Page 29 - ITU Journal - ICT Discoveries - Volume 1, No. 2, December 2018 - Second special issue on Data for Good
P. 29

ITU JOURNAL: ICT Discoveries, Vol. 1(2), December 2018




          Article 17 of the GDPR regulation, "Data Erasure",   REFERENCES
          entitles data subjects to the "right to be forgotten"
          [13]. This privacy right "entitles the data subject to   [1]   J.L.  Larmouth,  “ASN.1  Complete,”  San
          have  the  data  controller  erase  his/her  personal      Francisco:  Morgan  Kaufmann  Publishers,
          data" [13]. Careful data architecture design, where        2000.  Retrieved  March  17,  2018,  from
          the privacy sensitive data of an individual is stored      http://www.oss.com/asn1/resources/books
          in one or more ephemeral sidechains, would make            -whitepapers-pubs/larmouth-asn1-book.pdf
          it possible for a SignedData blockchain application
          to comply with a data erasure request. Compliance    [2]   ITU-T  X.680,  "Information  Technology  –
          would  simply  require  deleting  any  sidechains          Abstract  Syntax  Notation  One  (ASN.1)
          containing data subject information.                       Specification of basic notation," 2017.

          6.   CONCLUSION                                      [3]   P.H.  Griffin,  "Telebiometric  Security  and
                                                                     Safety  Management,"  Proceedings  of  ITU
          In this paper blockchain blocks constructed using the      Kaleidoscope  2013  Conference  –  Building
          cryptographic message syntax SignedData type were          Sustainable Communities, Kyoto, Japan, 2013.
          described. These blocks  were specified using  the
          ASN.1 schema definition language, a standard for the   [4]   S.  Nakamoto,  "Bitcoin:  A  Peer-To-Peer
          generation  of  programming  language  tools  from         Electronic Cash System," 2008.
          ASN.1  syntax.  ASN.1  provides  applications  with
          platform-independent information exchange that can   [5]   A. Narayanan, J. Bonneau, E. Felten, A. Miller,
          enhace the chances of interworking systems.                & S. Goldfeder, "Bitcoin and Cryptocurrency
                                                                     Technologies:  A  Comprehensive  Intro-
          Signed attributes required by the CMS standard or          duction", Princeton University Press, 2016.
          needed  to  implement  a  Bitcoin  style  blockchain
          were  described  in  this  paper  using  ASN.1.  Two   [6]   ITU-T X.672, "Information technology – Open
          types  of  sidechains  and  their  schema  were  also      systems  interconnection  –  Object  identifier
          described,  fixed  and  ephemeral.  The  paper             resolution system (ORS)".
          discussed how fixed sidechain attributes could be
          cryptographically  bound  to  a  parent  blockchain   [7]   Accredited  Standards  Committee  (ASC)  X9
          block under a digital signature.                           F  i  n  a  n  c  a  l     S  e  r  v  i  c  e  s  ,     "  A  m  e  r  i  c  a  n     N  a  t  i  o  n  a  l
                                                                     Standard  (ANS)  X9.95  Trusted  Time  Stamp
          Ephemeral sidechains loosely coupled to a parent           Management and Security", 2016.
          block  using  an  e-block  header  SignerInfo  value
          were shown to  be  operationally disjoint from the   [8]   Opportunities and Use Cases for Distributed
          block header used to hash-link a parent block to its       Ledger  Technologies  in  IoT.  GSMA  (2018).
          blockchain.  The  paper  described  how  ephemeral         Retrieved  September  22,  2018,  from
          sidechains  could  be  added  to  or  deleted  from  a     https://www.gsma.com/iot/opportunities-
          parent block at any time without affecting the data        and-use-cases-for-distributed-ledger-techno-
          integrity  of  the  parent  blockchain.  This  feature     logies-in-iot/
          could  be  used  to  design  blockchain  systems  that
          could  comply  with  the  requirements  of  privacy   [9]   K.  Samani,  "Models  for  Scaling  Trustless
          regulations.                                               Computation," MultiCoin Capital , 2018.

          ACKNOWLEDGEMENT                                      [10]  J. Dilley, A. Poelstra, J. Wilkins, M. Piekarska,
                                                                     B.  Gorlick,  &  M.  Friedenbach,  "Strong

          This paper could not have been produced without            Federations:  An  Interoperable  Blockchain
          the guidance and influence of Bancroft Scott, who          Solution  to  Centralized  Third  Party  Risks,"
          led me to a new world of intellectual opportunities,       arXiv preprint arXiv:1612.05491,  2016.
          and John Larmouth, who encouraged me to dream              Cornell University Library Cryptography and
          of  new  things  and  taught  me  how  to  make  them      Security archive.
          real. Special thanks to OSS Nokalva for use of the
          ASN.1 tools used to perfect the schema available at
          http://phillipgriffin.com/SignedDataBlocks.asn.




                                             © International Telecommunication Union, 2018                     7
   24   25   26   27   28   29   30   31   32   33   34