政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/140718
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 111316/142225 (78%)
造访人次 : 48382279      在线人数 : 232
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    请使用永久网址来引用或连结此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/140718


    题名: 新技術與個資保護的衝突與調適 —以區塊鏈技術為中心
    The Conflict and Adjustment between New Technology and Personal Data Protection: A focus on Blockchain Technology
    作者: 楊岱瑾
    Yang, Tai-Chin
    贡献者: 宋皇志
    Sung, Huang-Chih
    楊岱瑾
    Yang, Tai-Chin
    关键词: 區塊鏈
    個人資料保護法
    去識別化
    被遺忘權
    GDPR
    Blockchain
    Personal Data Protection Act
    The right to be forgotten
    De-Identification
    General Data Protection Regulation(GDPR)
    日期: 2022
    上传时间: 2022-07-01 16:32:57 (UTC+8)
    摘要: 隨著資訊技術提升與巨量資料普及,數位足跡與各種多元資料被紀錄留存的方式增加,併與生物辨識技術、人工智慧等技術輔助,各種型態之資料與個人身分的連結性逐漸增強,個人資料保護之重要性日益提升。
    本文旨在以區塊鏈技術為中心,探討新技術與個資保護的衝突與可能風險管理措施,隨著區塊鏈的應用日益普及,應用場景與態樣日趨多元,其去中心化、高度透明之特性有助於資料的紀錄、公開驗證、以及辨識真偽,在數位數據的留存下儼然成為一種新興信任方式,然而此種新型去中心化之技術態樣與個人資料保護以中心化做為思考準繩存有相互抗衡之疑慮,如去識別化之再識別風險、被遺忘權等議題。
    針對區塊鏈技術與個人資料保護之矛盾,各國相繼提出可能可行之解釋以及技術方法,故本文以可行之資料去識別技術、提升鏈上資料安全性技術以及鏈上資料刪除的可能作法三構面進行技術方法分析整理,試圖解構資料在區塊鏈上依序可能遇到的問題,並整理相應解決辦法,最後試圖整理出有別於先前研究多建議採用之脫鏈儲存方式,以分別就區塊鏈架構端以及監理端給與參考策略,以期區塊鏈技術及個人資料保護兩者在發展上能夠同步並茂。
    With the advancement of information technology and the widespread of big data, the ways in which digital footprints and various kinds of data are recorded and retained have increased, and with the assistance of biometric technology, artificial intelligence, etc. the connection between various types of data and personal identity has gradually increased. And the importance of personal information protection is increasing day by day.
    This study focuses on blockchain technology to discuss the conflict between new technologies and personal information protection and possible risk management measures. The characteristics of decentralized and a high degree of transparency are helpful for data recording, public verification, and identification of authenticity. With the retention of digital data, it has become a new way of trust. However, there are some paradoxes since this new type of technology is decentralized while the regulation of personal data protection are focus on centralized issue. Such as the risk of re-identification and the right to be forgotten.
    In response to the contradiction between blockchain technology and personal information protection, various countries have successively proposed possible explanations and technical methods. Therefore, this article uses feasible de-identification technologies, technologies to improve the security of data on the blockchain, and possible methods for data deletion on the blockchain. Analyzed and sorted out technical methods, tried to deconstruct the problems that data may encounter in sequence on the blockchain, and sorted out corresponding solutions, and tried to sort out the methods that are different from previous studies which focus on off-chain storage. In the end, tried to provide reference strategies to the blockchain architecture side and the supervision side, in order to synchronize the development of blockchain technology and personal data protection.
    參考文獻: 一、中文期刊論文
    1. 王紹睿. (2018). 淺談人工智慧系統的隱私資訊安全保護機制. 科儀新知, (215), 74-84.
    2. 刘炜, 彭宇飞, 田钊, 盛朝阳, 李阳, & 佘维. (2021). 基于区块链的医疗信息隐私保护研究综述. 郑州大学学报 (理学版), 53(2), 1-18.
    3. 宋皇志. (2018). 巨量資料交易之法律風險與管理意涵-以個人資料再識別化為中心. 管理評論, 37(4), 37-51.
    4. 李思壯, & 黃彥男. (2019). 數位時代之數位隱私保護. 國土及公共治理季刊, 7(4), 30-39.
