Nothing Special   »   [go: up one dir, main page]

Li et al., 2014 - Google Patents

Digital provenance: Enabling secure data forensics in cloud computing

Li et al., 2014

View PDF
Document ID
17512547299200995385
Author
Li J
Chen X
Huang Q
Wong D
Publication year
Publication venue
Future Generation Computer Systems

External Links

Snippet

Secure provenance that records the ownership and process history of data objects is vital to the success of data forensics in cloud computing. In this paper, we propose a new secure provenance scheme based on group signature and attribute-based signature techniques …
Continue reading at faratarjome.ir (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Similar Documents

Publication Publication Date Title
Li et al. Digital provenance: Enabling secure data forensics in cloud computing
Fan et al. A secure and verifiable data sharing scheme based on blockchain in vehicular social networks
Wang et al. Incentive and unconditionally anonymous identity-based public provable data possession
Wu et al. Efficient and privacy-preserving traceable attribute-based encryption in blockchain
Huang et al. Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing
Wang et al. Attribute-based data sharing scheme revisited in cloud computing
Ruj et al. Decentralized access control with anonymous authentication of data stored in clouds
Liu et al. Mona: Secure multi-owner data sharing for dynamic groups in the cloud
Unal et al. A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
Das et al. MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure
Zhang et al. Improved secure fuzzy auditing protocol for cloud data storage
Malina et al. Privacy-preserving security solution for cloud services
Win et al. Privacy enabled digital rights management without trusted third party assumption
Huang Accountable and revocable large universe decentralized multi-authority attribute-based encryption for cloud-aided IoT
Sabitha et al. Access control based privacy preserving secure data sharing with hidden access policies in cloud
Alimohammadi et al. A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage
Cao et al. Decentralized group signature scheme based on blockchain
Banaeian Far et al. A blockchain-based quantum-secure reporting protocol
Liu et al. Blockchain-assisted comprehensive key management in CP-ABE for cloud-stored data
Mara et al. CRUPA: collusion resistant user revocable public auditing of shared data in cloud
Ren et al. Bfdac: A blockchain-based and fog computing-assisted data access control scheme in vehicular social networks
Yang et al. Revocable identity-based proxy re-signature against signing key exposure
Mishra et al. Fine-grained access control of files stored in cloud storage with traceable and revocable multi-authority CP-ABE scheme
Hyla et al. A practical certificate and identity based encryption scheme and related security architecture
Chen et al. Strongly secure certificateless key-insulated signature secure in the standard model