UCSY's Research Repository

Time-stamp Oriented Efficient Secure Provenance Scheme

Show simple item record

dc.contributor.author Aye, Myat Mon
dc.contributor.author Soe, Than Naing
dc.date.accessioned 2019-07-11T03:36:53Z
dc.date.available 2019-07-11T03:36:53Z
dc.date.issued 2013-02-26
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/684
dc.description.abstract The amount of valuable information, which is stored and shared digitally on online and cloud computing, is dynamically increasing. So, the storage and sharing service providers must have the ability to identify the ownership and access history of each object for trustworthiness. The provenance is the most promising technology for this ability. Although the small numbers of researches have been done for secure provenance, they are weak in overhead and supporting integrity. So, this paper proposes the new secure provenance scheme to solve these weak points. In the proposed scheme, H (Dout) is created for data integrity and C and IToken are constructed for chain integrity. For chain integrity constructions, this scheme takes only the essential materials of previous and next provenance records instead of all other provenance records to reduce overhead. This scheme also provides the privacy (confidentiality) for user’s sensitive data using broadcast encryption with divisive clustering algorithm. en_US
dc.language.iso en en_US
dc.publisher Eleventh International Conference On Computer Applications (ICCA 2013) en_US
dc.title Time-stamp Oriented Efficient Secure Provenance Scheme en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account

Statistics