{"id":"https://openalex.org/W4414785576","doi":"https://doi.org/10.3390/jcp5040084","title":"Blockchain-Enabled GDPR Compliance Enforcement for IIoT Data Access","display_name":"Blockchain-Enabled GDPR Compliance Enforcement for IIoT Data Access","publication_year":2025,"publication_date":"2025-10-03","ids":{"openalex":"https://openalex.org/W4414785576","doi":"https://doi.org/10.3390/jcp5040084"},"language":"en","primary_location":{"id":"doi:10.3390/jcp5040084","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp5040084","pdf_url":"https://www.mdpi.com/2624-800X/5/4/84/pdf?version=1759492939","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/5/4/84/pdf?version=1759492939","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119831540","display_name":"Amina Isazade","orcid":null},"institutions":[{"id":"https://openalex.org/I106118109","display_name":"E\u00f6tv\u00f6s Lor\u00e1nd University","ror":"https://ror.org/01jsq2704","country_code":"HU","type":"education","lineage":["https://openalex.org/I106118109"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"Amina Isazade","raw_affiliation_strings":["Department of Computer Algebra, ELTE Eotvos Lorand University, 1053 Budapest, Hungary"],"affiliations":[{"raw_affiliation_string":"Department of Computer Algebra, ELTE Eotvos Lorand University, 1053 Budapest, Hungary","institution_ids":["https://openalex.org/I106118109"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005680070","display_name":"Ali Malik","orcid":"https://orcid.org/0000-0002-2866-0743"},"institutions":[{"id":"https://openalex.org/I4210144925","display_name":"Technological University Dublin","ror":"https://ror.org/04t0qbt32","country_code":"IE","type":"education","lineage":["https://openalex.org/I4210144925"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Ali Malik","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Technological University Dublin, D07 EWV4 Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Technological University Dublin, D07 EWV4 Dublin, Ireland","institution_ids":["https://openalex.org/I4210144925"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072390533","display_name":"Mohammed B. M. Kamel","orcid":"https://orcid.org/0000-0003-1619-2927"},"institutions":[{"id":"https://openalex.org/I106118109","display_name":"E\u00f6tv\u00f6s Lor\u00e1nd University","ror":"https://ror.org/01jsq2704","country_code":"HU","type":"education","lineage":["https://openalex.org/I106118109"]},{"id":"https://openalex.org/I882953328","display_name":"Furtwangen University","ror":"https://ror.org/02m11x738","country_code":"DE","type":"education","lineage":["https://openalex.org/I882953328"]}],"countries":["DE","HU"],"is_corresponding":true,"raw_author_name":"Mohammed B. Alshawki","raw_affiliation_strings":["Department of Computer Algebra, ELTE Eotvos Lorand University, 1053 Budapest, Hungary","Institute for Data Science, Cloud Computing and IT Security (IDACUS), 78054 Furtwangen im Schwarzwald, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Computer Algebra, ELTE Eotvos Lorand University, 1053 Budapest, Hungary","institution_ids":["https://openalex.org/I106118109"]},{"raw_affiliation_string":"Institute for Data Science, Cloud Computing and IT Security (IDACUS), 78054 Furtwangen im Schwarzwald, Germany","institution_ids":["https://openalex.org/I882953328"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072390533"],"corresponding_institution_ids":["https://openalex.org/I106118109","https://openalex.org/I882953328"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40589586,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"5","issue":"4","first_page":"84","last_page":"84"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7498999834060669},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.436599999666214},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.4246000051498413},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42289999127388},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.41760000586509705},{"id":"https://openalex.org/keywords/smart-contract","display_name":"Smart contract","score":0.4106000065803528},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.39410001039505005},{"id":"https://openalex.org/keywords/general-data-protection-regulation","display_name":"General Data Protection Regulation","score":0.38769999146461487},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.38440001010894775}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7498999834060669},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7106000185012817},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6126999855041504},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.436599999666214},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.4246000051498413},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42289999127388},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.41760000586509705},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.4106000065803528},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.39410001039505005},{"id":"https://openalex.org/C3090818","wikidata":"https://www.wikidata.org/wiki/Q1172506","display_name":"General