<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Utilizing blockchain technologies for ensuring the confidentiality and security of personal data in compliance with GDPR⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Valeriia Balatska</string-name>
          <email>valeriia.s.balatska@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vasyl Poberezhnyk</string-name>
          <email>vasyl.poberezhnyk@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ivan Opirskyy</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CSDP-2024: Cyber Security and Data Protection</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>12 Stepana Bandery str., 79000 Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>70</fpage>
      <lpage>80</lpage>
      <abstract>
        <p>The growth of the requirements for personal data protection according to the General Data Protection Regulation (GDPR) leads to the increasing cost of developing innovative solutions to ensure the privacy and security of information. The conception of the service for collecting and storing personal data that uses blockchain technologies, smart contracts, NFTs (non-fungible tokens), and the decentralized file system IPFS (InterPlanetary File System) is proposed in this paper. The main functional blocks of the service such as user registration and authentication, data collection and processing, consent management, and access tracking are considered. Blockchain usage allows the immutability and transparency of user accounts and consents, while smart contracts automate the process of managing access rights. The use of IPFS for decentralized file storage increases security and ensures data integrity. Data processing techniques that include masking, pseudo-anonymization, shuffling, and perturbation, would significantly reduce the risk of disclosure of sensitive information. The proposed concept demonstrates the possibility of providing the effective protection of personal data that would be compliant with the GDPR while using modern technologies. The purpose of this work is the development of a concept of a service for the collection and storage of personal data that meets the requirements of the General Data Protection Regulation (GDPR) while using innovative technologies such as blockchain, smart contracts, NFT, and the IPFS.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;personal data protection</kwd>
        <kwd>GDPR</kwd>
        <kwd>blockchain</kwd>
        <kwd>smart contracts</kwd>
        <kwd>decentralized storage systems</kwd>
        <kwd>IPFS</kwd>
        <kwd>authorization</kwd>
        <kwd>identification</kwd>
        <kwd>access control</kwd>
        <kwd>decentralization1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Today the processing of personal data in the digital world is
a crucial part of many organizations’ operations. With the
development of technologies and the growth of the volume
of data, the need to ensure reliable protection of confidential
information also increases. The introduction of the General
Data Protection Regulation (GDPR) in 2018 was an
important step towards establishing high standards of
personal data protection in the European Union and beyond.
GDPR obliges organizations to implement appropriate
measures to protect user data, which includes not only
technical but also organizational aspects [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>Despite the existence of many methods and tools that
provide data security, new challenges that are related to
cybercrime, data leaks, and privacy breaches are
continuously emerging. This is the reason why the search
for innovative approaches and technologies for effective
information protection is crucial. In this scope, the usage of
blockchain technology, which ensures the immutability and
transparency of records, is promising, and the mentioned
properties are critical for the protection of confidential data.</p>
      <p>
        Blockchain technologies can provide significant advantages
in the scope of data privacy and security. Decentralized
structure and cryptographic mechanisms provide the
opportunity to avoid a single vulnerable point and ensure
high resistance to unauthorized access while using
blockchain technologies [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Moreover, blockchain helps to
increase the level of trust between parties by ensuring the
immutability of records and the possibility of public
verification.
      </p>
      <p>Smart contracts that operate based on the blockchain
allow the automatization of access rights management and
user consent, which will significantly reduce the risk of
human errors and increase the efficiency of data management.
The usage of the IPFS (InterPlanetary File System)—the
decentralized file storage, ensures a high level of data security,
integrity, and availability. The concept of the service is
designed for collecting and storing personal data by GDPR
requirements using modern technologies such as blockchain,
smart contracts, NFT, and the decentralized IPFS file system.
The proposed approach includes various data processing
methods such as masking, pseudo-anonymization, shuffling,
and perturbation, which can significantly reduce the risk of
revealing confidential information.</p>
      <p>0000-0002-6262-6792 (V. Balatska); 0000-0002-7523-2557
(V. Poberezhnyk); 0000-0002-8461-8996 (I. Opirskyy)
© 2024 Copyright for this paper by its authors. Use permitted under
Creative Commons License Attribution 4.0 International (CC BY 4.0).</p>
      <p>The implementation of such a system contributes to
increasing the level of personal data security and ensuring
compliance with GDPR requirements, which is an urgent
task for many organizations in the modern world. This work
explores the possibilities of using innovative technologies to
create secure and transparent information systems that meet
modern regulatory requirements and challenges related to
personal data protection.</p>
      <p>Problem formulation. In today’s digital world, where
the personal data of users is becoming increasingly valuable,
the protection of this data becomes a critical task for
organizations. The requirements of the General Data
Protection Regulation (GDPR) impose an obligation on
businesses to ensure compliance with the management and
protection of personal data, and violations of these
requirements can lead to serious fines and loss of consumer
trust.</p>
      <p>However, existing methods of data protection are often
insufficiently effective in ensuring full confidentiality and
security. Traditional centralized data storage systems are
vulnerable to cyber-attacks, data leaks, and unauthorized
access. For example, in 2023 there was a major data breach
that affected millions of users, highlighting the ineffectiveness
of traditional protection methods.</p>
      <p>This problem becomes even more urgent due to the
rapid growth of the amount of personal data collected and
processed by organizations. Every day, millions of new users
register on online platforms, leaving their data, which makes
the need for innovative solutions to protect this data
increasingly acute.</p>
      <p>The need for innovative solutions to protect personal
data is becoming more and more urgent. Modern
technologies such as blockchain, smart contracts, NFTs, and
decentralized storage systems have the potential to radically
change approaches to data security and privacy. The use of
blockchain, for example, can ensure the immutability and
transparency of records, while smart contracts can automate
data access control and enforce privacy policies.</p>
      <p>Thus, the key challenge is to develop and implement
effective and innovative personal data collection and storage
systems that meet GDPR requirements and provide the
highest level of privacy and security. This paper partially
addresses this issue by looking at how innovative
technologies can help protect personal data, ensure GDPR
compliance, and increase security in the digital
environment.</p>
      <p>
        Recent research and publications analysis. Recent
research and publications in the field of personal data
protection indicate a growing interest in the use of
blockchain technologies to ensure the confidentiality and
security of information [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Scientists and specialists are
actively exploring the possibilities of blockchain to create
decentralized data storage systems that can provide a high
degree of protection against unauthorized access and data
leaks. One of the main advantages of the blockchain is its
immutability and transparency, which allows you to
accurately track all actions with data and ensure their
integrity.
