Loading...
|
Please use this identifier to cite or link to this item:
https://nccur.lib.nccu.edu.tw/handle/140.119/140718
|
Title: | 新技術與個資保護的衝突與調適 —以區塊鏈技術為中心 The Conflict and Adjustment between New Technology and Personal Data Protection: A focus on Blockchain Technology |
Authors: | 楊岱瑾 Yang, Tai-Chin |
Contributors: | 宋皇志 Sung, Huang-Chih 楊岱瑾 Yang, Tai-Chin |
Keywords: | 區塊鏈 個人資料保護法 去識別化 被遺忘權 GDPR Blockchain Personal Data Protection Act The right to be forgotten De-Identification General Data Protection Regulation(GDPR) |
Date: | 2022 |
Issue Date: | 2022-07-01 16:32:57 (UTC+8) |
Abstract: | 隨著資訊技術提升與巨量資料普及,數位足跡與各種多元資料被紀錄留存的方式增加,併與生物辨識技術、人工智慧等技術輔助,各種型態之資料與個人身分的連結性逐漸增強,個人資料保護之重要性日益提升。 本文旨在以區塊鏈技術為中心,探討新技術與個資保護的衝突與可能風險管理措施,隨著區塊鏈的應用日益普及,應用場景與態樣日趨多元,其去中心化、高度透明之特性有助於資料的紀錄、公開驗證、以及辨識真偽,在數位數據的留存下儼然成為一種新興信任方式,然而此種新型去中心化之技術態樣與個人資料保護以中心化做為思考準繩存有相互抗衡之疑慮,如去識別化之再識別風險、被遺忘權等議題。 針對區塊鏈技術與個人資料保護之矛盾,各國相繼提出可能可行之解釋以及技術方法,故本文以可行之資料去識別技術、提升鏈上資料安全性技術以及鏈上資料刪除的可能作法三構面進行技術方法分析整理,試圖解構資料在區塊鏈上依序可能遇到的問題,並整理相應解決辦法,最後試圖整理出有別於先前研究多建議採用之脫鏈儲存方式,以分別就區塊鏈架構端以及監理端給與參考策略,以期區塊鏈技術及個人資料保護兩者在發展上能夠同步並茂。 With the advancement of information technology and the widespread of big data, the ways in which digital footprints and various kinds of data are recorded and retained have increased, and with the assistance of biometric technology, artificial intelligence, etc. the connection between various types of data and personal identity has gradually increased. And the importance of personal information protection is increasing day by day. This study focuses on blockchain technology to discuss the conflict between new technologies and personal information protection and possible risk management measures. The characteristics of decentralized and a high degree of transparency are helpful for data recording, public verification, and identification of authenticity. With the retention of digital data, it has become a new way of trust. However, there are some paradoxes since this new type of technology is decentralized while the regulation of personal data protection are focus on centralized issue. Such as the risk of re-identification and the right to be forgotten. In response to the contradiction between blockchain technology and personal information protection, various countries have successively proposed possible explanations and technical methods. Therefore, this article uses feasible de-identification technologies, technologies to improve the security of data on the blockchain, and possible methods for data deletion on the blockchain. Analyzed and sorted out technical methods, tried to deconstruct the problems that data may encounter in sequence on the blockchain, and sorted out corresponding solutions, and tried to sort out the methods that are different from previous studies which focus on off-chain storage. In the end, tried to provide reference strategies to the blockchain architecture side and the supervision side, in order to synchronize the development of blockchain technology and personal data protection. |
