Title :
Optimizing management on security provenance model based on OPM
Author :
Chaofan Dai; Ran Zhang; Saihong Zeng; Yanpeng Zhao
Author_Institution :
Department of Science and Technology on Information, System Engineering Laboratory, National University of Science Technology, NUDT, Changsha, Hunan, 410074, China
Abstract :
Data provenance is the accurate related description and information of data about the process that includes acquisition, transformation and integration. To ensure accuracy and integrity of data, we need to provide security protection and supervision that data can´t be modified and destroyed on purpose. Firstly, in order to improve the confidentiality, we add roles for artifacts and agents, and how we grant authority for agents depending on different conditions; what´s more, we make a reasonable and strict management system. Secondly, we optimize the improved Diffie-Hellman protocol to improve confidentiality, for that we make full use of the conversation and strength the connection between steps. Thirdly, we use a hash list to save the information about auditors that is a solution to the change of the number of auditors. Compared with binary tree, hash list is more convenient and spends less time to add or delete nodes, even update node. The head node of hash list only has one pointer so it spends less space. Moreover, we save id in nodes to prevent returning more than one querying results.
Keywords :
"Encryption","Protocols","Data models","Information systems","Process control"
Conference_Titel :
Computer Science and Network Technology (ICCSNT), 2015 4th International Conference on
DOI :
10.1109/ICCSNT.2015.7490806