DocumentCode :
3002819
Title :
Chaining for securing data provenance in distributed information networks
Author :
Xinlei Wang ; Kai Zeng ; Govindan, Kannan ; Mohapatra, Prasant
Author_Institution :
Dept. of Comput. Sci., Univ. of California, Davis, Davis, CA, USA
fYear :
2012
fDate :
Oct. 29 2012-Nov. 1 2012
Firstpage :
1
Lastpage :
6
Abstract :
Entities in an information communication network may use various types of collaborative networking for sharing information such as documents, sensing reports, datasets, etc. The derivation history (i.e., the provenance) of the information plays a very important role in such a networking environment. For example, provenance can be used for information trustworthiness assessment, copyright clearance, data reconciliation, and data replication. While substantial research efforts have focused on these usages of provenance, very limited work has focused on the security issues of the provenance, which is the prerequisite of any provenance-based information analysis systems. In this paper, we explore the security properties of provenance meta-data compared to other general user data in a distributed network environment. We introduce a “chain-structure” provenance scheme to provide security assurance for the provenance meta-data in three dimensions - confidentiality, integrity and availability. Our scheme outperforms the previously proposed “onion-structure” provenance security scheme in terms of the flexibility, protection capability as well as computational overhead.
Keywords :
data communication; meta data; public key cryptography; telecommunication security; chain-structure provenance scheme; computational overhead; copyright clearance; data provenance security; data reconciliation; data replication; distributed information networks; information communication network; networking environment; onion-structure; protection capability; provenance meta-data; provenance-based information analysis systems; security properties; trustworthiness assessment; Availability; Encryption; History; Payloads; Public key; Data Provenance; Distributed Information Networks; Provenance Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
MILITARY COMMUNICATIONS CONFERENCE, 2012 - MILCOM 2012
Conference_Location :
Orlando, FL
ISSN :
2155-7578
Print_ISBN :
978-1-4673-1729-0
Type :
conf
DOI :
10.1109/MILCOM.2012.6415609
Filename :
6415609
Link To Document :
بازگشت