Reference: | 一、中文期刊論文 1. 王紹睿. (2018). 淺談人工智慧系統的隱私資訊安全保護機制. 科儀新知, (215), 74-84. 2. 刘炜, 彭宇飞, 田钊, 盛朝阳, 李阳, & 佘维. (2021). 基于区块链的医疗信息隐私保护研究综述. 郑州大学学报 (理学版), 53(2), 1-18. 3. 宋皇志. (2018). 巨量資料交易之法律風險與管理意涵-以個人資料再識別化為中心. 管理評論, 37(4), 37-51. 4. 李思壯, & 黃彥男. (2019). 數位時代之數位隱私保護. 國土及公共治理季刊, 7(4), 30-39. 5. 袁勇, & 王飞跃. (2020). 可编辑区块链: 模型, 技术与方法. 自动化学报, 46(5), 831-846. 6. 郭戎晉. (2021). 論區塊鏈技術與歐盟一般資料保護規則之衝突. 臺大法學論叢, 50(1), 69-152. 7. 陳恭, & 蕭婕. (2018). 運用區塊鏈打造公共治理新局面. 國土及公共治理季刊, 6(4), 50-61.,頁57。 8. 靳世雄, 张潇丹, 葛敬国, 史洪彬, 孙毅, 李鸣, ... & 姚忠将. (2021). 区块链共识算法研究综述. Journal of Cyber Security 信息安全学报, 6(2) ,頁89、90。 9. 劉定基(2012),個人資料的定義、保護原則與個人資料保護法適用的例外—以監視錄影為例(下),《月旦法學教室》,第119期,頁41。 10. 蕭奕弘(2018),〈健保資料庫行政訴訟案:醫學研究與資料隱私間的衝突〉,《月旦醫事法報告》,第19期,頁95。
二、外文文獻 (一)英文期刊論文 1. Yang, M., Margheri, A., Hu, R., & Sassone, V. (2018). Differentially private data sharing in a cloud federation with blockchain. IEEE Cloud Computing, 5(6), 69-79. 2. Berberich, M., & Steiner, M. (2016). Blockchain technology and the GDPR-how to reconcile privacy and distributed ledgers. Eur. Data Prot. L. Rev., 2, 422. 3. Chang, H. (2018). Is distributed ledger technology built for personal data?. Journal of Data Protection & Privacy, 1(4), 410-418. 4. Cohen, J. E. (2019). Internet utopianism and the practical inevitability of law. Duke Law & Technology Review, 18(1). 5. Daoui, S., Fleinert-Jensen, T., & Lemperiere, M. (2019). GDPR, Blockchain and the French Data Protection Authority: Many Answers but Some Remaining Questions. Stan. J. Blockchain L. & Pol`y, 2, 1. 6. Dwork, C. (2008, April). Differential privacy: A survey of results. In International conference on theory and applications of models of computation (pp. 1-19). Springer, Berlin, Heidelberg. 7. Feistel, H. (1973). Cryptography and Computer Privacy. Scientific American, 228(5), 15–23. 8. Finck, M. (2018). Blockchain regulation and governance in Europe. Cambridge University Press. 9. Finck, M., & Pallas, F. (2020). They who must not be identified—distinguishing personal from non-personal data under the GDPR. International Data Privacy Law. 10. Finck, M. (2018). Blockchains and data protection in the European Union. Eur. Data Prot. L. Rev., 4, 17. 11. Gilbert, F. (2011). European data protection 2.0: new compliance requirements in sight-what the proposed EU data protection regulation means for us companies. Santa Clara Computer & High Tech. LJ, 28, 815. 12. Giuseppe Ateniese et al., Redactable Blockchain – or – Rewriting History in Bitcoin and Friends (Apr. 26-28, 2017), in 2017IEEEEUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), July 2017, at 111, 112-13 13. Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1), 186-208. 14. Graux, H., Ausloos, J., & Valcke, P. (2012). The right to be Forgotten in the Internet Era. ICRI research paper, (11). 15. iménez-Gómez, B. S. (2019). Risks of Blockchain for Data Protection: A European Approach. Santa Clara High Tech. LJ, 36, 281. 16. international conference on the theory and applications of cryptographic techniques (pp. 457-473). Springer, Berlin, Heidelberg. 17. Krishnan, S., Balas, V. E., Golden, J., Robinson, Y. H., Balaji, S., & Kumar, R. (Eds.). (2020). Handbook of research on blockchain technology. Academic Press. 18. L. Sweeney (2002), International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10 (5), 571. 