{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:35:15Z","timestamp":1761744915894,"version":"build-2065373602"},"reference-count":39,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T00:00:00Z","timestamp":1549324800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>An essential requirement of any information management system is to protect data and resources against breach or improper modifications, while at the same time ensuring data access to legitimate users. Systems handling personal data are mandated to track its flow to comply with data protection regulations. We have built a novel framework that integrates semantically rich data privacy knowledge graph with Hyperledger Fabric blockchain technology, to develop an automated access-control and audit mechanism that enforces users\u2019 data privacy policies while sharing their data with third parties. Our blockchain based data-sharing solution addresses two of the most critical challenges: transaction verification and permissioned data obfuscation. Our solution ensures accountability for data sharing in the cloud by incorporating a secure and efficient system for End-to-End provenance. In this paper, we describe this framework along with the comprehensive semantically rich knowledge graph that we have developed to capture rules embedded in data privacy policy documents. Our framework can be used by organizations to automate compliance of their Cloud datasets.<\/jats:p>","DOI":"10.3390\/cryptography3010007","type":"journal-article","created":{"date-parts":[[2019,2,6]],"date-time":"2019-02-06T03:03:05Z","timestamp":1549422185000},"page":"7","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Automating Privacy Compliance Using Policy Integrated Blockchain"],"prefix":"10.3390","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6354-1686","authenticated-orcid":false,"given":"Karuna Pande","family":"Joshi","sequence":"first","affiliation":[{"name":"Department of Information Systems, University of Maryland Baltimore County, Baltimore, MD 21250, USA"}]},{"given":"Agniva","family":"Banerjee","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, MD 21250, USA"}]}],"member":"1968","published-online":{"date-parts":[[2019,2,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/TSC.2012.41","article-title":"Automating Cloud Services Life Cycle through Semantic Technologies","volume":"7","author":"Joshi","year":"2014","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Gupta, A., Mittal, S., Joshi, K.P., Pearce, C., and Joshi, A. (2016, January 2\u201327). Streamlining Management of Multiple Cloud Services. Proceedings of the 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), San Francisco, CA, USA.","DOI":"10.1109\/CLOUD.2016.0070"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Mittal, S., Joshi, K.P., Pearce, C., and Joshi, A. (2016, January 4\u20138). Automatic extraction of metrics from SLAs for cloud service management. Proceedings of the 2016 IEEE International Conference on Cloud Engineering (IC2E), Berlin, Germany.","DOI":"10.1109\/IC2E.2016.14"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Joshi, K., Gupta, A., Mittal, S., Pearce, C., Joshi, A., and Finin, T. (2016, January 5\u20138). Semantic Approach to Automating Management of Big Data Privacy Policies. Proceedings of the IEEE International Conference on Big Data (Big Data), Washington, DC, USA.","DOI":"10.1109\/BigData.2016.7840639"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Banerjee, A., and Joshi, K.P. (2017, January 11\u201314). Link before you share: Managing privacy policies through blockchain. Proceedings of the 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, USA.","DOI":"10.1109\/BigData.2017.8258482"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Kim, H., and Laskowski, M. (2018). Toward an Ontology-Driven Blockchain Design for Supply-Chain Provenance, Intelligent Systems in Accounting, Finance and Management, Wiley Online Library.","DOI":"10.1002\/isaf.1424"},{"key":"ref_7","unstructured":"(2019, February 04). TOVE Ontologies. Available online: http:\/\/www.eil.utoronto.ca\/theory\/enterprise-modelling\/tove\/."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Zyskind, G., Nathan, O., and Pentland, A. (2015, January 21\u201322). Decentralizing Privacy: Using Blockchain to Protect Personal Data. Proceedings of the 2015 IEEE Security and Privacy Workshops, San Jose, CA, USA.","DOI":"10.1109\/SPW.2015.27"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., and Papamanthou, C. (2016, January 22\u201326). Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA.","DOI":"10.1109\/SP.2016.55"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Sutton, A., and Samavi, R. (2017). Blockchain Enabled Privacy Audit Logs. The Semantic Web\u2014ISWC 2017, ISWC 2017, Lecture Notes in Computer Science, Springer.","DOI":"10.1007\/978-3-319-68288-4_38"},{"key":"ref_11","first-page":"196","article-title":"A privacy agent in context-aware ubiquitous computing environments","volume":"Volume 4237","author":"Leitold","year":"2006","journal-title":"CMS 2006. LNCS"},{"key":"ref_12","unstructured":"Byun, J., and Li, N. (2015, January 1\u20133). Purpose based access control of complex data for privacy protection. Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, Vienna, Austria."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"de Montjoye, Y.V., Shmueli, E., Wang, S.S., and Pentlan, A.S. (2014). openPDS: Protecting the privacy of metadata through safeanswers. PLOS ONE, 9.","DOI":"10.1371\/journal.pone.0098790"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Chen, L., and Hoang, D.B. (2011, January 2\u20134). Novel Data Protection Model in Healthcare Cloud. Proceedings of the 2011 IEEE 13th International Conference on High Performance Computing and Communications (HPCC), Banff, AB, Canada.","DOI":"10.1109\/HPCC.2011.148"},{"key":"ref_15","unstructured":"(2019, February 04). OAuth Protocol. Available online: https:\/\/tools.ietf.org\/html\/rfc6749."