PrivyKG: Security and Privacy Preservation of Knowledge Graphs Using BlockChain Technology
Abstract
Full Text:
PDFReferences
Wang Y., Yin X., Zhu H., Hei X.: A Blockchain Based Distributed Storage System for Knowledge Graph Security. In: Sun X., Wang J., Bertino E. (eds) Artificial Intelligence and Security. ICAIS 2020. Lecture Notes in Computer Science, vol 12240. Springer, Cham
Chen, C., Cui, J., Liu, G., Wu, J., Wang, L. (2020). Survey and Open Problems in Privacy Preserving Knowledge Graph: Merging, Query, Representation, Completion and Applications. ArXiv, abs/2011.10180.
Zyskind, G., Nathan, O., Pentland, A. (2015). Decentralizing Privacy: Using Blockchain to Protect Personal Data. 2015 IEEE Security and Privacy Workshops, 180-184.
Truong, N., Sun, K., Lee, G., & Guo, Y. (2020). GDPR-Compliant Personal Data Management: A Blockchain-Based Solution. IEEE Transactions on Information Forensics and Security, 15, 1746-1761.
Khemaissia, R., Derdour, M., Djeddai, A., & Ferrag, M. (2021). SDGchain: When Service Dependency Graph Meets Blockchain to Enhance Privacy. Proceedings of the 2021 ACM Workshop on Security and Privacy Analytics.
Bollacker, K., Evans, C., Paritosh, P.K., Sturge, T., & Taylor, J. (2008). Freebase: a collaboratively created graph database for structuring human knowledge. SIGMOD Conference.
Lehmann, J., Isele, R., Jakob, M., Jentzsch, A., Kontokostas, D., Mendes, P.N., Hellmann, S., Morsey, M., Kleef, P.V., Auer, S., & Bizer, C. (2015). DBpedia - A large-scale, multilingual knowledge base extracted from Wikipedia. Semantic Web, 6, 167-195.
Miller, G. (1995). WordNet: a lexical database for English. Commun. ACM, 38, 39-41.
Nakamoto, S. (2009). Bitcoin: A Peer-to-Peer Electronic Cash System.
Chen, H., Hu, N., Qi, G., Wang, H., Bi, Z., Li, J., & Yang, F. (2021). OpenKG Chain: A Blockchain Infrastructure for Open Knowledge Graphs. Data Intelligence, 1–18.
Wang, S., Huang, C., Li, J., Yuan, Y., Wang, F. (2019). "Decentralized Construction of Knowledge Graphs for Deep Recommender Systems Based on Blockchain-Powered Smart Contracts". In: IEEE Access, vol. 7, pp. 136951-136961.
Abu-Naim, B., & Klas, W. (2019). Knowledge Graph-Enhanced Blockchains by Integrating a Graph-Data Service-Layer. 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), 420-427.
Cimmino, A., García-Castro, R., & Cano-Benito, J. (2020). Benchmarking the efficiency of RDF-based access for blockchain environments. SEKE.
Tuán, A., Hingu, D., Hauswirth, M., & Le-Phuoc, D. (2019). Incorporating Blockchain into RDF Store at the Lightweight Edge Devices. SEMANTiCS.
Zhang B., Li X., Ren H., Gu J. (2020) Semantic Knowledge Sharing Mechanism Based on Blockchain. In: Liu Y., Wang L., Zhao L., Yu Z. (eds) Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery. ICNC-FSKD 2019. Advances in Intelligent Systems and Computing, vol 1075. Springer, Cham.
Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., Caro, A.D., Enyeart, D., Ferris, C., Laventman, G., Manevich, Y., Muralidharan, S., Murthy, C., Nguyen, B., Sethi, M., Singh, G., Smith, K.A., Sorniotti, A., Stathakopoulou, C., Vukolic, M., Cocco, S.W., & Yellick, J. (2018). Hyperledger fabric: a distributed operating system for permissioned blockchains. Proceedings of the Thirteenth EuroSys Conference.
R. L. Rivest, A. Shamir, and L. Adleman. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (Feb. 1978), 120–126. https://doi.org/10.1145/359340.359342
Araki, K., Satoh, T., Miura, S. (1998). Overview of elliptic curve cryptography. In: Imai, H., Zheng, Y. (eds) Public Key Cryptography. PKC 1998. Lecture Notes in Computer Science, vol 1431. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0054012.
CREMONEZI, BRUNO, Borges, Alex, Miranda Nacif, José and Nogueira, Michele. (2020). Survey on Identity and Access Management for Internet of Things. https://doi.org/10.21203/rs.3.rs-66793/v1.
A. Djeddai and R. Khemaissia, "Keeping the Privacy and the Security of the Knowledge Graph Completion Using Blockchain Technology," 2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS), 2022, pp. 1-6, https://doi.org/10.1109/PAIS56586.2022.9946869.
A. Narayanan and V. Shmatikov, "Robust De-anonymization of Large Sparse Datasets," 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008, pp. 111-125, http://doi: 10.1109/SP.2008.33.
Latanya Sweeney. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05):557–570, 2002.
Cynthia Dwork. Differential privacy. In Automata, languages and programming, pages 1–12. Springer, 2006.
Lehmann, J., Isele, R., Jakob, M., Jentzsch, A., Kontokostas, D., Mendes, P.N., Hellmann, S., Morsey, M., Kleef, P.V., Auer, S., & Bizer, C. (2015). DBpedia - A large-scale, multilingual knowledge base extracted from Wikipedia. Semantic Web, 6, 167-195.
Djeddai, A. (2022). KGChain: A Blockchain-Based Approach to Secure the Knowledge Graph Completion. In: Chbeir, R., Manolopoulos, Y., Prasath, R. (eds) Mining Intelligence and Knowledge Exploration. MIKE 2021. Lecture Notes in Computer Science(), vol 13119. Springer, Cham. https://doi.org/10.1007/978-3-031-21517-9_22.
DOI: https://doi.org/10.31449/inf.v47i5.4698
This work is licensed under a Creative Commons Attribution 3.0 License.