      </p>
      <p>
        Research suggests that blockchain can ensure data
immutability, making it inaccessible to unauthorized
editing. This is especially important for tracking all data
actions and ensuring data integrity. Also, the blockchain
allows the use of smart contracts to automate data access
management processes. Smart contracts can play the role of
automated agents that control the provision of access to
personal data by established rules and user consent [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. This
increases the accuracy and security of data processing,
minimizing the human factor and possible errors.
      </p>
      <p>
        An important topic of research is the use of
decentralized file systems, such as IPFS (InterPlanetary File
System), to store large volumes of personal data. IPFS allows
you to store data in a distributed environment, which
increases their availability and protection against malicious
attacks. Hashing data in IPFS ensures its integrity, which is
an important aspect of GDPR compliance [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        Immutability and transparency are key characteristics of
blockchain technologies that make them particularly
valuable for protecting personal data and other sensitive
information assets. One of the main reasons for the
immutability of data in a blockchain is its consensus
mechanism. Blockchain is based on a distributed system
where each node (computer) of the network has a copy of all
transactions that have ever been made. These nodes use a
consensus algorithm (such as Proof of Work, Proof of Stake,
etc.) to agree on which blocks (groups of transactions) are
added to the chain of blocks (blockchain) [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Only once a
block is added to the blockchain is it almost impossible to
change or remove it without the consensus of all other
nodes, making the blockchain immutable.
      </p>
      <p>Each block in the blockchain has a unique identifier,
which is known as a hash. This value is generated from the
block data using cryptographic hash functions such as
SHA256. If even one thing changes in a block (even one
character), it will cause its hash value to change. Thus, even
a small change in information will lead to a change in the
hash, which will be visible to all network participants.</p>
      <p>
        Also important is the immutability of blocks, once a
block is added to the blockchain and becomes part of the
overall sequence of blocks, it stays there forever. This
creates immutability, or immutability, of data. This is
especially important for tracking and historical verification
of transactions in public blockchains [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        Most blockchains, in particular public ones, have open
access to all data stored in the network. This means that any
member of the network can verify and view any transaction
or account balance using a public key (address) in the
network. Blockchain transparency is based on its
decentralized nature. No centralized authority or authority
controls the entire network. Instead, every node in the
network has the same right to access and control the data,
which ensures discovery verification and transaction
transparency. Also, blockchain creates a reliable basis for
open and transparent systems. In this regard, the values and
principles underlying blockchain technologies make them
an important tool for solving problems in the fields of
finance, logistics, medicine, voting, and, of course, personal
data protection [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. These aspects of immutability and
transparency give blockchains the power to protect data and
increase trust in the digital systems that use them to operate.
In addition to blockchain technologies, privacy-friendly data
processing methods such as masking,
pseudoanonymization, shuffling, and perturbation are being
actively researched. These methods make it possible to
ensure a high degree of confidentiality of personal data
while maintaining their usefulness for analysis and other
purposes. The use of such methods is key to complying with
GDPR data protection requirements. In general, recent
research and publications indicate the significant potential
of blockchain technologies for creating secure and efficient
systems for storing and processing personal data [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. They
highlight the importance of innovative approaches to data
protection that can ensure a high level of privacy and
security in the face of growing cybersecurity threats. The
integration of blockchain technologies, smart contracts,
IPFS, and advanced data processing methods is a promising
direction to achieve GDPR compliance and increase the level
of security in the digital environment.
      </p>
      <p>The purpose of the paper is to develop the concept of
an innovative service for collecting and storing personal
data that meets the requirements of the General Data
Protection Regulation (GDPR). The main objectives of the
paper are:






</p>
      <p>Analysis of existing personal data protection
technologies, in particular, research modern
methods and technologies of personal data
protection used in the context of GDPR
requirements, analysis of advantages and
disadvantages of existing solutions, including
centralized and decentralized data storage
systems.</p>
      <p>Development of a service architecture for data
collection and storage, to develop a service
architecture that includes components for
registration, authentication, collection,
processing, and storage of personal data. Integrate
blockchain to ensure immutability and
transparency of records of user data and consent.
