Trusted Tamper-Evident Data Provenance

@article{Taha2015TrustedTD,
  title={Trusted Tamper-Evident Data Provenance},
  author={Mohammad M. Bany Taha and Sivadon Chaisiri and R. Ko},
  journal={2015 IEEE Trustcom/BigDataSE/ISPA},
  year={2015},
  volume={1},
  pages={646-653}
}
Data provenance, the origin and derivation history of data, is commonly used for security auditing, forensics and data analysis. While provenance loggers provide evidence of data changes, the integrity of the provenance logs is also critical for the integrity of the forensics process. However, to our best knowledge, few solutions are able to fully satisfy this trust requirement. In this paper, we propose a framework to enable tamper-evidence and preserve the confidentiality and integrity of… Expand
3 Citations
Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System
  • Highly Influenced
  • PDF
An Overview on Smart Contracts: Challenges, Advances and Platforms
  • 81
  • PDF

References

SHOWING 1-10 OF 21 REFERENCES
Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance
  • 36
  • PDF
Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking
  • R. Ko, M. Will
  • Computer Science
  • 2014 IEEE 7th International Conference on Cloud Computing
  • 2014
  • 63
  • PDF
The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance
  • 252
  • PDF
How to Track Your Data: The Case for Cloud Computing Provenance
  • 64
  • PDF
S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance
  • 58
Security and Data Accountability in Distributed Systems: A Provenance Survey
  • Y. Tan, R. Ko, G. Holmes
  • Computer Science
  • 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing
  • 2013
  • 40
  • PDF
Collecting Provenance via the Xen Hypervisor
  • 51
  • PDF
Provenance-Aware Storage Systems
  • 612
  • PDF
Towards Achieving Accountability, Auditability and Trust in Cloud Computing
  • 114
Towards More Trustable Log Files for Digital Forensics by Means of “Trusted Computing”
  • B. Bock, David Huemer, A. Tjoa
  • Computer Science
  • 2010 24th IEEE International Conference on Advanced Information Networking and Applications
  • 2010
  • 33
...
1
2
3
...