    5. 袁勇, & 王飞跃. (2020). 可编辑区块链: 模型, 技术与方法. 自动化学报, 46(5), 831-846.
    6. 郭戎晉. (2021). 論區塊鏈技術與歐盟一般資料保護規則之衝突. 臺大法學論叢, 50(1), 69-152.
    7. 陳恭, & 蕭婕. (2018). 運用區塊鏈打造公共治理新局面. 國土及公共治理季刊, 6(4), 50-61.,頁57。
    8. 靳世雄, 张潇丹, 葛敬国, 史洪彬, 孙毅, 李鸣, ... & 姚忠将. (2021). 区块链共识算法研究综述. Journal of Cyber Security 信息安全学报, 6(2) ,頁89、90。
    9. 劉定基(2012),個人資料的定義、保護原則與個人資料保護法適用的例外—以監視錄影為例(下),《月旦法學教室》,第119期,頁41。
    10. 蕭奕弘(2018),〈健保資料庫行政訴訟案:醫學研究與資料隱私間的衝突〉,《月旦醫事法報告》,第19期,頁95。

    二、外文文獻
    (一)英文期刊論文
    1. Yang, M., Margheri, A., Hu, R., & Sassone, V. (2018). Differentially private data sharing in a cloud federation with blockchain. IEEE Cloud Computing, 5(6), 69-79.
    2. Berberich, M., & Steiner, M. (2016). Blockchain technology and the GDPR-how to reconcile privacy and distributed ledgers. Eur. Data Prot. L. Rev., 2, 422.
    3. Chang, H. (2018). Is distributed ledger technology built for personal data?. Journal of Data Protection & Privacy, 1(4), 410-418.
    4. Cohen, J. E. (2019). Internet utopianism and the practical inevitability of law. Duke Law & Technology Review, 18(1).
    5. Daoui, S., Fleinert-Jensen, T., & Lemperiere, M. (2019). GDPR, Blockchain and the French Data Protection Authority: Many Answers but Some Remaining Questions. Stan. J. Blockchain L. & Pol`y, 2, 1.
    6. Dwork, C. (2008, April). Differential privacy: A survey of results. In International conference on theory and applications of models of computation (pp. 1-19). Springer, Berlin, Heidelberg.
    7. Feistel, H. (1973). Cryptography and Computer Privacy. Scientific American, 228(5), 15–23.
    8. Finck, M. (2018). Blockchain regulation and governance in Europe. Cambridge University Press.
    9. Finck, M., & Pallas, F. (2020). They who must not be identified—distinguishing personal from non-personal data under the GDPR. International Data Privacy Law.
    10. Finck, M. (2018). Blockchains and data protection in the European Union. Eur. Data Prot. L. Rev., 4, 17.
    11. Gilbert, F. (2011). European data protection 2.0: new compliance requirements in sight-what the proposed EU data protection regulation means for us companies. Santa Clara Computer & High Tech. LJ, 28, 815.
    12. Giuseppe Ateniese et al., Redactable Blockchain – or – Rewriting History in Bitcoin and Friends (Apr. 26-28, 2017), in 2017IEEEEUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), July 2017, at 111, 112-13
    13. Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1), 186-208.
    14. Graux, H., Ausloos, J., & Valcke, P. (2012). The right to be Forgotten in the Internet Era. ICRI research paper, (11).
    15. iménez-Gómez, B. S. (2019). Risks of Blockchain for Data Protection: A European Approach. Santa Clara High Tech. LJ, 36, 281.
    16. international conference on the theory and applications of cryptographic techniques (pp. 457-473). Springer, Berlin, Heidelberg.
    17. Krishnan, S., Balas, V. E., Golden, J., Robinson, Y. H., Balaji, S., & Kumar, R. (Eds.). (2020). Handbook of research on blockchain technology. Academic Press.
    18. L. Sweeney (2002), International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10 (5), 571.
    19. lorian, M., Henningsen, S., Beaucamp, S., & Scheuermann, B. (2019, June). Erasing data from blockchain nodes. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 367-376). IEEE.
    20. Mirchandani, A. (2018). The GDPR-blockchain paradox: exempting permissioned Blockchains from the GDPR. Fordham Intell. Prop. Media & Ent. LJ, 29, 1201.