Research on the use of smart contracts for
managing access rights and consents. Develop
models of smart contracts to automate the
management of data processing consents. Explore
the possibilities of using smart contracts to
control access rights to personal data.</p>
      <p>Explore the possibilities and limitations of using
IPFS for secure storage of large volumes of
personal data. Develop mechanisms for IPFS
integration with blockchain and smart contracts.
Data processing with confidentiality in mind.
Develop and implement data processing
techniques such as masking,
pseudoanonymization, scrambling, and perturbation to
ensure the privacy of personal data. Assess the
effectiveness of these methods in the context of
maintaining privacy and GDPR compliance.</p>
      <p>Assess the proposed service for compliance with
GDPR requirements. Determine how the
proposed technologies can help organizations
meet regulatory requirements for the protection
of personal data.</p>
      <p>Identify potential risks and challenges associated
with the implementation of the proposed
technologies. Develop recommendations for
overcoming identified problems and reducing
risks.</p>
      <p>
        These tasks are aimed at creating an innovative service
that will ensure a high level of personal data protection by
GDPR requirements, using modern technologies to increase
security and transparency.
2. Protection technologies and
personal data processing
architecture
2.1. Analysis of existing personal data
protection technologies
The protection of personal data is critically important in
today’s digital world, especially with the requirements of the
General Data Protection Regulation (GDPR) in the European
Union. The GDPR sets high standards for the processing of
personal data, in particular regarding their storage, transfer,
and access [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. In this regard, organizations must
implement modern methods and technologies to ensure the
confidentiality, integrity, and availability of personal data.
      </p>
      <p>
        The main methods of protecting personal data are
encryption, anonymization, pseudo-anonymization, access
control, use of smart contracts, monitoring and auditing,
decentralized data storage, masking, shuffling, and data
perturbation [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Each of these methods has its advantages
and disadvantages, which should be considered when
choosing the appropriate solution for a specific organization.
      </p>
      <p>Below is a table that contains a description of the main
methods of personal data protection, their advantages and
disadvantages.</p>
      <p>From the analysis of the table, which contains a
description of the main methods of personal data protection,
their advantages and disadvantages, several important
conclusions can be drawn.</p>
      <p>
        First, each of the methods has its unique features and is
applied depending on the specific needs of the organization
and the nature of the data [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Encryption provides a high
level of security and is indispensable for protecting data both
at rest and in transit. However, high key management
requirements can be difficult to implement.
      </p>
      <p>
        Anonymization and pseudo-anonymization effectively
ensure data confidentiality but may reduce their usefulness
for further analysis [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Access control and smart contracts
allow detailed configuration of access rights and automation
of user consent management, but their implementation can
be complex and require significant resources [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>Monitoring and auditing are essential for data
transparency and rapid incident response, although they
require significant implementation and maintenance costs.
Decentralized storage systems such as blockchain and IPFS
offer high resistance to attacks and no single point of failure
but are also characterized by high implementation costs and
management complexity.</p>
      <p>
        Data masking, shuffling, and perturbation provide an
additional layer of privacy protection but may affect the
accuracy and usefulness of the data.
Summing up, the choice of a specific method of protecting
personal data depends on the balance between the level of
necessary security and the convenience of data use.
Organizations should carefully assess their needs and
opportunities for implementing certain technologies to
ensure the maximum level of personal data protection and
compliance with GDPR requirements.
2.2. Development of service architecture
for collecting and storing personal
data
To ensure compliance with the requirements of the General
Data Protection Regulation (GDPR), a service architecture is
proposed for the collection and storage of personal data
using modern technologies, including blockchain, smart
contracts, and the decentralized IPFS file system [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. The
architecture includes the following main components:
registration, authentication, data collection, data processing,
data storage, and consent management.
      </p>
      <p>Service architecture:


</p>
      <p>The registration and authentication component
includes the collection of basic data to create a
user profile, as well as the use of Multi-Factor
Authentication (MFA) to ensure access security.
Data collection component. The data collection
interface includes forms and APIs for user input.
The next step is to check the entered data for
correctness and compliance with the
requirements, i.e. data validation.</p>
      <p>Data processing component. This step involves
anonymization and pseudo-anonymization,
removal or replacement of identifying data to</p>
      <p>protect privacy, and data masking and
perturbation.</p>
      <p>Data storage component. Blockchain integration,
IPFS (InterPlanetary File System), and traditional
databases are used to ensure immutability and
transparency in the storage and processing of
personal data, each of which has its advantages
and applications in the service architecture.</p>
      <p>Consent management component. Smart
contracts automate the process of obtaining and
storing user consent, and an audit log records all
data actions to ensure transparency and GDPR
compliance.</p>
      <p>
        Blockchain integration ensures the immutability of
records by storing transactional data, including user consent
to the processing of their data. This ensures that no record
can be modified or deleted [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. In addition, every entry in
the blockchain is verifiable, which promotes a high level of
trust from users and regulatory authorities. The use of smart
contracts allows you to automate the management of
consents and the implementation of privacy policies, which
increases efficiency and reduces the risk of errors since they
ensure the fulfillment of defined conditions without the
need for human intervention.
