Font Size: a A A

Research On Data Provenance's Security Model

Posted on:2013-01-18Degree:MasterType:Thesis
Country:ChinaCandidate:Q Q YanFull Text:PDF
GTID:2218330374961330Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Cloud computing is a popular computing mode being researched and discussed by IT industry, which together with the Object Internet is becoming the development trend of Internet. However, the development and application of cloud computing is still facing some challenges and the most important factor restricting its development is the security issue. If security problems are properly handled, the development of cloud computing will be faster. Provenance records the ownership and process history of data objects. Credible data provenance can be used to judge the quality of data and regenerate data according to provenance. The credibility of provenance data is based on the premise that it has't been illegally tampered. The security of provenance is an important branch of the security field. The secure provenance is vital to data forensics and auditing in cloud computing. However, research on the subject of provenance security is yet immature and until now it is still a challenging issue.This paper studies data provenance security in cloud. The main contents are:1. According to the characteristics of cloud computing environment, a security provenance model is established in order to ensure the confidentiality, integrity, availability of provenance. The model is an inter-connected provenance chain and its smallest unit is the provenance record within the chain, which is composed by indivisible provenance factor..Provenance factors fall into two categories, one is the narrative provenance factor, and the other is the security provenance factor. The latter kind is used to ensure the security of the former.2. Propose security solutions about the confidentiality and integrity of provenance. In order to ensure confidentiality, we first use session key to encrypt the sensitive information, and then use the improved (k′, n) threshold encryption scheme to encrypt the session key. The advantage of using threshold encryption is that it can distribute the confidence, thus greatly reducing internal attacks from management staff. In terms of integrity, this paper puts digital signure on the harsh value of the provenance and, using multi-chain connection mode, builds the directed acyclic graph for provenances record to enhance their correlation.3. Propose a scheme for the application of secure data provenance to organ transplant cases. The "cloud" and data provenance contributes to improving the efficiency of organ transplant management and the secure provenance can also be used for tracking and determining medical liability.
Keywords/Search Tags:Cloud Computing, Provenance, Threshold Cryptography, multi-chainConnection
PDF Full Text Request
Related items