Title :
Data Provenance with Watermarks for Usage Control Monitors at Disaster Recovery
Author :
Salfer, Martin ; Wohlgemuth, Sven ; Schrittwieser, Sebastian ; Bauer, Bernhard ; Echizen, Isao
Author_Institution :
Nat. Inst. of Inf., Tokyo, Japan
Abstract :
Security restrictions are often lifted for faster disaster recovery. This grants access to external services for providing at least basic infrastructure operation, but puts data at risk. Usage control monitors are supposed to avoid data abuse by watching every movement, yet they appear unfit for a fast roll out and prone to low-level attacks and steganographic tunneling. We propose supplementing monitors with water markers and also sketch out an algorithm for it to integrate provenance information into data itself. So, an auditor can inspect such watermarks, query involved monitors, and tell a legitimate from an illegitimate usage more easily.
Keywords :
business continuity; steganography; watermarking; data provenance; disaster recovery; low-level attacks; security restrictions; steganographic tunneling; usage control monitors; watermarks; Bandwidth; Data models; Monitoring; Payloads; Tunneling; Watermarking; Data Provenance; Monitoring; Resilience; Tunneling; Watermarking;
Conference_Titel :
Internet of Things (iThings/CPSCom), 2011 International Conference on and 4th International Conference on Cyber, Physical and Social Computing
Conference_Location :
Dalian
Print_ISBN :
978-1-4577-1976-9
DOI :
10.1109/iThings/CPSCom.2011.129