      </p>
      <p>The architectural diagram illustrates the components of
the service for collecting and storing personal data. In this
architecture:</p>
      <p>Registration and authentication are provided
through the user interface and the authentication
server.</p>
      <p>Data collection takes place using web forms and
APIs, which are checked by a validation system.</p>
      <p>Data processing includes anonymization,
pseudoanonymization, and other processing methods to
ensure confidentiality.</p>
      <p>Data is stored on a blockchain for immutability, on
IPFS nodes for file integrity, and in a relational
database for metadata.</p>
      <p>Consent management is automated using smart
contracts, and an audit log records all data actions.</p>
      <p>The proposed architecture ensures a high level of
security and privacy of personal data, considering GDPR
requirements, thanks to the integration of blockchain, IPFS,
and smart contracts.</p>
      <p>The developed architecture of the personal data
protection system ensures a high level of security and
confidentiality of user information, combining innovative
technologies with advanced data processing methods. The
system includes several key components, each of which
performs specific functions to ensure reliable data protection.</p>
      <p>
        The registration and authentication component plays an
important role in securing access to the system. It
implements the creation and management of user profiles
using MFA [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], which includes, for example, a combination
of passwords and biometrics. This allows for a significant
increase in the level of security, reducing the risks of
unauthorized access. Databases store user information, and
security protocols such as OAuth 2.0 and OpenID Connect
provide secure authentication.
      </p>
      <p>The data collection component includes interfaces that
allow users to enter data through forms and APIs. Entered
data undergoes thorough validation for correctness and
compliance with requirements, which reduces the risk of
errors and ensures high data quality. This component
integrates with the front end (HTML, CSS, JavaScript) and
RESTful APIs that allow efficient interaction with the
system.</p>
      <p>The data processing component uses anonymization and
pseudo-anonymization techniques to remove or replace
identifying data that protects user privacy. This also
includes data masking and perturbation techniques that
preserve the usefulness of the data for analysis while
minimizing the risks of leaking sensitive information.
Libraries such as Pandas (Python) and DataFrame
(JavaScript) are used for data processing.</p>
      <p>The data storage component provides the use of
blockchain, IPFS (InterPlanetary File System), and
traditional databases to store personal data. Blockchain
ensures the immutability and transparency of records,
allowing accurate tracking of all data activities, which is
critical for GDPR compliance. IPFS allows you to store data
in a distributed environment, increasing its availability and
protection against malicious attacks. Traditional databases
such as SQL and NoSQL are used to store structured data
with high access speed.</p>
      <p>
        The consent management component automates the
process of obtaining and storing user consent using smart
contracts. Smart contracts written in languages such as
Solidity for Ethereum [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] act as automated agents that
control access to data according to established rules and user
consent. An audit log, which is kept recording all data
actions, ensures transparency and compliance with GDPR
requirements.
      </p>
      <p>Compared to traditional centralized data storage
systems, the developed architecture has several key
advantages. It provides a higher level of security thanks to
the use of blockchain and data anonymization methods,
which reduces the risks of unauthorized access and data
leaks. Transparency of data processing processes is achieved
through blockchain records and an audit log, facilitating
GDPR compliance. The use of smart contracts automates
consent management and data processing processes,
increasing efficiency and reducing the risk of errors.</p>
      <p>Thus, the developed architecture presented in Fig. 1 is
more effective and safer for protecting personal data,
meeting GDPR requirements, and ensuring a high level of
privacy in the face of growing cyber security threats.
The data storage system is made using a combination of
blockchain, NFT, and IPFS technologies and plays the role of
the core of the entire system, which is responsible for the
secure storage of user data and ensuring access to this data.
One of the key points is that this system must use a hybrid
type of blockchain, as it is this type that allows for the
possibility of delimiting access to blockchain records, as they
contain user identifiers, therefore, to meet GDPR
requirements, access to such data must be limited.</p>
      <p>IPFS is used to store user data associated with an ID in a
location outside the blockchain network to ensure the
blockchain network’s speed is maintained and its size
minimized, as any excess data on the blockchain will
increase its size and decrease its speed. Another, no less
important criterion for the need to use the IPFS system is the
need to ensure the possibility of deleting user data from the
system if necessary. Since one of the properties of the
blockchain is the impossibility of deleting data from it, the
only possible option to ensure the possibility of deleting
such data is to store them outside the blockchain network.
Therefore, saving personal information in IPFS allows you
to ensure that information is saved in a protected form from
changes, as well as to ensure the possibility of deleting data
from the system if necessary.</p>
      <p>
        The last element that connects these technologies into
one data accounting system is NFT (Non-Fungible Tokens)
[
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. This innovative technology opens new perspectives for
the identification and management of unique digital assets
in the blockchain. In the context of personal data storage and
management, NFT allows the creation of unique identifiers
that can be associated with specific data sets in the
decentralized file system IPFS (InterPlanetary File System).
