Li et al., 2014 - Google Patents
Digital provenance: Enabling secure data forensics in cloud computingLi et al., 2014
View PDF- Document ID
- 17512547299200995385
- Author
- Li J
- Chen X
- Huang Q
- Wong D
- Publication year
- Publication venue
- Future Generation Computer Systems
External Links
Snippet
Secure provenance that records the ownership and process history of data objects is vital to the success of data forensics in cloud computing. In this paper, we propose a new secure provenance scheme based on group signature and attribute-based signature techniques …
- 238000000034 method 0 abstract description 24
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Digital provenance: Enabling secure data forensics in cloud computing | |
Fan et al. | A secure and verifiable data sharing scheme based on blockchain in vehicular social networks | |
Wang et al. | Incentive and unconditionally anonymous identity-based public provable data possession | |
Wu et al. | Efficient and privacy-preserving traceable attribute-based encryption in blockchain | |
Huang et al. | Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing | |
Wang et al. | Attribute-based data sharing scheme revisited in cloud computing | |
Ruj et al. | Decentralized access control with anonymous authentication of data stored in clouds | |
Liu et al. | Mona: Secure multi-owner data sharing for dynamic groups in the cloud | |
Unal et al. | A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption | |
Das et al. | MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure | |
Zhang et al. | Improved secure fuzzy auditing protocol for cloud data storage | |
Malina et al. | Privacy-preserving security solution for cloud services | |
Win et al. | Privacy enabled digital rights management without trusted third party assumption | |
Huang | Accountable and revocable large universe decentralized multi-authority attribute-based encryption for cloud-aided IoT | |
Sabitha et al. | Access control based privacy preserving secure data sharing with hidden access policies in cloud | |
Alimohammadi et al. | A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage | |
Cao et al. | Decentralized group signature scheme based on blockchain | |
Banaeian Far et al. | A blockchain-based quantum-secure reporting protocol | |
Liu et al. | Blockchain-assisted comprehensive key management in CP-ABE for cloud-stored data | |
Mara et al. | CRUPA: collusion resistant user revocable public auditing of shared data in cloud | |
Ren et al. | Bfdac: A blockchain-based and fog computing-assisted data access control scheme in vehicular social networks | |
Yang et al. | Revocable identity-based proxy re-signature against signing key exposure | |
Mishra et al. | Fine-grained access control of files stored in cloud storage with traceable and revocable multi-authority CP-ABE scheme | |
Hyla et al. | A practical certificate and identity based encryption scheme and related security architecture | |
Chen et al. | Strongly secure certificateless key-insulated signature secure in the standard model |