Abstract:
The amount of valuable information, which is stored and shared digitally on online and cloud computing, is dynamically increasing. So, the storage and sharing service providers must have the ability to identify the ownership and access history of each object for trustworthiness. The provenance is the most promising technology for this ability. Although the small numbers of researches have been done for secure provenance, they are weak in overhead and supporting integrity. So, this paper proposes the new secure provenance scheme to solve these weak points. In the proposed scheme, H (Dout) is created for data integrity and C and IToken are constructed for chain integrity. For chain integrity constructions, this scheme takes only the essential materials of previous and next provenance records instead of all other provenance records to reduce overhead. This scheme also provides the privacy (confidentiality) for user’s sensitive data using broadcast encryption with divisive clustering algorithm.