This ensures not only the tracking of data integrity and its
immutability but also provides the ability to manage access
to this data using smart contracts.
      </p>
      <p>The use of NFT in the context of personal data
protection allows you to enter additional parameters and
metadata for each digital asset. For example, this may
involve setting access rights at different levels for different
users or groups of users. In addition, NFT can reflect data
ownership rights, information processing conditions, and
data access and use rules, which allows the creation of a
more detailed and flexible data management system.
This approach significantly increases the level of security of
personal data, because each element of information can be
cryptographically protected and has clearly defined access
conditions. Using NFT allows you to make the data
management process more automated, efficient, and
compliant with modern privacy protection requirements
and regulatory standards, particularly GDPR.</p>
      <p>The next element that should ensure the protection of
personal data in this system is the data processing and
presentation module. Its functioning is based on the use of
smart contract technology. As you know, smart contracts
are self-executing code in the blockchain network that
executes when certain criteria are met. Accordingly, their
use in this module allows you to avoid the human factor and
manage access to information according to predetermined
procedures, to ensure trust in such a mechanism, the code of
such a smart contract must be publicly available, which
again indicates the need to use a hybrid blockchain network.
Because it gives the possibility to control the access to the
information that is processed, for example, it will allow
hiding user IDs, but it will allow access to the code of the
smart contract, which will allow users to be assured of its
reliability.</p>
      <p>This smart contract should manage access to user data
and ensure that information is provided to users in the form
to which they have the right to access. Also, if necessary,
grant the right to change information if the system user has
the appropriate privileges.</p>
      <p>In this approach, information is processed according to
predefined principles in smart contracts. The use of this
method allows to ensure trust in the system through the
transparency of information processing mechanisms and
collegial control over them.</p>
      <p>Also, the presence of personal data in the information
circulating in the network indicates that the use of an
opentype blockchain is impractical, therefore the basis of such a
system will be a hybrid-type blockchain network that allows
delimiting access to information that circulates in it, which
will allow delimiting identifiers users and other personal
information, from other information that may be in the
public domain, such as the previously mentioned smart
contracts. Accordingly, the use of a hybrid blockchain will
allow for maintaining trust in information processing
mechanisms, leaving them in public access, and at the same
time ensure the concealment of network user data while
maintaining access to them only for predefined categories of
network users.</p>
      <p>
        Similar approaches are described in [
        <xref ref-type="bibr" rid="ref20 ref21">20-21</xref>
        ].
In Fig. 2 the flow of updating or creating new data entry is
depicted.
      </p>
      <p>The algorithm in this case would go through these steps:
1.
2.
3.
4.</p>
      <p>The data subject wants to update existing data.</p>
      <p>The data subject goes to the processing module
and fills in data to update and user ID.</p>
      <p>The processing module forwards the request to
the smart contract.</p>
      <p>Smart contract checks data subject access rights
and if successful forwards request to IPFS.</p>
      <p>IPFS updates necessary data updates the hash of
data entry, and returns it to the smart contract.</p>
      <p>Smart contract updates the entry in NFT that
exists in the blockchain.</p>
      <p>Users receive the updated NFT from the
blockchain.</p>
      <p>In this scenario, the smart contract is responsible for
managing the access rights to data modification that is
stored in the IPFS. The usage of NFTs is required to provide
opportunities for data modification, as usage of pure
blockchain is impossible due to data immutability.</p>
      <p>On the other hand, the request for data reading will be
quite close to the updated one. However, it will have a
different flow after the read request is obtained by a smart
contract. The Fig. 3 depicts the flow.
The request to read data will go through the following
stages:</p>
      <p>The system user forms a request for access to
information and submits it together with his
identifier to the data processing and presentation
module.</p>
      <p>The data presentation module provides the user
ID to the smart contract, which checks the user’s
access rights forms an access request according to
the user’s status, and passes it to IPFS.</p>
      <p>IPFS forms a sample of data according to the given
parameters and passes the sample back to the data
processing and presentation module.</p>
      <p>The sample is transferred to the user.</p>
      <p>In this approach, access control is provided by the use of
a smart contract, which is a key element in the processing
and presentation module, as it is responsible for demarcating
and verifying users’ access rights to information.</p>
      <p>Considering these two flows, the smart contract
becomes a crucial part of the whole system, as it is
responsible for whole data access control. That’s why the
usage of a hybrid blockchain is necessary to provide clarity
of algorithms used in that smart contract for every user of
the proposed system. This will increase the trust in the
network and opportunities for finding any vulnerabilities by
users of the network.</p>
      <p>Moreover, the usage of the right consensus mechanisms
is crucial to the smooth working of such a system.
