The amount of valuable information, which is stored and shared digitally on online and cloud computing, is dynamically increasing. So, the storage and sharing service providers must have the ability to identify the ownership and access history of each object for trustworthiness. The provenance is the most promising technology for this ability. Although the small numbers of researches have been done for secure provenance, they are weak in overhead and supporting integrity. So, this paper proposes the new secure provenance scheme to solve these weak points. In the proposed scheme, H (Dout) is created for data integrity and C and IToken are constructed for chain integrity. For chain integrity constructions, this scheme takes only the essential...
###EgeUn###Provenance determines the origin of the data by tracing and recording the actions that ar...
NSF CNS-0716532, CNS- 0803280, CNS-0716608, CNS-0627554, CNS-0708025, IIS-0803197.published or submi...
As organizations become increasingly reliant on cloud com-puting for servicing their data storage re...
Derived from the field of art curation, digital provenance is an unforgeable record of a digital obj...
Secure provenance that records ownership and process his-tory of data objects is vital to the succes...
Cloud storage offers the flexibility of accessing data from anywhere at any time while providing eco...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceP...
The notion of data provenance was formally introduced a decade ago and has since been investigated, ...
Abstract—Provenance is derivative journal information about the origin and activities of system data...
With the development of data transactions, data security issues have become increasingly important. ...
Data (or information) provenance has many important applications. However, prior work on data proven...
AbstractSecuring provenance data in distributed environment is a challenge and with the rapid increa...
Most security models are designed to protect data. Some also deal with traditional metadata. Provena...
Abstract. Security is likely becoming a critical factor in the future adoption of provenance technol...
Data Provenance describes what has happened to a users data within a ma- chine as a form of digital ...
###EgeUn###Provenance determines the origin of the data by tracing and recording the actions that ar...
NSF CNS-0716532, CNS- 0803280, CNS-0716608, CNS-0627554, CNS-0708025, IIS-0803197.published or submi...
As organizations become increasingly reliant on cloud com-puting for servicing their data storage re...
Derived from the field of art curation, digital provenance is an unforgeable record of a digital obj...
Secure provenance that records ownership and process his-tory of data objects is vital to the succes...
Cloud storage offers the flexibility of accessing data from anywhere at any time while providing eco...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceP...
The notion of data provenance was formally introduced a decade ago and has since been investigated, ...
Abstract—Provenance is derivative journal information about the origin and activities of system data...
With the development of data transactions, data security issues have become increasingly important. ...
Data (or information) provenance has many important applications. However, prior work on data proven...
AbstractSecuring provenance data in distributed environment is a challenge and with the rapid increa...
Most security models are designed to protect data. Some also deal with traditional metadata. Provena...
Abstract. Security is likely becoming a critical factor in the future adoption of provenance technol...
Data Provenance describes what has happened to a users data within a ma- chine as a form of digital ...
###EgeUn###Provenance determines the origin of the data by tracing and recording the actions that ar...
NSF CNS-0716532, CNS- 0803280, CNS-0716608, CNS-0627554, CNS-0708025, IIS-0803197.published or submi...
As organizations become increasingly reliant on cloud com-puting for servicing their data storage re...