Blockchain Technology Can Solve User Data Privacy Issues

2018-12-17 16:53

Lucy Wang believes that blockchain technology holds the key to the actualization of robust data security for the digital landscape. The Lambda co-founder made the call recently while talking about the recent Marriott Hotel data breach.

Data Breaches Aplenty

Breaches that end up compromising user data aren’t a new phenomenon on the internet. Almost every website with a significant volume of user information has fallen victim to hackers and other cybercrime syndicates.

Recently, Marriott International Hotel Group became the latest prominent name to admit being victims numerous data breaches. A statement released by the company said that as many as 500 million customers had been affected by multiple hacks beginning in 2014.

By the company’s admission, hackers successfully compromised user information such as credit card details, addresses, and even passport information. How could this happen? Well, all that data found its way unto centralized servers, providing a single point of failure that could be exploited by agents on the internet.

There are many within the decentralized technology landscape like Wang who believes that blockchain technology offers a solution to this problem. However, before going into such details, why should we even care?

Data is Valuable

Data is the currency of the digital economy, and as such, data is valuable. However, the present construct of the internet places user data in the hands of corporations that can pretty much do whatever they like with our precious information. They can sell them to the government (for surveillance) or to other companies (for targetted advertisements) both of which are horrible exploitation of user privacy.

In the process of shopping, browsing websites, watching YouTube videos, reading various social information on the e-commerce platform, the algorithm will secretly monitor our behavior, and also collect our various data. In a sense, “data and the algorithm “knows” us more than ourselves. They know that we prefer juice or cola, we like beautiful models or men with eight packs of abdominal muscles. Like this Marriott case also shows that under certain circumstances, “data and algorithms” could have the “control right” of our wealth.

Data giants such as Google, Apple, Facebook, Tencent, Alibaba, and Baidu attract their attention by providing various information, services, and entertainment. And hotel giants like Huazhu and Marriott have our personal information and even bank card information. We have also seen that these “centralized” giants have used our data to earn hundreds of billions of dollars. We are not at all equal to the “centralized” giants.

Adopting Blockchain For Data Security

Under the centralized network, the giant almost has all of our private data, and the centralized internet has already relied heavily on the main-net. Whether it is academic or technical, these problems cannot be solved perfectly. In recent years, with the blockchain concept deeply rooted in people’s minds, the need to build a new decentralized network capable of subverting traditional client/server has gained more and more recognition.

However, most of the existing public chains are “ineffective” for data storage, TPS deficiency, cross-chain issues, governance issues, application development issues, etc. The nature of the blockchain is decentralized distributed ledger, and the data that can be stored is minimal (simple transaction records), other data cannot be efficiently stored. Therefore, in the absence of underlying data support, the actual use of the blockchain is significantly limited. More specifically, the decentralized storage of data is the most critical part of the future application of the blockchain.

To provide useful solutions to the problem, blockchain technology must of necessity, evolve with more robust and advanced features. Part of this improvement has to come at an algorithmic level like exists in projects like Lambda, with its Provable Data Possession (PDP) and Proofs of Retrievability (POR) protocols.

Recently, Ethereum World News reported the Project’s launch of the first ever Proof of Space-Time (PoST) protocol on GitHub. For Lucy Wang, the hope is that stakeholders become aware of the need to implement blockchain in data security frameworks to prevent further largescale data breaches.

Images courtesy of Shutterstock.

The post Blockchain Technology Can Solve User Data Privacy Issues appeared first on Ethereum World News.

Similar to Notcoin - Blum - Airdrops In 2024

origin »

Streamr DATAcoin (DATA) íà Currencies.ru

$ 0.0604923 (+0.15%)
Îáúåì 24H $1.859m
Èçìåíåèÿ 24h: -0.89 %, 7d: -5.41 %
Cåãîäíÿ L: $0.0602632 - H: $0.0604923
Êàïèòàëèçàöèÿ $62.513m Rank 582
Öåíà â ÷àñ íîâîñòè $ 0.0173299 (249.06%)

data user blockchain technology breaches solve privacy

data user → Ðåçóëüòàòîâ: 126


Ôîòî:

What Is Dropil Network?  Introduction to DROP Token

What Is Dropil? Dropil is an Ethereum-based cryptocurrency trading platform that includes a full suite of market analysis tools in a graphical user interface (GUI). Dropil leverages machine learning, big data, and artificial intelligence to power a variety of automated tools and bots on its network, including Dex, a decentralized exchange; Max, a smart wallet; […] The post What Is Dropil Network?  Introduction to DROP Token appeared first on Crypto Briefing.

2018-12-14 01:12


Crypto Work Place (CWT Token): Built-In Bitcoin Storage Micro-PC Powered By Linux

What Is Crypto Work Place? CryptoWorkPlace is a digital blockchain-based system built on a personal computer with the aim of providing its users with the access to devices and systems that have the ability to protect the user’s finances and personal data from unauthorized third party access, hacker attacks, or malicious programs. While there are a […]

2018-12-5 11:38


South Korea Is Trialing Blockchain Voting — Here’s What That Means

South Korea will test out a new blockchain voting system this month, sources close to the developments have confirmed to Bitcoin Magazine. Developed by the country’s National Election Commission (NEC) and its Ministry of Science and ICT, the distributed ledger system is based on IBM’s Hyperledger Fabric and will be used to authenticate voters and save voting results in real time.

2018-12-4 21:41


AMOS ICO

AMOS is a fitness technology solution, integrating distributed AI computing analysis and blockchain to provide a new experience on sports and exercising. a . Smart Sport Watch: AMOS calculates the calories burned by the user with smart sport watch and motivates the user to exercise through token feedback.

2018-11-28 14:34


Encrybit ICO

- ENCRYBIT THE RESEARCH BASED CRYPTOCURRENCY EXCHANGE Encrybit made history moments creating massive surveys in cryptocurrency market with 12k+ responses from traders among 167 countries. Encrybit exchange is thought of traders where we are merging their demands in reality developing the secured and featured enriched trading platform that does not want to compromise the emotions of traders.

2018-11-14 19:41


Ôîòî:

New Exchange Security Scoring Model Offers Insurance Rates for Coin Holders

International cybersecurity solutions provider Group-IB has come up with a scoring model to grade crypto exchanges based on their level of security. The scoring model was created by Group-IB in conjunction with Swiss-based Cryptolns (which is operated by Swiss insurance broker APIS AS), and the grading is intrinsic to CryptoIns’ new cryptocurrency exchange insurance, which will allow exchange users to cover up to 15 BTC worth of digital assets held in their exchange accounts.

2018-11-13 00:43


Ôîòî:

The free internet makes us the product — we need to stop it

The bad headlines continue to stack up for Facebook this year: from the Cambridge Analytica scandal, to the New York Times report that Facebook gave Apple, Samsung, and other mobile device makers access to its users personal data without permission, to the revelation that the firm routinely gives user information and preferences to several Chinese telecommunications firms, to last week’s security breach in which hackers took control of 50 million user accounts as well as any third-party sites those users logged into via Facebook.

2018-10-6 19:30