including blockchain, has a number of properties that make it useful for distributed systems. However, the immutability of blockchain and most forms of DLT make it impossible to delete data, as is required for compliance with many privacy rules regarding personally identifiable information. Thus, there is a need for DLT that can provide the integrity-preserving property of DLT while also allowing support for privacy rules. The\n            <jats:bold>data block matrix (DBM)<\/jats:bold>\n            is a variant of distributed ledger technology. It provides the integrity assurance of blockchain but allows for controlled revision or deletion of data. This property is essential for using DLT in applications that must guarantee privacy requirements by the deleting of a user's private data at their request. The DBM design solves the blockchain privacy conflict thus expanding the range of blockchain applications by also allowing exception management. It has been implemented and is available (\n            <jats:ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"https:\/\/csrc.nist.gov\/projects\/redactable-distributed-ledger\">https:\/\/csrc.nist.gov\/projects\/redactable-distributed-ledger<\/jats:ext-link>\n            ) as a configurable option for\n            <jats:bold>Hyperledger Fabric (HF)<\/jats:bold>\n            , with a proof-of-concept application for data sharing in a health care environment. Other potential applications include logistics management and digital currency. This paper will cover the DBM properties and data structure, the DBM implementation in HF, and a use case and application design of the DBM implementation using the pharmaceutical industry supply chain.\n          <\/jats:p>","DOI":"10.1145\/3585539","type":"journal-article","created":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T12:03:22Z","timestamp":1677499402000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Data Block Matrix and Hyperledger Implementation: Extending Distributed Ledger Technology for Privacy Requirements"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8955-1375","authenticated-orcid":false,"given":"Joshua D.","family":"Roberts","sequence":"first","affiliation":[{"name":"National Institute of Standards and Technology"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8966-5532","authenticated-orcid":false,"given":"Joanna F.","family":"Defranco","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0050-1596","authenticated-orcid":false,"given":"D. Richard","family":"Kuhn","sequence":"additional","affiliation":[{"name":"National Institute of Standards and Technology"}]}],"member":"320","published-online":{"date-parts":[[2023,6,8]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"S. Nakamoto. 2008. Bitcoin: A Peer-to-Peer electronic cash system. (2008). https:\/\/bitcoin.org\/bitcoin.pdf. [Accessed 5-16-22]."},{"key":"e_1_3_1_3_2","first-page":"1361","article-title":"The distributed liability of distributed ledgers: Legal risks of blockchain","author":"Zetzsche Dirk A.","year":"2018","unstructured":"Dirk A. Zetzsche, Ross P. Buckley, and Douglas W. Arner. 2018. The distributed liability of distributed ledgers: Legal risks of blockchain. U. Ill. L. Rev. (2018), 1361.","journal-title":"U. Ill. L. Rev."},{"key":"e_1_3_1_4_2","article-title":"Blockchain: Disrupting data protection?","author":"Chang Henry","year":"2017","unstructured":"Henry Chang. 2017. Blockchain: Disrupting data protection? Privacy Law and Business International Report, (November 2017).","journal-title":"Privacy Law and Business International Report"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS.2019.8728524"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.37"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2019.2898162"},{"key":"e_1_3_1_8_2","article-title":"A data structure for integrity protection with erasure capability","author":"Richard Kuhn D.","year":"2018","unstructured":"D. Richard Kuhn. 2018. A data structure for integrity protection with erasure capability. NIST Cybersecurity Whitepaper (2018). https:\/\/admin.cms.csrc.nist.gov\/csrc\/media\/Projects\/enhanced-distributed-ledger-technology\/documents\/NIST.CSWP.25.pdf.","journal-title":"NIST Cybersecurity Whitepaper"},{"key":"e_1_3_1_9_2","unstructured":"European Telecommunications Standards Institute Introduction to Permissioned Distributed Ledger (PDL) 2022. [accessed 5\/11\/22]."