Considering that the proposed system should process
several transactions the consensus mechanism with high
productivity should be chosen. In this case such mechanisms
as proof of stake or delegated proof of stake.</p>
      <p>Table 2 provides a comparison of the proposed
architecture based on blockchain, smart contracts, and IPFS
with traditional centralized systems, and public and private
blockchains. Each row of the table discusses the advantages
and disadvantages of each architecture in terms of data
immutability, consent management, anonymization,
decentralized storage, scalability, speed of access, legal
aspects, data erasure, privacy and security, access control,
transparency of data processing mechanisms, and auditing.</p>
      <p>The proposed architecture, which combines blockchain,
smart contracts, and IPFS, has significant advantages over
traditional centralized systems, as well as public and private
blockchains.</p>
      <p>First, the high immutability and transparency of records
guaranteed by using blockchain, makes this architecture
more reliable compared to centralized systems where data
can be changed or deleted. Consent management using
smart contracts automates processes, reducing the risk of
errors and delays that often occur in centralized systems.</p>
      <p>Anonymization and pseudo-anonymization
technologies allow for a high level of protection of personal
information, which makes this architecture more reliable
compared to centralized systems. Decentralized data storage
with IPFS increases data availability and security, avoiding
the single point of failure typical of centralized systems.</p>
      <p>Access control implemented through smart contracts
provides flexible and reliable protection of confidential
information. Transparency of data processing mechanisms,
achieved through smart contracts, increases user trust and
simplifies auditing. Immutable records and transparent
smart contracts also facilitate auditing and regulatory
compliance, which is an important advantage in today's
regulatory environment.</p>
      <p>Public blockchains
Advantages: High
transparency and
immutability of
records.</p>
      <p>Disadvantages: Less
privacy.</p>
      <p>Advantages:
Automated consent
management.</p>
      <p>Disadvantages: High
complexity of
implementation.</p>
      <p>Advantages: High
level of anonymity.</p>
      <p>Disadvantages:
Implementation
difficulties for
sensitive data.</p>
      <p>Advantages: High
reliability and
availability.</p>
      <p>Disadvantages: High
maintenance costs.</p>
      <p>Disadvantages:
Scalability issues
due to a large
number of
transactions.</p>
      <p>Advantages: Fast
read speed
Disadvantages:
Slower write speed
due to transaction
confirmation and
decentralized storage.</p>
      <p>Disadvantages: Data
remains unchanged,
making GDPR
compliance difficult
to achieve.</p>
      <p>Advantages: High
security.</p>
      <p>Disadvantage:
Privacy may be
compromised due to
public access.</p>
      <p>Disadvantage: Open
data access can be
problematic for
sensitive data.</p>
      <p>Advantages: High
transparency of data
processing.</p>
      <p>Disadvantages:
Privacy may be
compromised.</p>
      <p>Advantages: Easy to
audit due to
immutable records.</p>
      <p>Disadvantages:
Privacy may be
compromised.</p>
      <p>Private blockchains
Advantages: Controlled
access to records.</p>
      <p>Disadvantages: Less
transparency compared
to public blockchains.</p>
      <p>Advantages: Automated
consent management,
easier to monitor.</p>
      <p>Disadvantages: Difficulty
of implementation.</p>
      <p>Advantages: High
confidentiality.</p>
      <p>Disadvantages: Less
anonymous compared to
public blockchains.</p>
      <p>Advantages: High
reliability and
availability, easier to
control.</p>
      <p>Disadvantages: High
maintenance costs.</p>
      <p>Advantages: Better
scalability compared to
public blockchains.</p>
      <p>Disadvantages: There are
scalability issues.</p>
      <p>Advantages: High-speed
data access.</p>
      <p>Disadvantages: Possible
delays due to internal
checks.</p>
      <p>Disadvantages: Data
remains unchanged,
making GDPR
compliance difficult to
achieve.</p>
      <p>Advantages: High
privacy and security.</p>
      <p>Disadvantage: Less
transparency compared
to public blockchains.</p>
      <p>Advantages: Flexible
access control.</p>
      <p>Disadvantage: High
setup and management
costs.</p>
      <p>Disadvantages: Less
transparent compared to
public blockchains.</p>
      <p>Advantages: Easy to
audit.</p>
      <p>Disadvantages: Less
transparent compared to
public blockchains.</p>
      <p>
        Therefore, the proposed architecture is more reliable,
transparent, and secure compared to traditional centralized
systems, and has advantages over public and private
blockchains due to the possibility of flexible access
management and data privacy protection. Although the
implementation of such a system can be complex and costly.
One of the methods that can help with the development of
such a system can become the usage of dataflow design
principles proposed in this study [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], as they will help to
classify and represent information that is processed in the
system which is an important part of access delimiting.
Considering the requirements of the proposed system, the
Solana network can be used as a basis for such a system, as
it focuses on solving the scalability and speed issues of
blockchain while providing an opportunity to create smart
contracts and decentralized applications. The study [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]
shows that the Solana network can be used in cases, where
high speed of transactions and security are required.
      </p>
      <p>Considering the advantages of the proposed system,
they make it a promising solution for storing and processing
personal data in today’s world.</p>
    </sec>
    <sec id="sec-2">
      <title>3. Conclusions</title>
      <p>In this work, the concept of a service for collecting and
storing personal data that meets the requirements of the
General Data Protection Regulation (GDPR) was developed.
