2009
DOI: 10.1145/1629080.1629082
|View full text |Cite
|
Sign up to set email alerts
|

Preventing history forgery with secure provenance

Abstract: As increasing amounts of valuable information are produced and persist digitally, the ability to determine the origin of data becomes important. In science, medicine, commerce, and government, data provenance tracking is essential for rights protection, regulatory compliance, management of intelligence and medical data, and authentication of information as it flows through workplace tasks. While significant research has been conducted in this area, the associated security and privacy issues have not been explo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
138
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 147 publications
(138 citation statements)
references
References 35 publications
0
138
0
Order By: Relevance
“…Hasan et al [16] and Braun et al [17] set out a number of research questions, as does a more recent position paper by Davidson et al [20]. Hasan et al [10] develop a mechanism for securing the provenance describing a chain of revisions of a document (say, a file in a file system), using appropriate encryption and digital signatures to allow auditors to check the integrity of the provenance without necessarily having access to the underlying data or vice versa. Zhang et al [18] develop tamper-detection techniques for provenance in databases.…”
Section: Related and Future Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Hasan et al [16] and Braun et al [17] set out a number of research questions, as does a more recent position paper by Davidson et al [20]. Hasan et al [10] develop a mechanism for securing the provenance describing a chain of revisions of a document (say, a file in a file system), using appropriate encryption and digital signatures to allow auditors to check the integrity of the provenance without necessarily having access to the underlying data or vice versa. Zhang et al [18] develop tamper-detection techniques for provenance in databases.…”
Section: Related and Future Workmentioning
confidence: 99%
“…In particular, our model does not have much to say about dynamic provenance in extant systems that seek to record all changes to some shared data [26], or to maintain the integrity of provenance records in a stateful system (e.g. file system) and prevent forgery [10]. We believe that modeling this kind of situation will require further extensions to our model to permit principals to both read and write data and communicate with one another, and to model what can be learned by multiple interactions with the system or other principals.…”
Section: Related and Future Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Many other works on provenance addresses specific problems like provenance in software development known as versionning systems which manages distributed intra-files provenance but are not able to manage inter-files provenance. We also mention recent work on securing provenance from tempering based on cryptographic mechanisms [12]. The particularity of the provenance needs in our work is the superposition of a set of traditional provenance constraints with cloud specific constraints.…”
Section: Related Workmentioning
confidence: 99%