Tickets

Loading…

Raksha M P

@rakshamp

Verifiable Logs and DLT: A recipe for smashing UCC using hashing

Submitted Apr 16, 2019

An “Unsolicited Commercial Communication”(UCC) means a commercial communication which a Subscriber opts not to receive.
For a long time, Telecom Regulatory Authority of India (TRAI) has been a centralized regulating body for any Commercial Communication and now has a mandated for a DLT based solution to mainly overcome problems of cost of regulation apart from establishing proofs

A DLT though helps in creating a decentralized distributed system of trust, doesn’t focus on privacy concerns of the emerging world. The Gartner Survey claims - “By 2021, 75 percent of public blockchains will suffer “privacy poisoning” - inserted personal data that renders the blockchain noncompliant with privacy laws”. [1] and Justice Srikrishna committee report on data protection claims that “Protection of personal data holds the key to empowerment, progress, and innovation.” [2].

Keeping the above claims in consideration, we are presenting a DLT based solution combined with the verifiable logs to regulate the current eco-system of Commercial Communication . The subscriber preferences and consents etc. are stored privately by the ecosystem participants as Merkle tree and Merkle proofs are published to the DLT to help in auditing and addressing complaints automatically . The solution implements the concepts of Signed Root Hashes of Merkle Trees and Sparse Merkle Trees, a distributed append-only data structure, to efficiently store the Consumer Preferences and Consent privately but still provides verifiability for the ecosystem participants.

Additionally, the solution implements APIs and services which are designed to provide an auditing mechanism for validating user preference stored/not stored(Proof of Inclusion and Exclusion) and message delivered, over a time frame along with a Reputation model, to implement an incentivization scheme which ensures discipline in Commercial Communication.

References:
[1] https://www.gartner.com/en/newsroom/press-releases/2018-10-16-gartner-unveils-top-predictions-for-it-organizations-and-users-in-2019-and-beyond
[2] http://meity.gov.in/writereaddata/files/Data_Protection_Committee_Report.pdf

Outline

  1. Overview of the problem and limitations in the solution in the current scenario.
  2. Approach for the solution incorporating Merkle tree as the data structure for validating information providing Merkle path hashes for audit and consistency proofs.
  3. Proposal for distributed append-only logs for tracking history on account of signed root hashes to validate the inclusion at an index in the tree and the entry of the root in the blockchain.
  4. Architecture specifying various components used as Independent registrars for handling various entries, AI for reputation model for the entities, Microservice based architecture.
  5. An On-demand mechanism for auditing.

Requirements

Basic Understanding of Decentralized applications and Blockchain.

Speaker bio

This session will be shared between Harihara Vinayakaram Natarajan, Raksha M P and Prachi Gupta working for Wipro Limited.
Harihara Vinayakaram Natarajan is a Distinguished member of technical staff of Wipro Limited and is a Software Professional with extensive experience(20+ years) with a strong recent focus on Distributed Systems and Machine Learning ( Distributed systems include Blockchain, Cloud, Automation (DevOps) , Log Analytics, Scalable Architectures ) and Big Data. Architected solutions for various domains including Retail, BFSI and Media. Raksha M P(Myself) and Prachi Gupta are blockchain developers working for Wipro CTO Office.

Slides

https://www.slideshare.net/secret/lTYu6Ln1M1wIwA

Comments

{{ gettext('Login to leave a comment') }}

{{ gettext('Post a comment…') }}
{{ gettext('New comment') }}
{{ formTitle }}

{{ errorMsg }}

{{ gettext('No comments posted yet') }}

Hybrid access (members only)

Hosted by

Jump starting better data engineering and AI futures