The proposed service architecture uses innovative
technologies, including blockchain, smart contracts, NFT,
and the IPFS decentralized file system, to ensure a high level
of privacy and data security.</p>
      <p>The core components of the system include modules for
registration and MFA, data collection and processing, as
well as blockchain and IPFS data storage. The use of
blockchain technology ensures the immutability and
transparency of records of transactions and user consent,
while IPFS guarantees the integrity and security of stored
files.</p>
      <p>In addition, the integration of smart contracts automates
the management of consents and the implementation of
privacy policies, and the mirror database allows you to work
efficiently with anonymized data, keeping it safe and
reducing the risk of disclosure of confidential information.</p>
      <p>The integration of MFA increases the level of security at
all stages of working with the system. MFA includes the use
of passwords, SMS codes, authenticator applications, and
biometric data, which provide an additional level of
protection and prevent unauthorized access to personal
data.</p>
      <p>This approach allows to ensure compliance with GDPR
requirements and increases user trust in the service. The use
of multi-factor authentication ensures that only authorized
users have access to the system, reducing the risk of
unauthorized access and increasing the overall level of
security.</p>
      <p>In general, the proposed concept demonstrates the
possibility of creating a reliable and effective system for
collecting and storing personal data that meets modern
requirements for protecting privacy and information
security. The use of blockchain technologies, smart
contracts, decentralized storage systems, and multi-factor
authentication allows you to significantly improve data
management and ensure their protection at a high level.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>F.</given-names>
            <surname>Casino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Dasaklis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Patsakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Systematic</given-names>
            <surname>Literature</surname>
          </string-name>
          <article-title>Review of Blockchain-Based Applications: Current Status, Classification</article-title>
          and Open Issues,
          <source>Telematics and Informatics</source>
          <volume>36</volume>
          (
          <year>2019</year>
          )
          <fpage>55</fpage>
          -
          <lpage>81</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.tele.
          <year>2018</year>
          .
          <volume>11</volume>
          .006.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Cheng</surname>
          </string-name>
          , W. Jiang,
          <article-title>Sharding and Layer 2 on Blockchain: A Comprehensive Survey</article-title>
          , arXiv: preprint (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>K.</given-names>
            <surname>Christidis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Devetsikiotis</surname>
          </string-name>
          ,
          <article-title>Blockchains and Smart Contracts for the Internet of Things, IEEE Access 4 (</article-title>
          <year>2019</year>
          )
          <fpage>2292</fpage>
          -
          <lpage>2303</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2016</year>
          .
          <volume>2566339</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dong</surname>
          </string-name>
          , et al.,
          <article-title>Blockchain for Secure and Trustworthy IoT: A Survey, IEEE Access 9 (</article-title>
          <year>2021</year>
          )
          <fpage>4955</fpage>
          -
          <lpage>4971</lpage>
          . doi:
          <volume>10</volume>
          .1109/JIOT.
          <year>2019</year>
          .
          <volume>2920987</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>N.</given-names>
            <surname>Kaaniche</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Laurent</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Ayed</surname>
          </string-name>
          ,
          <article-title>A BlockchainBased Data Usage Auditing Architecture with Enhanced Privacy Protection</article-title>
          ,
          <source>IEEE Transactions on Dependable and Secure Computing</source>
          (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .1109/TDSC.
          <year>2020</year>
          .
          <volume>2965</volume>
          094.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>L.</given-names>
            <surname>Caldas</surname>
          </string-name>
          , et al.,
          <article-title>Development of a Social Network for Research Support and Individual Well-Being Improvement</article-title>
          , in: IEEE/ACM International Conference on Advances in
          <source>Social Networks Analysis and Mining (ASONAM)</source>
          (
          <year>2018</year>
          )
          <fpage>383</fpage>
          -
          <lpage>386</lpage>
          . doi:
          <volume>10</volume>
          .1109/ASONAM.
          <year>2018</year>
          .
          <volume>8508365</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , et al.,
          <source>Research on Blockchain Consensus Algorithm for Large-Scale High-Concurrency Power Transactions, 9th International Forum on Electrical Engineering and Automation</source>
          (
          <year>2022</year>
          )
          <fpage>1221</fpage>
          -
          <lpage>1225</lpage>
          . doi:
          <volume>10</volume>
          .1109/IFEEA57288.
          <year>2022</year>
          .
          <volume>10037907</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>B.</given-names>
            <surname>Bèatrix-May</surname>
          </string-name>
          , et al.,
          <article-title>Integrating Blockchain Technology in a Cyber Physical System to Secure Data, 24th</article-title>
          <source>International Conference on Control Systems and Computer Science (CSCS)</source>
          , (
          <year>2023</year>
          )
          <fpage>325</fpage>
          -
          <lpage>328</lpage>
          . doi:
          <volume>10</volume>
          .1109/CSCS592 11.
          <year>2023</year>
          .
          <volume>00058</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>C.</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Choubey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Rana</surname>
          </string-name>
          ,
          <article-title>Blockchain-based Smart Contracts for IoT-based Autonomous Industrial Systems</article-title>
          , in: IEEE Internet of Things Journal (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .1109/JIOT.
          <year>2020</year>
          .
          <volume>2967715</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Rajput</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <article-title>A Decentralized Framework for Identity Management Using Blockchain, IEEE Access 8 (</article-title>
          <year>2020</year>
          )
          <fpage>171653</fpage>
          -
          <lpage>171665</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2020</year>
          .