},{"key":"e_1_3_1_10_2","unstructured":"European Telecommunications Standards Institute IPv6 Security Cybersecurity Blockchain ETSI GR IP6 031 V1.1.1 (Tech. Rpt. 2020). [accessed 5\/11\/22]."},{"key":"e_1_3_1_11_2","unstructured":"European Telecommunications Standards Institute standards work item: IPv6 and Cloud using DataBlockMatrix for Food Supply Chain Tracking and Tracing IPv6-based DataBlockMatrix [accessed 5\/11\/22]."},{"key":"e_1_3_1_12_2","unstructured":"GDPR Recital 26. Regulation 2016\/679 of the European Parliament and of the Council on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Advancement of Such Data and repealing Directive 95\/46\/EC 2016 O.J. L 119\/1."},{"key":"e_1_3_1_13_2","article-title":"Will blockchain run afoul of GDPR? Yes and No","year":"2018","unstructured":"L. Mearian. 2018. Will blockchain run afoul of GDPR? Yes and No. Computerworld, 2018. https:\/\/www.computerworld.com\/article\/3269750\/will-blockchain-run-afoul-of-gdpr-yes-and-no.html.","journal-title":"Computerworld"},{"key":"e_1_3_1_14_2","unstructured":"EPRS | European. 2019. Parliamentary Research Service Scientific Foresight Unit (STOA) PE 634.445 \u2013 July 2019 2023 https:\/\/www.europarl.europa.eu\/RegData\/etudes\/STUD\/2019\/634445\/EPRS_STU(2019)634445_EN.pdf."},{"key":"e_1_3_1_15_2","unstructured":"D. Kelleher. 2016. In Breyer decision today Europe's highest court rules on definition of personal data. Oct. 19 2016. https:\/\/iapp.org\/news\/a\/in-breyer-decision-today-europes-highest-court-rules-on-definition-of-personal-data\/."},{"key":"e_1_3_1_16_2","unstructured":"Breyer v. Germany. https:\/\/curia.europa.eu\/juris\/document\/document.jsf?text=&docid=184668&pageIndex=0&doclang=en&mode=lst&dir=&occ=first&part=1&cid=1116945."},{"key":"e_1_3_1_17_2","unstructured":"Baker-Hostetler Five Things Blockchain Companies Need to Know About the GDPR. https:\/\/www.bakerlaw.com\/webfiles\/Privacy\/2018\/Brief\/Five-Things-Blockchain-Cos-Need-to-Know-About-GDPR.pdf."},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00039"},{"key":"e_1_3_1_19_2","unstructured":"Christian Cachin.  2018. Hyperledger Fabric: A distributed operating system for permissioned blockchains. 2018. https:\/\/arxiv.org\/abs\/1801.10228v2. [accessed 10\/17\/2022]."},{"key":"e_1_3_1_20_2","unstructured":"Hyperledger Fabric [Source code]. https:\/\/github.com\/hyperledger\/fabric\/tree\/release-2.3."},{"key":"e_1_3_1_21_2","unstructured":"World Health Organization. 2017. 1 in 10 medical products in developing countries is substandard or falsified. 2019. November 28 2017 https:\/\/www.who.int\/news-room\/detail\/28-11-2017-1-in-10-medical-products-in-developing-countries-is-substandard-orfalsified. [Accessed 2-16-22]."},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2021.3049330"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1080\/14740338.2017.1313227"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.2196\/10163"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICE\/ITMC52061.2021.9570251"},{"key":"e_1_3_1_26_2","first-page":"772","volume-title":"2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)","author":"Bocek Thomas","unstructured":"Thomas Bocek, Bruno B. Rodrigues, Tim Strasser, and Burkhard Stiller. Blockchains everywhere - A use-case of blockchains in the pharma supplychain. In 2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM). IEEE, 772\u2013777."},{"key":"e_1_3_1_27_2","first-page":"45","volume-title":"2019 IEEE International Conference on Intelligent Systems and Green Technology (ICISGT)","author":"Botcha Krishna Mohan","unstructured":"Krishna Mohan Botcha, Vedula VSSS Chakravarthy, et al. Enhancing traceability in pharmaceutical supply chain using internet of things (IoT) and blockchain. In 2019 IEEE International Conference on Intelligent Systems and Green Technology (ICISGT). IEEE, 45\u201348."