DocumentCode :
3777318
Title :
Optimizing management on security provenance model based on OPM
Author :
Chaofan Dai; Ran Zhang; Saihong Zeng; Yanpeng Zhao
Author_Institution :
Department of Science and Technology on Information, System Engineering Laboratory, National University of Science Technology, NUDT, Changsha, Hunan, 410074, China
Volume :
1
fYear :
2015
Firstpage :
543
Lastpage :
547
Abstract :
Data provenance is the accurate related description and information of data about the process that includes acquisition, transformation and integration. To ensure accuracy and integrity of data, we need to provide security protection and supervision that data can´t be modified and destroyed on purpose. Firstly, in order to improve the confidentiality, we add roles for artifacts and agents, and how we grant authority for agents depending on different conditions; what´s more, we make a reasonable and strict management system. Secondly, we optimize the improved Diffie-Hellman protocol to improve confidentiality, for that we make full use of the conversation and strength the connection between steps. Thirdly, we use a hash list to save the information about auditors that is a solution to the change of the number of auditors. Compared with binary tree, hash list is more convenient and spends less time to add or delete nodes, even update node. The head node of hash list only has one pointer so it spends less space. Moreover, we save id in nodes to prevent returning more than one querying results.
Keywords :
"Encryption","Protocols","Data models","Information systems","Process control"
Publisher :
ieee
Conference_Titel :
Computer Science and Network Technology (ICCSNT), 2015 4th International Conference on
Type :
conf
DOI :
10.1109/ICCSNT.2015.7490806
Filename :
7490806
Link To Document :
بازگشت