          <volume>3024323</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ni</surname>
          </string-name>
          ,
          <article-title>A Blockchain-based Solution for Enhancing Security and Privacy in Online Social Networks</article-title>
          ,
          <source>IEEE Transactions on Computational Social Systems</source>
          (
          <year>2021</year>
          ) doi: 10.1109/TCSS.
          <year>2021</year>
          .
          <volume>3063921</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Hasan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Salah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Jayaraman</surname>
          </string-name>
          ,
          <article-title>Blockchain-Based Provenance for the Internet of Things: Opportunities, Challenges, and Directions</article-title>
          ,
          <source>IEEE Internet of Things J</source>
          .
          <volume>7</volume>
          (
          <issue>5</issue>
          ) (
          <year>2020</year>
          )
          <fpage>4039</fpage>
          -
          <lpage>4062</lpage>
          . doi:
          <volume>10</volume>
          .1109/JIOT.
          <year>2019</year>
          .
          <volume>2956522</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <article-title>Blockchain: A Game Changer for Securing IoT Data, Future Generation Comput</article-title>
          .
          <source>Syst</source>
          .
          <volume>139</volume>
          (
          <year>2023</year>
          )
          <fpage>10</fpage>
          -
          <lpage>24</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.
          <source>future.202 3</source>
          .01.005.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ren</surname>
          </string-name>
          ,
          <article-title>Blockchain-Based Decentralized Identity Management for Secure Personal Data Sharing, Comput</article-title>
          . Secur.
          <volume>124</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .1016/j.cose.
          <year>2023</year>
          .
          <volume>103013</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>V.</given-names>
            <surname>Poberezhnyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Balatska</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Opirskyy</surname>
          </string-name>
          ,
          <article-title>Development of the Learning Management System Concept based on Blockchain Technology, in: Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3550</volume>
          (
          <year>2023</year>
          )
          <fpage>143</fpage>
          -
          <lpage>156</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>V.</given-names>
            <surname>Balatska</surname>
          </string-name>
          , et al.,
          <source>Blockchain Application Concept in SSO Technology Context, in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>38</fpage>
          -
          <lpage>49</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>N.</given-names>
            <surname>Al-Khater</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Omar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Al-Debsi</surname>
          </string-name>
          ,
          <article-title>Leveraging Blockchain for Privacy-preserving Data Aggregation in Smart Grids</article-title>
          ,
          <source>Energy Reports</source>
          <volume>10</volume>
          (
          <year>2024</year>
          )
          <fpage>202</fpage>
          -
          <lpage>214</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.egyr.
          <year>2023</year>
          .
          <volume>12</volume>
          .004.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>S.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Park</surname>
          </string-name>
          ,
          <article-title>Blockchain-based Secure Framework for IoT Device Authentication</article-title>
          and
          <string-name>
            <given-names>Data</given-names>
            <surname>Integrity</surname>
          </string-name>
          ,
          <source>Internet of Things</source>
          <volume>22</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .1016/j.iot.
          <year>2023</year>
          .
          <volume>100526</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>T.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <article-title>Blockchain-enabled Federated Learning for Secure and Privacy-preserving Data Sharing in Smart Cities, Future Generation Comput</article-title>
          .
          <source>Syst</source>
          .
          <volume>141</volume>
          (
          <year>2024</year>
          )
          <fpage>98</fpage>
          -
          <lpage>109</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.future.
          <year>2023</year>
          .
          <volume>02</volume>
          .012.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zaliskyi</surname>
          </string-name>
          ,
          <article-title>Method of sequential estimation of statistical distribution parameters in control systems design</article-title>
          ,
          <source>IEEE 3rd International Conference on Methods and Systems of Navigation and Motion Control</source>
          ,
          <source>MSNMC 2014 - Proceedings</source>
          (
          <year>2014</year>
          )
          <fpage>135</fpage>
          -
          <lpage>138</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Averyanova</surname>
          </string-name>
          , et al.,
          <source>UAS Cyber Security Hazards Analysis and Approach to Qualitative Assessment, Lecture Notes in Networks and Systems</source>
          ,
          <volume>290</volume>
          (
          <year>2021</year>
          )
          <fpage>258</fpage>
          -
          <lpage>265</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <article-title>Critical aviation information systems cybersecurity, Meeting Security Challenges Through Data Analytics and Decision Support (</article-title>
          <year>2016</year>
          )
          <fpage>308</fpage>
          -
          <lpage>316</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>O.</given-names>
            <surname>Deineka</surname>
          </string-name>
          et al.,
          <article-title>Designing Data Classification and Secure Store Policy According to SOC 2 Type II</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>398</fpage>
          -
          <lpage>409</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>S.</given-names>
            <surname>Vasylyshyn</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Opirskyy</surname>
          </string-name>
          ,
          <source>Combat Drone Swarm System (CDSS) Based on Solana Blockchain Technology, 7th International Workshop On Computer Modeling and Intelligent Systems</source>
          , vol.
          <volume>3702</volume>
          (
          <year>2024</year>
          )
          <fpage>179</fpage>
          -
          <lpage>191</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>