Securing Provenance by Distributing the Provenance Storage
スポンサーリンク
概要
- 論文の詳細を見る
Provenance is defined in some literature as a complete documentation of processes that led to an object. Provenance can be applied in some systems: database systems, file systems and grid systems. Provenance is very important to verify the processes that led to an object. There are many research to develop a provenance system. Main provenance implementations use a centralized model or a centralized management of provenance system. Although many provenance stores may be used and the users may choose a trusted provenance store as the place to store their provenance, when recording a provenance information, the users should store a complete provenance information in a particular provenance store. We believe that this model has a weakness, that is the user can not restrict access of the administrator that maintains the provenance store where the user store their provenance. We propose an alternative to this model, that is a user may store some parts of the provenance information in a provenance store and some other parts in other provenance stores. We also discuss security advantages of this approach.
- 一般社団法人情報処理学会の論文
- 2009-02-26
著者
-
Sakurai Kouichi
九大
-
Hori Yoshiaki
Faculty of Information Science and Electrical Engineering, Kyushu University
-
Syalim Amril
九大
-
Hori Yoshiaki
九大
-
Hori Yoshiaki
Faculty Of Information Science And Electrical Engineering Kyushu University
-
Sakurai Kouichi
Faculty of Information Science and Electrical Engineering, Kyushu University
関連論文
- A-7-21 Security Policy Pre-evaluation towards Risk Analysis
- Securing Provenance by Distributing the Provenance Storage
- Securing provenance by distributing the provenance storage (マルチメディア通信と分散処理・コンピュータセキュリティ)
- Hierarchical clustering and leaf ordering scheme for DNA chip expression data (アルゴリズム)
- PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis(Symmetric Key Cryptography)(Cryptography and Information Security)
- Enhancing Airport Access Control Security with Multiple Biometrics Contactless Smart Card (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider