DocumentCode :
3193260
Title :
Data Provenance with Watermarks for Usage Control Monitors at Disaster Recovery
Author :
Salfer, Martin ; Wohlgemuth, Sven ; Schrittwieser, Sebastian ; Bauer, Bernhard ; Echizen, Isao
Author_Institution :
Nat. Inst. of Inf., Tokyo, Japan
fYear :
2011
fDate :
19-22 Oct. 2011
Firstpage :
514
Lastpage :
519
Abstract :
Security restrictions are often lifted for faster disaster recovery. This grants access to external services for providing at least basic infrastructure operation, but puts data at risk. Usage control monitors are supposed to avoid data abuse by watching every movement, yet they appear unfit for a fast roll out and prone to low-level attacks and steganographic tunneling. We propose supplementing monitors with water markers and also sketch out an algorithm for it to integrate provenance information into data itself. So, an auditor can inspect such watermarks, query involved monitors, and tell a legitimate from an illegitimate usage more easily.
Keywords :
business continuity; steganography; watermarking; data provenance; disaster recovery; low-level attacks; security restrictions; steganographic tunneling; usage control monitors; watermarks; Bandwidth; Data models; Monitoring; Payloads; Tunneling; Watermarking; Data Provenance; Monitoring; Resilience; Tunneling; Watermarking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet of Things (iThings/CPSCom), 2011 International Conference on and 4th International Conference on Cyber, Physical and Social Computing
Conference_Location :
Dalian
Print_ISBN :
978-1-4577-1976-9
Type :
conf
DOI :
10.1109/iThings/CPSCom.2011.129
Filename :
6142237
Link To Document :
بازگشت