Secure provenance that records ownership and process his-tory of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue today. In this paper, to tackle this unexplored area in cloud com-puting, we proposed a new secure provenance scheme based on the bilinear pairing techniques. As the essential bread and butter of data forensics and post investigation in cloud computing, the proposed scheme is characterized by provid-ing the information confidentiality on sensitive documents stored in cloud, anonymous authentication on user access, and provenance tracking on disputed documents. With the provable security techniques, we formally demonstrate the proposed scheme is secure in the standard ...
As organizations become increasingly reliant on cloud com-puting for servicing their data storage re...
Cloud computing is a recent tendency in IT that moves computing and data away from desktop and hand-...
Data Provenance describes what has happened to a users data within a ma- chine as a form of digital ...
Cloud storage offers the flexibility of accessing data from anywhere at any time while providing eco...
The amount of valuable information, which is stored and shared digitally on online and cloud computi...
Cloud computing is a recent tendency in IT that moves computing and data away from desktop and hand-...
Digital provenance, as an important type of cloud data, has aroused increasing attention on improvin...
Derived from the field of art curation, digital provenance is an unforgeable record of a digital obj...
To securely and conveniently enjoy the benefits of cloud storage, it is desirable to design a cloud ...
To securely and conveniently enjoy the benefits of cloud storage, it is desirable to design a cloud ...
Abstract—Provenance is derivative journal information about the origin and activities of system data...
Cloud computing is a newly emerging technology where storage, computation and services are extensive...
Provenance, a meta-data describing the derivation history of data, is crucial for the uptake of clou...
Cloud computing has gained popularity due to its efficiency, robustness and cost effectiveness. Carr...
Cloud storage forensics has recently emergedas a salient area of inquiry. One area ofdifficulty is t...
As organizations become increasingly reliant on cloud com-puting for servicing their data storage re...
Cloud computing is a recent tendency in IT that moves computing and data away from desktop and hand-...
Data Provenance describes what has happened to a users data within a ma- chine as a form of digital ...
Cloud storage offers the flexibility of accessing data from anywhere at any time while providing eco...
The amount of valuable information, which is stored and shared digitally on online and cloud computi...
Cloud computing is a recent tendency in IT that moves computing and data away from desktop and hand-...
Digital provenance, as an important type of cloud data, has aroused increasing attention on improvin...
Derived from the field of art curation, digital provenance is an unforgeable record of a digital obj...
To securely and conveniently enjoy the benefits of cloud storage, it is desirable to design a cloud ...
To securely and conveniently enjoy the benefits of cloud storage, it is desirable to design a cloud ...
Abstract—Provenance is derivative journal information about the origin and activities of system data...
Cloud computing is a newly emerging technology where storage, computation and services are extensive...
Provenance, a meta-data describing the derivation history of data, is crucial for the uptake of clou...
Cloud computing has gained popularity due to its efficiency, robustness and cost effectiveness. Carr...
Cloud storage forensics has recently emergedas a salient area of inquiry. One area ofdifficulty is t...
As organizations become increasingly reliant on cloud com-puting for servicing their data storage re...
Cloud computing is a recent tendency in IT that moves computing and data away from desktop and hand-...
Data Provenance describes what has happened to a users data within a ma- chine as a form of digital ...