19. lorian, M., Henningsen, S., Beaucamp, S., & Scheuermann, B. (2019, June). Erasing data from blockchain nodes. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 367-376). IEEE. 20. Mirchandani, A. (2018). The GDPR-blockchain paradox: exempting permissioned Blockchains from the GDPR. Fordham Intell. Prop. Media & Ent. LJ, 29, 1201. 21. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, 21260. 22. Narayanan, A., & Shmatikov, V. (2008, May). Robust de-anonymization of large sparse datasets. In Security and Privacy, 2008. SP 2008. IEEE Symposium on (pp. 111-125). IEEE. 23. Natarajan, H., Krause, S., & Gradstein, H. (2017). Distributed ledger technology and blockchain. 24. Nikolaus Bertermann (2015). Sind IP-Adressen personenbezogene Daten? K&R, at 106 25. Purtova, N. (2018). The law of everything. Broad concept of personal data and future of EU data protection law. Law, Innovation and Technology, 10(1), 40-81. 26. Rustad, M. L., & Koenig, T. H. (2019). Towards a global data privacy standard. Fla. L. Rev., 71, 365. 27. Sahai, A., & Waters, B. (2005, May). Fuzzy identity-based encryption. In Annual 28. Wang, S., Wang, X., & Zhang, Y. (2019). A secure cloud storage framework with access control based on blockchain. IEEE access, 7, 112713-112725. 29. Wang, Y., Liao, X., Xiao, D., & Wong, K. W. (2008). One-way hash function construction based on 2D coupled map lattices. Information Sciences, 178(5), 1391-1406. 30. Wirth, C., & Kolain, M. (2018). Privacy by blockchain design: a blockchain-enabled GDPR-compliant approach for handling personal data. In Proceedings of 1st ERCIM Blockchain Workshop 2018. European Society for Socially Embedded Technologies (EUSSET) (二)英文報告書 1. Article 29 Data Protection Working Party (2014). Opinion 05/2014 on Anonymisation Techniques 2. Article 29 Working Party, Opinion 05/2012 on Cloud Computing (WP 196) 01037/12/EN, 12. 3. Baker McKenzie &R3 (2017). Blockchains and Laws. Are they compatible? 4. Commission Nationale de l`Informatique et des Libertés [CNIL] (2018). Blockchain and the GDPR: Solutions for a responsible use of the blockchain in the context of personal data. 5. ENISA (2019), Pseudonymisation techniques and best practices. 6. EU Blockchain Observatory & Forum (2018. BLOCKCHAIN AND THE GDPR 14 7. European Parliament (2019)., Blockchain and the General Data Protection Regulation, PE 634.445, 30 8. European Parliament, Directorate-General for Internal Policies of the Union, Snyers, A., Houben, R. (2018). Cryptocurrencies and blockchain: legal context and implications for financial crime, money laundering and tax evasion, European Parliament 9. IBM Security White paper (2018). Blockchain and GDPR -How blockchain could address five areas associated with GDPR compliance. 10. ICO (2012). Anonymisation:managing data protection risk code of practice. 11. ICO (2014). DELETING PERSONAL DATA 5. 12. Panel for the Future of Sci. & Tech. [STOA] (July, 2019). Blockchain and the General Data Protection Regulation: Can Distributed Ledgers be Squared with European Data Protection Law? 13. UK ICO(2018). Automated Decision-making and Profiling.