    21. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, 21260.
    22. Narayanan, A., & Shmatikov, V. (2008, May). Robust de-anonymization of large sparse datasets. In Security and Privacy, 2008. SP 2008. IEEE Symposium on (pp. 111-125). IEEE.
    23. Natarajan, H., Krause, S., & Gradstein, H. (2017). Distributed ledger technology and blockchain.
    24. Nikolaus Bertermann (2015). Sind IP-Adressen personenbezogene Daten? K&R, at 106
    25. Purtova, N. (2018). The law of everything. Broad concept of personal data and future of EU data protection law. Law, Innovation and Technology, 10(1), 40-81.
    26. Rustad, M. L., & Koenig, T. H. (2019). Towards a global data privacy standard. Fla. L. Rev., 71, 365.
    27. Sahai, A., & Waters, B. (2005, May). Fuzzy identity-based encryption. In Annual
    28. Wang, S., Wang, X., & Zhang, Y. (2019). A secure cloud storage framework with access control based on blockchain. IEEE access, 7, 112713-112725.
    29. Wang, Y., Liao, X., Xiao, D., & Wong, K. W. (2008). One-way hash function construction based on 2D coupled map lattices. Information Sciences, 178(5), 1391-1406.
    30. Wirth, C., & Kolain, M. (2018). Privacy by blockchain design: a blockchain-enabled GDPR-compliant approach for handling personal data. In Proceedings of 1st ERCIM Blockchain Workshop 2018. European Society for Socially Embedded Technologies (EUSSET)
    (二)英文報告書
    1. Article 29 Data Protection Working Party (2014). Opinion 05/2014 on Anonymisation Techniques
    2. Article 29 Working Party, Opinion 05/2012 on Cloud Computing (WP 196) 01037/12/EN, 12.
    3. Baker McKenzie &R3 (2017). Blockchains and Laws. Are they compatible?
    4. Commission Nationale de l`Informatique et des Libertés [CNIL] (2018). Blockchain and the GDPR: Solutions for a responsible use of the blockchain in the context of personal data.
    5. ENISA (2019), Pseudonymisation techniques and best practices.
    6. EU Blockchain Observatory & Forum (2018. BLOCKCHAIN AND THE GDPR 14
    7. European Parliament (2019)., Blockchain and the General Data Protection Regulation, PE 634.445, 30
    8. European Parliament, Directorate-General for Internal Policies of the Union, Snyers, A., Houben, R. (2018). Cryptocurrencies and blockchain: legal context and implications for financial crime, money laundering and tax evasion, European Parliament
    9. IBM Security White paper (2018). Blockchain and GDPR -How blockchain could address five areas associated with GDPR compliance.
    10. ICO (2012). Anonymisation:managing data protection risk code of practice.
    11. ICO (2014). DELETING PERSONAL DATA 5.
    12. Panel for the Future of Sci. & Tech. [STOA] (July, 2019). Blockchain and the General Data Protection Regulation: Can Distributed Ledgers be Squared with European Data Protection Law?
