2016
DOI: 10.1109/tdsc.2015.2399296
|View full text |Cite
|
Sign up to set email alerts
|

Data Lineage in Malicious Environments

Abstract: Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe security threats that organizations face in the digital era. The threat now extends to our personal lives: a plethora of personal information is available to social networks and smartphone providers and is indirectly transferred to untrustworthy third party and fourth party applications. In this work, we present a generic data lineage framework LIME for data flow across multiple entities that take two characteristic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(6 citation statements)
references
References 34 publications
0
6
0
Order By: Relevance
“…A generic framework called Lineage In Malicious Environment (LIME) based on data lineage is proposed by Backes et al in [79] to protect the data in the vicious environment through the identification of the culprit entity. In this scheme, data is shared among multiple entities that can be either owner or consumer.…”
Section: Figure 6: Key Components Of Watermarking Based Modelsmentioning
confidence: 99%
“…A generic framework called Lineage In Malicious Environment (LIME) based on data lineage is proposed by Backes et al in [79] to protect the data in the vicious environment through the identification of the culprit entity. In this scheme, data is shared among multiple entities that can be either owner or consumer.…”
Section: Figure 6: Key Components Of Watermarking Based Modelsmentioning
confidence: 99%
“…On the contrary they have enforced unlawful agreements in restraining trade or have evaded statutory limits on the copyright. Furthermore, such uses have also given rise to problems concerning with the basic rights of "fair use" and privacy: the former is invoked in order to prevent copyright owners from having the exclusive control over their creations than the copyright law intends, whereas the latter is invoked in order to preserve the ownership and distribution of confidential data [1,7,8,9,10,11]. A different approach to the problems reported above is represented by the web systems that employ watermarking based technologies [12] to implement the copyright protection of digital content distributed on the Internet.…”
Section: Introductionmentioning
confidence: 99%
“…Watermarking technique has been concretely used for data leakage detection by many researchers. A model lineage in malicious environment, to solve the problem of data leakage, when data flows occurred among the owners and the consumers is proposed by Backes et al [9 ]. This model provided a protocol for transferring the data between two parties in the vicious environment via considering watermarking, oblivious transfer and signature primitives.…”
Section: Introductionmentioning
confidence: 99%