三、政府資料 1. 法務部102年3月12日法律字第10203501470號函。 2. 法務部民國107年8月30日法律字第10703513050號函。
四、網路資料 (一)中文網站 1. CoinMarketCap,檢自:https://coinmarketcap.com/zh-tw/ 2. Github,区块链技术指南—同态加密,檢自:https://yeasy.gitbook.io/blockchain_guide/05_crypto/homoencryption 3. IBM,同態加密服務,檢自:https://www.ibm.com/tw-zh/security/services/homomorphic-encryption 4. INSIDE,【以太坊的倫敦前夕】什麼是 Layer 2?為什麼以太 2.0 來臨之前需要它?,2021年6月8日。檢自:https://www.inside.com.tw/feature/before-ethereum-london-hard-fork/23793-ethereum-layer-2 5. 王慕民,動態IP位址是不是個人資料?歐盟法院這樣看,2016年7月4日,檢自:https://www.davinci.idv.tw/news/487 6. 金融監督管理委員會,「虛擬通貨平台及交易業務事業防制洗錢及打擊資恐辦法」發布施行,2021年6月22日。檢自:https://www.fsc.gov.tw/ch/home.jsp?id=96&parentpath=0,2&mcustomize=news_view.jsp&dataserno=202106220006&dtable=News 7. 金融監督管理委員會,金管會同意保險業運用區塊鏈技術申請試辦「保全/理賠聯盟鏈」服務,2020年3月19日。檢自:https://www.fsc.gov.tw/ch/home.jsp?id=96&parentpath=0,2&mcustomize=news_view.jsp&dataserno=202003190002&dtable=News 8. 動區動趨,新手科普 零知識證明 (zero-knowledge proofs) 詳解,2020年4月29日。檢自:https://www.blocktempo.com/zero-knowledge-proof-zkp-chagelly-column/ 9. 張靜婕,凡走過必留下IP,淺談IP位址是否係屬個資法之個人資料?2011年12月19日,檢自:https://www.davinci.idv.tw/news/43 10. 歐盟提出現行個資保護指令規範之修正草案, 資訊工業策進會科技法律研究所, 檢自:https://stli.iii.org.tw/article-detail.aspx?no=16&tp=3&i=150&d=6343 (二)外文網站 1. Acar G (9 April 2018), Four cents to deanonymize: Companies reverse hashed email addresses, available at: https://freedom-to-tinker.com/2018/04/09/four-cents-to-deanonymize-companies-reverse-hashed-email-addresses/ 2. Business of apps, Binance Revenue and Usage Statistics (2022), available at: https://data.europa.eu/doi/10.2861/280969https://www.businessofapps.com/data/binance-statistics/ 3. Case Study: How Walmart brought unprecedented transparency to the food supply chain with Hyperledger Fabric, available at: https://www.hyperledger.org/learn/publications/walmart-case-study 4. EDPS, The History of the General Data ProtectionRegulation, available at: https://edps.europa.eu/data-protection/data-protection/legislation/history-general-data-protection-regulation_en# 5. European Commission -Blockchain Strategy, available at: https://digital-strategy.ec.europa.eu/en/policies/blockchain-strategy 6. European Commission -European Blockchain Services Infrastructure, available at: https://digital-strategy.ec.europa.eu/en/policies/european-blockchain-services-infrastructure 7. Europol, Internet Organised Crime Threat Assessment (IOCTA)2020, IOCTA, 9, 28, 58(2020) , available at: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2020?fbclid=IwAR1yK3aQINAdyBRAFtpBb774ACuHhZzIGZb_th5I0hzx5N-Oh0tsLSXYOOE 8. FinCEN, First Bitcoin Mixer Penalized by FinCEN for Violating Anti-Money Laundering Laws,(2020), available at: https://www.fincen.gov/news/news-releases/first-bitcoin-mixer-penalized-fincen-violating-anti-money-laundering-laws 9. https://www.supplychainbrain.com/articles/32130-walmart-canada-fixing-a-broken-freight-audit-andpayment-process-with-blockchain 10. Hyperledger Fabric, About Hyperledger, available at: https://www.hyperledger.org/about 11. Is Data Really the New Oil in the 21st Century?, Towards Data Science, available at: https://towardsdatascience.com/is-data-really-the-new-oil-in-the-21st-century-17d014811b88 12. Justin Hectus & Kristy Sambor, Blockchain and GDPR-Frenemies?, L.J.NEWSLS., July 1, 2018, available at: https://finance.yahoo.com/news/blockchain-gdpr-frenemies-065328669.html 13. Walmart Uses Blockchain to Fix ‘Broken’ Freight Audit and Payment Process, available at: https://www.supplychainbrain.com/articles/32130-walmart-canada-fixing-a-broken-freight-audit-andpayment-process-with-blockchain |
Description: | 碩士 國立政治大學 科技管理與智慧財產研究所 109364207 |
Source URI: | http://thesis.lib.nccu.edu.tw/record/#G0109364207 |
Data Type: | thesis |
DOI: | 10.6814/NCCU202200666 |
Appears in Collections: | [科技管理與智慧財產研究所] 學位論文
|
Files in This Item:
File |
Description |
Size | Format | |
420701.pdf | | 2114Kb | Adobe PDF2 | 14 | View/Open |
|
All items in 政大典藏 are protected by copyright, with all rights reserved.
|