},{"key":"ref_16","unstructured":"Belaazi, M., Rahmouni, H.B., and Bouhoula, A. (2015, January 20\u201322). An Ontology Regulating Privacy Oriented Access Controls. Proceedings of the International Conference on Risks and Security of Internet and Systems (CRiSIS 2015), Mytilene, Greece."},{"key":"ref_17","unstructured":"Jansen, W., and Grance, T. (2019, February 04). NIST SP 800-144 Guidelines on Security and Privacy in Public Cloud Computing, Available online: http:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-144.pdf."},{"key":"ref_18","unstructured":"(2019, February 04). NIST SP 800-53, Available online: http:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-53r4.pdf."},{"key":"ref_19","unstructured":"(2019, February 04). NIST Special Publication 800-122, Guide to Protecting the Confidentiality of Personally Identifiable Information (PII), Available online: http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-122\/sp800-122.pdf."},{"key":"ref_20","unstructured":"(2019, January 21). Regulation 2016\/679 of the European Parliament. Available online: https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679."},{"key":"ref_21","unstructured":"(2019, February 04). European Commission, Protection of Personal Data. Available online: https:\/\/ec.europa.eu\/info\/law\/law-topic\/data-protection_en."},{"key":"ref_22","unstructured":"(2019, February 04). Privacy Alliance. Available online: http:\/\/www.privacyalliance.org\/resources\/ppguidelines\/."},{"key":"ref_23","unstructured":"(2019, February 04). Federal Trade Commission (FTC), Available online: https:\/\/www.ftc.gov\/tips-advice\/business-center\/privacy-and-security."},{"key":"ref_24","unstructured":"Beesley, C. (2019, February 04). 7 Considerations for Crafting an Online Privacy Policy. U.S.S.B.A. (United States Small Business Administration), Available online: https:\/\/www.sba.gov\/blogs\/7-considerations-crafting-online-privacy-policy."},{"key":"ref_25","unstructured":"(2019, February 04). The Truth about Blockchain, Harvard Business Reviews. Available online: https:\/\/hbr.org\/2017\/01\/the-truth-about-blockchain."},{"key":"ref_26","first-page":"2008","article-title":"Bitcoin: A peer-to-peer electronic cash system","volume":"28","author":"Nakamoto","year":"2012","journal-title":"Consulted"},{"key":"ref_27","unstructured":"(2019, February 04). Hyperledger Project. Available online: https:\/\/www.hyperledger.org\/."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1145\/363951.363955","article-title":"A new approach to developing and implementing eager database replication protocols","volume":"25","author":"Kemme","year":"2000","journal-title":"ACM Trans. Database Sys."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., and Manevich, Y. (2018, January 23\u201326). Hyperledger fabric: A distributed operating system for permissioned blockchains. Proceedings of the Thirteenth EuroSys Conference (EuroSys \u201918), Porto, Portugal.","DOI":"10.1145\/3190508.3190538"},{"key":"ref_30","unstructured":"Lassila, O., and Swick, R. (2019, February 04). Resource Description Framework (RDF) Model and Syntax Specification. Available online: https:\/\/www.w3.org\/TR\/1999\/REC-rdf-syntax-19990222\/."},{"key":"ref_31","unstructured":"McGuinness, D., and van Harmelen, F. (2019, February 04). OWL Web Ontology Language Overview. Available online: https:\/\/www.w3.org\/TR\/owl-features\/."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Elluri, L., Nagar, A., and Joshi, K.P. (2018, January 10\u201313). An Integrated Knowledge Graph to Automate GDPR and PCI DSS Compliance. Proceedings of the IEEE International Conference on Big Data, Seattle, WA, USA.","DOI":"10.1109\/BigData.2018.8622236"},{"key":"ref_33","unstructured":"(2019, February 04). ACL COLING Dataset. Available online: https:\/\/usableprivacy.org\/data."},{"key":"ref_34","unstructured":"Lieberman, J., Singh, R., and Goad, C. (2019, February 04). W3C Geospatial Ontologies. Available online: https:\/\/www.w3.org\/2005\/Incubator\/geo\/XGR-geo-ont\/."},{"key":"ref_35","unstructured":"Joshi, K. (2019, February 04). Ontology for Data Privacy Policy. Available online: http:\/\/ebiquity.umbc.edu\/resource\/html\/id\/370\/Ontology-for-DataPrivacy-Policy."},{"key":"ref_36","unstructured":"(2019, February 04). State Laws related to Internet Privacy. Available online: http:\/\/www.ncsl.org\/research\/telecommunications-and-informationtechnology\/state-laws-related-to-internet-privacy.aspx."},{"key":"ref_37","unstructured":"EDM Council (2019, February 04). Financial Industry Business Ontology (FIBO). Available online: https:\/\/spec.edmcouncil.org\/fibo\/."},{"key":"ref_38","unstructured":"Finin, T., Joshi, A., Kagal, L., Niu, J., Sandhu, R., Winsborough, W., and Thuraisingham, B. (2008, January 11\u201313). ROWLBAC\u2014Representing Role Based Access Control in OWL. Proceedings of the 13th Symposium on Access Control Models and Technologies, Estes Park, CO, USA."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Sharma, N.K., and Joshi, A. (2016, January 4\u20136). Representing Attribute Based Access Control Policies in OWL. Proceedings of the ICSC, Laguna Hills, CA, USA.","DOI":"10.1109\/ICSC.2016.16"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/3\/1\/7\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:31:10Z","timestamp":1760185870000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/3\/1\/7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,5]]},"references-count":39,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,3]]}},"alternative-id":["cryptography3010007"],"URL":"https:\/\/doi.org\/10.3390\/cryptography3010007","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2019,2,5]]}}}