Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2013
DOI: 10.1109/tkde.2012.31
|View full text |Cite
|
Sign up to set email alerts
|

Secure Provenance Transmission for Streaming Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 50 publications
(23 citation statements)
references
References 16 publications
0
23
0
Order By: Relevance
“…Summarizing, the invisibility definition requires a good understanding of the data model features as well as the target application. Taking example of provenance [86] where the information is embedded within time differences between consecutive packets, the watermark said to be invisible if it does not introduce large delays in the network. For marking graph structures such as social network data whereby a few vertices or edges are added to the original graph according to watermark values, the watermark is invisible if the number of modified vertices and edges are small and therefore the main properties of the graph such as average path length or its diameter are preserved [58].…”
Section: A Invisibilitymentioning
confidence: 99%
See 3 more Smart Citations
“…Summarizing, the invisibility definition requires a good understanding of the data model features as well as the target application. Taking example of provenance [86] where the information is embedded within time differences between consecutive packets, the watermark said to be invisible if it does not introduce large delays in the network. For marking graph structures such as social network data whereby a few vertices or edges are added to the original graph according to watermark values, the watermark is invisible if the number of modified vertices and edges are small and therefore the main properties of the graph such as average path length or its diameter are preserved [58].…”
Section: A Invisibilitymentioning
confidence: 99%
“…The authors argued that blind watermarking schemes can be used in sensor networks for answering the question "Where did the data come from" whereas non-blind techniques can answer the question of "Is this data mine?". Later on, Sultana et al [86] considered the problem of secure provenance transmission in a data streaming fashion. The presented method constructs an audit trail of data by embedding provenance information within inter-packet delays of consecutive packets from a sensor node over the routing tree.…”
Section: ) Secure Data Provenancementioning
confidence: 99%
See 2 more Smart Citations
“…Also, it is acknowledged that data trustworthiness is an issue greater than security, and the proposed data-exchange infrastructure will allow solutions combining different approaches and techniques including data integrity, data quality, record linkage (Inan et al 2012), and data provenance (Sultana, Shehab and Bertino 2013). For example, the proposed cyber-security data-exchange infrastructure should allow integration of tools that enable the refinement and vetting of data.…”
Section: Privacy Security and Trustworthiness Of Datamentioning
confidence: 99%