},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3049920"},{"key":"e_1_3_1_29_2","first-page":"1","volume-title":"2019 10th International Conference on Computing Communication and Networking Technologies (ICCCNT)","author":"Jangir Sandip","unstructured":"Sandip Jangir, Ajit Muzumdar, Alok Jaiswal, Chirag N. Modi, Sheetal Chandel, and C. Vyjayanthi. A novel framework for pharmaceutical supply chain management using distributed ledger and smart contracts. In 2019 10th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 1\u20137."},{"key":"e_1_3_1_30_2","unstructured":"S. Wiley and J. Barwig. 2020. California law requires legal compliance scrutiny to maintain pharma data sharing PharmExec. com 2020. https:\/\/www.pharmexec.com\/view\/california-law-requires-legal-compliance-scrutiny-maintain-pharma-data-sharing. [accessed 5\/10\/22]."},{"key":"e_1_3_1_31_2","unstructured":"Buckley Virginia Passes Amendments on CDPA for Data Deletion Buckley March 3 2022 https:\/\/buckleyfirm.com\/blog\/2022-03-03\/virginia-passes-amendments-cdpa-data-deletion. [accessed 5\/10\/22]."},{"key":"e_1_3_1_32_2","first-page":"1","article-title":"GDPR: The end of Google and Facebook or a new paradigm in data privacy","volume":"25","author":"Houser K. A.","year":"2018","unstructured":"K. A. Houser and W. G. Voss. 2018. GDPR: The end of Google and Facebook or a new paradigm in data privacy. Rich. JL & Tech. 25 (2018), 1.","journal-title":"Rich. JL & Tech."},{"key":"e_1_3_1_33_2","first-page":"101","article-title":"Binding Effects of the European General Data Protection Regulation (GDPR) on US Companies","volume":"11","author":"Klar M.","year":"2020","unstructured":"M. Klar. 2020. Binding Effects of the European General Data Protection Regulation (GDPR) on US Companies. Hastings Sci. & Tech. LJ 11 (2020), 101.","journal-title":"Hastings Sci. & Tech. LJ"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1093\/jlb\/lsz013"},{"key":"e_1_3_1_35_2","first-page":"93","article-title":"An American's guide to the GDPR","volume":"98","author":"Jones M. L.","year":"2020","unstructured":"M. L. Jones and M. E. Kaminski. 2020. An American's guide to the GDPR. Denv. L. Rev. 98 (2020), 93.","journal-title":"Denv. L. Rev."},{"key":"e_1_3_1_36_2","unstructured":"INCITS INCITS 565-2020-Information Technology \u2013 Next Generation Access Control 4\/24\/2020 https:\/\/standards.incits.org\/apps\/group_public\/project\/details.php?project_id=2328."},{"key":"e_1_3_1_37_2","article-title":"A comparison of attribute based access control (ABAC) standards for data service applications","author":"Ferraiolo D.","year":"2016","unstructured":"D. Ferraiolo, R. Chandramouli, V. Hu, and R. Kuhn. 2016. A comparison of attribute based access control (ABAC) standards for data service applications. NIST Special Publication 800\u2013178, October 2016. https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-178.pdf. [accessed 5\/10\/22].","journal-title":"NIST Special Publication"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2021.9355049"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2021.3049888"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2950872"},{"key":"e_1_3_1_41_2","volume-title":"Distributed Ledger with Secure Data Deletion\u2014Revision 1.4","author":"Demianets V.","year":"2016","unstructured":"V. Demianets and A. Kanakakis, Distributed Ledger with Secure Data Deletion\u2014Revision 1.4. Stockholm, Sweden, 2016. https:\/\/github.com\/TarantulaTechnology\/Documents-Blockchain-vol-002\/blob\/master\/Distributed%20Ledger%20With%20Secure%20Data%20Deletion.pdf."}],"container-title":["Distributed Ledger Technologies: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3585539","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3585539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:08Z","timestamp":1750178768000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3585539"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,8]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,6,30]]}},"alternative-id":["10.1145\/3585539"],"URL":"https:\/\/doi.org\/10.1145\/3585539","relation":{},"ISSN":["2769-6472","2769-6480"],"issn-type":[{"type":"print","value":"2769-6472"},{"type":"electronic","value":"2769-6480"}],"subject":[],"published":{"date-parts":[[2023,6,8]]},"assertion":[{"value":"2022-10-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-02-13","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}