2012
DOI: 10.1007/978-3-642-27585-2_12
|View full text |Cite
|
Sign up to set email alerts
|

Securing Data Provenance in the Cloud

Abstract: Abstract. Cloud storage offers the flexibility of accessing data from anywhere at any time while providing economical benefits and scalability. However, cloud stores lack the ability to manage data provenance. Data provenance describes how a particular piece of data has been produced. It is vital for a post-incident investigation, widely used in healthcare, scientific collaboration, forensic analysis and legal proceedings. Data provenance needs to be secured since it may reveal private information about the se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 29 publications
(16 citation statements)
references
References 18 publications
0
16
0
Order By: Relevance
“…Moreover, if data is shared with a contact and the contact writes data to the CSP, i.e., modifies, adds or deletes data, the user may want to ensure that the changes really originate from a certain contact (Asghar et al, 2012). On the other hand, when the user writes data, the user may want to certify that changes indeed originates from the user.…”
Section: Data Integrity and Provenancementioning
confidence: 99%
“…Moreover, if data is shared with a contact and the contact writes data to the CSP, i.e., modifies, adds or deletes data, the user may want to ensure that the changes really originate from a certain contact (Asghar et al, 2012). On the other hand, when the user writes data, the user may want to certify that changes indeed originates from the user.…”
Section: Data Integrity and Provenancementioning
confidence: 99%
“…This project builds on the University of Auckland's current work [28]. We will combine previous results on proxy-encryption for simple search operations in a multiuser setting [29][30][31] with our latest work [28,[32][33][34][35][36][37][38] supporting complex matching operations and indexing extensions.…”
Section: Ra2: Protection Of Privacy Of Data During Processing and Stomentioning
confidence: 99%
“…Our idea is that combining several PHE solutions supporting a range of operations can provide enough computation power to be used in several sectors including finance, healthcare and government. We will build from our previous work based on proxy encryption and Elgamal crypto blocks [29,32,33,38].…”
Section: Project 4: Efficient Privacy and Utility Preserving Encryptionmentioning
confidence: 99%
“…They suggested an anonymous authentication and cryptography approach for their security method. [12] proposed the protection mechanism for data provenance which apply an encrypted search to the data. The proposed scheme focuses on improving the searching and query method from the cloud user or regulatory to achieve data confidentiality.…”
Section: Related Workmentioning
confidence: 99%
“…This could cause huge problems because data provenance is used not only in forensic investigation, but also in legal proceeding and scientific collaborations. Trustworthy data provenance is needed in order to provide unforgeability and non-reputation in the data life cycle [12]. Therefore, in order to provide trustworthy data provenance, security elements such as confidentiality, integrity, privacy, and availability should be included in the model.…”
Section: Securing Data Provenancementioning
confidence: 99%