Delete data
The process for securely and verifiably deleting data from Encrypted Data Vaults (EDVs) involves the use of Delete Markers:
-
Generation of Delete Transaction: The data owner or issuer () constructs a Delete Transaction () to request the deletion of specific data () from an EDV.
-
Validation by Validator Pool: The Delete Transaction is submitted to an Anchor Node (), which forwards it to the Validator Pool () for authorization checks and dependency assessments.
-
Consensus and Approval: Upon successful validation, reaches consensus on the legitimacy and feasibility of the deletion request, and a consensus record () is appended to the ledger.
-
Communication to EDVs for Deletion: communicates the approved deletion request to all relevant EDVs, which execute the deletion process to irrecoverably erase from storage.
-
Generation and Submission of
DELETE_MARKER
: Following the deletion of , aDELETE_MARKER
() is generated, including transaction details and an updated Merkle root, and recorded in the ledger. -
Compensation and Settlements: Any pending compensations or settlements are resolved, ensuring all parties involved are duly compensated before finalizing the deletion process.
GDPR Compliance
The protocol maintains GDPR compliance through:
- Clear and auditable records of data and file actions
- Proof-of-storage mechanisms to maintain data integrity and availability
- Erasure coding for data redundancy and reliability
- Respecting the right to be forgotten by allowing data deletion by the data issuer or owner
- Blockchain-based record-keeping for transparency and auditability