Data Protection Regulation","level":3,"score":0.38769999146461487},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.38440001010894775},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3792000114917755},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.3686000108718872},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3488999903202057},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.3327000141143799},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.31360000371932983},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.31119999289512634},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3061999976634979},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3059000074863434},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.3010999858379364},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.2985999882221222},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2985999882221222},{"id":"https://openalex.org/C2777407602","wikidata":"https://www.wikidata.org/wiki/Q1888932","display_name":"Mandatory access control","level":4,"score":0.26339998841285706},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.26179999113082886},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.2612000107765198}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/jcp5040084","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp5040084","pdf_url":"https://www.mdpi.com/2624-800X/5/4/84/pdf?version=1759492939","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f8885c6bd3a2445abc69a317047cf3be","is_oa":true,"landing_page_url":"https://doaj.org/article/f8885c6bd3a2445abc69a317047cf3be","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, Vol 5, Iss 4, p 84 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/jcp5040084","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp5040084","pdf_url":"https://www.mdpi.com/2624-800X/5/4/84/pdf?version=1759492939","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4414785576.pdf"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W2619902260","https://openalex.org/W2811266402","https://openalex.org/W3057898108","https://openalex.org/W3135463650","https://openalex.org/W3201020733","https://openalex.org/W4296869980","https://openalex.org/W4297786873","https://openalex.org/W4308642907","https://openalex.org/W4361987581","https://openalex.org/W4379799461","https://openalex.org/W4380225154","https://openalex.org/W4385812192","https://openalex.org/W4390905604","https://openalex.org/W4406892892"],"related_works":[],"abstract_inverted_index":{"The":[0,48,76,101,123,134,188],"General":[1],"Data":[2],"Protection":[3],"Regulation":[4],"(GDPR)":[5],"imposes":[6],"additional":[7],"demands":[8],"and":[9,16,62,137,150,170,190,199],"obligations":[10],"on":[11,87,158],"service":[12],"providers":[13],"that":[14,54,117,165],"handle":[15],"process":[17],"personal":[18],"data.":[19],"In":[20],"this":[21],"paper,":[22],"we":[23],"examine":[24],"how":[25],"advanced":[26],"cryptographic":[27],"techniques":[28],"can":[29],"be":[30],"employed":[31],"to":[32,52,65,90,98,121,153],"develop":[33],"a":[34,88,92],"privacy-preserving":[35],"solution":[36],"for":[37],"ensuring":[38],"GDPR":[39],"compliance":[40],"in":[41,68,106,128,142],"Industrial":[42],"Internet":[43],"of":[44,73,95,192,205],"Things":[45],"(IIoT)":[46],"systems.":[47,100],"primary":[49],"objective":[50],"is":[51,60,104,118,126,167,174],"ensure":[53],"sensitive":[55],"data":[56,116,125,156],"from":[57],"IIoT":[58,99,108],"devices":[59],"encrypted":[61,119,124,169],"accessible":[63],"only":[64,148],"authorized":[66,149],"entities,":[67,178],"accordance":[69],"with":[70,84],"Article":[71],"32":[72],"the":[74,129,143,155,193,202,206],"GDPR.":[75],"proposed":[77,102,194,207],"system":[78,103,163,195],"combines":[79],"Decentralized":[80],"Attribute-Based":[81],"Encryption":[82],"(DABE)":[83],"smart":[85,145,186],"contracts":[86],"blockchain":[89],"create":[91],"decentralized":[93,131,162],"way":[94],"managing":[96],"access":[97,135,180],"used":[105],"an":[107],"use":[109],"case":[110],"where":[111],"industrial":[112],"sensors":[113],"collect":[114],"operational":[115],"according":[120],"DABE.":[122],"stored":[127,141,168],"IPFS":[130,138],"storage":[132],"system.":[133,208],"policy":[136],"hash":[139],"are":[140,182],"blockchain\u2019s":[144],"contracts,":[146],"allowing":[147],"compliant":[151],"entities":[152],"retrieve":[154],"based":[157],"matching":[159],"attributes.":[160],"This":[161],"ensures":[164],"information":[166],"secure":[171],"until":[172],"it":[173],"retrieved":[175],"by":[176,185],"legitimate":[177],"whose":[179],"rights":[181],"automatically":[183],"enforced":[184],"contracts.":[187],"implementation":[189],"evaluation":[191],"have":[196],"been":[197],"analyzed":[198],"discussed,":[200],"showing":[201],"promising":[203],"achievement":[204]},"counts_by_year":[],"updated_date":"2026-03-11T06:11:40.159057","created_date":"2025-10-10T00:00:00"}
