Blockchain-Enabled GDPR Compliance Enforcement for IIoT Data Access

Amina Isazade, Ali Malik, Mohammed B. Alshawki

Research output: Contribution to journalArticlepeer-review

Abstract

The General Data Protection Regulation (GDPR) imposes additional demands and obligations on service providers that handle and process personal data. In this paper, we examine how advanced cryptographic techniques can be employed to develop a privacy-preserving solution for ensuring GDPR compliance in Industrial Internet of Things (IIoT) systems. The primary objective is to ensure that sensitive data from IIoT devices is encrypted and accessible only to authorized entities, in accordance with Article 32 of the GDPR. The proposed system combines Decentralized Attribute-Based Encryption (DABE) with smart contracts on a blockchain to create a decentralized way of managing access to IIoT systems. The proposed system is used in an IIoT use case where industrial sensors collect operational data that is encrypted according to DABE. The encrypted data is stored in the IPFS decentralized storage system. The access policy and IPFS hash are stored in the blockchain’s smart contracts, allowing only authorized and compliant entities to retrieve the data based on matching attributes. This decentralized system ensures that information is stored encrypted and secure until it is retrieved by legitimate entities, whose access rights are automatically enforced by smart contracts. The implementation and evaluation of the proposed system have been analyzed and discussed, showing the promising achievement of the proposed system.
Original languageEnglish
JournalJournal of Cybersecurity and Privacy
DOIs
Publication statusPublished - Oct 2025

Keywords

  • cryptography
  • GDPR
  • Industrial IoT
  • Attribute-Based Encryption
  • smart contracts
  • Blockchain
  • data privacy
  • access control

Fingerprint

Dive into the research topics of 'Blockchain-Enabled GDPR Compliance Enforcement for IIoT Data Access'. Together they form a unique fingerprint.

Cite this