    13. UK ICO(2018). Automated Decision-making and Profiling.

    三、政府資料
    1. 法務部102年3月12日法律字第10203501470號函。
    2. 法務部民國107年8月30日法律字第10703513050號函。

    四、網路資料
    (一)中文網站
    1. CoinMarketCap,檢自:https://coinmarketcap.com/zh-tw/
    2. Github,区块链技术指南—同态加密,檢自:https://yeasy.gitbook.io/blockchain_guide/05_crypto/homoencryption
    3. IBM,同態加密服務,檢自:https://www.ibm.com/tw-zh/security/services/homomorphic-encryption
    4. INSIDE,【以太坊的倫敦前夕】什麼是 Layer 2?為什麼以太 2.0 來臨之前需要它?,2021年6月8日。檢自:https://www.inside.com.tw/feature/before-ethereum-london-hard-fork/23793-ethereum-layer-2
    5. 王慕民,動態IP位址是不是個人資料?歐盟法院這樣看,2016年7月4日,檢自:https://www.davinci.idv.tw/news/487
    6. 金融監督管理委員會,「虛擬通貨平台及交易業務事業防制洗錢及打擊資恐辦法」發布施行,2021年6月22日。檢自:https://www.fsc.gov.tw/ch/home.jsp?id=96&parentpath=0,2&mcustomize=news_view.jsp&dataserno=202106220006&dtable=News
    7. 金融監督管理委員會,金管會同意保險業運用區塊鏈技術申請試辦「保全/理賠聯盟鏈」服務,2020年3月19日。檢自:https://www.fsc.gov.tw/ch/home.jsp?id=96&parentpath=0,2&mcustomize=news_view.jsp&dataserno=202003190002&dtable=News
    8. 動區動趨,新手科普 零知識證明 (zero-knowledge proofs) 詳解,2020年4月29日。檢自:https://www.blocktempo.com/zero-knowledge-proof-zkp-chagelly-column/
    9. 張靜婕,凡走過必留下IP,淺談IP位址是否係屬個資法之個人資料?2011年12月19日,檢自:https://www.davinci.idv.tw/news/43
    10. 歐盟提出現行個資保護指令規範之修正草案, 資訊工業策進會科技法律研究所, 檢自:https://stli.iii.org.tw/article-detail.aspx?no=16&tp=3&i=150&d=6343
    (二)外文網站
    1. Acar G (9 April 2018), Four cents to deanonymize: Companies reverse hashed email addresses, available at: https://freedom-to-tinker.com/2018/04/09/four-cents-to-deanonymize-companies-reverse-hashed-email-addresses/
    2. Business of apps, Binance Revenue and Usage Statistics (2022), available at: https://data.europa.eu/doi/10.2861/280969https://www.businessofapps.com/data/binance-statistics/
    3. Case Study: How Walmart brought unprecedented transparency to the food supply chain with Hyperledger Fabric, available at: https://www.hyperledger.org/learn/publications/walmart-case-study
    4. EDPS, The History of the General Data ProtectionRegulation, available at: https://edps.europa.eu/data-protection/data-protection/legislation/history-general-data-protection-regulation_en#
    5. European Commission -Blockchain Strategy, available at: https://digital-strategy.ec.europa.eu/en/policies/blockchain-strategy
    6. European Commission -European Blockchain Services Infrastructure, available at: https://digital-strategy.ec.europa.eu/en/policies/european-blockchain-services-infrastructure
    7. Europol, Internet Organised Crime Threat Assessment (IOCTA)2020, IOCTA, 9, 28, 58(2020) , available at: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2020?fbclid=IwAR1yK3aQINAdyBRAFtpBb774ACuHhZzIGZb_th5I0hzx5N-Oh0tsLSXYOOE
    8. FinCEN, First Bitcoin Mixer Penalized by FinCEN for Violating Anti-Money Laundering Laws,(2020), available at: https://www.fincen.gov/news/news-releases/first-bitcoin-mixer-penalized-fincen-violating-anti-money-laundering-laws
    9. https://www.supplychainbrain.com/articles/32130-walmart-canada-fixing-a-broken-freight-audit-andpayment-process-with-blockchain
    10. Hyperledger Fabric, About Hyperledger, available at: https://www.hyperledger.org/about
    11. Is Data Really the New Oil in the 21st Century?, Towards Data Science, available at: https://towardsdatascience.com/is-data-really-the-new-oil-in-the-21st-century-17d014811b88
    12. Justin Hectus & Kristy Sambor, Blockchain and GDPR-Frenemies?, L.J.NEWSLS., July 1, 2018, available at: https://finance.yahoo.com/news/blockchain-gdpr-frenemies-065328669.html
    13. Walmart Uses Blockchain to Fix ‘Broken’ Freight Audit and Payment Process, available at: https://www.supplychainbrain.com/articles/32130-walmart-canada-fixing-a-broken-freight-audit-andpayment-process-with-blockchain
    描述: 碩士
    國立政治大學
    科技管理與智慧財產研究所
    109364207
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0109364207
    数据类型: thesis
    DOI: 10.6814/NCCU202200666
    显示于类别:[科技管理與智慧財產研究所] 學位論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    420701.pdf2114KbAdobe PDF214检视/开启


    在政大典藏中所有的数据项都受到原著作权保护.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