2012
DOI: 10.1587/transinf.e95.d.1894
|View full text |Cite
|
Sign up to set email alerts
|

Securing Provenance of Distributed Processes in an Untrusted Environment

Abstract: SUMMARYRecently, there is much concern about the provenance of distributed processes, that is about the documentation of the origin and the processes to produce an object in a distributed system. The provenance has many applications in the forms of medical records, documentation of processes in the computer systems, recording the origin of data in the cloud, and also documentation of human-executed processes. The provenance of distributed processes can be modeled by a directed acyclic graph (DAG) where each no… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…This method is applied by Hasan et al [12] to a chain model of the provenance where the provenance is modeled as a chain. Aldeco-Perez et al [1] and Syalim et al [20,19] extend the hash/signature chain to the provenance graph model.…”
Section: Hash/signature Chain Stamping and Counteringmentioning
confidence: 99%
See 2 more Smart Citations
“…This method is applied by Hasan et al [12] to a chain model of the provenance where the provenance is modeled as a chain. Aldeco-Perez et al [1] and Syalim et al [20,19] extend the hash/signature chain to the provenance graph model.…”
Section: Hash/signature Chain Stamping and Counteringmentioning
confidence: 99%
“…To detect the problem of the deletion to a provenance node, Syalim et al proposed countering provenance [20]. The basic idea is a Trusted Counter Server (TCS) assigns a unique consecutive counter number for each node in the provenance graph, so that any deletion to the nodes can be detected from the missing counter number in the nodes.…”
Section: Hash/signature Chain Stamping and Counteringmentioning
confidence: 99%
See 1 more Smart Citation