Abstract
Digital provenance, as an important type of cloud data, has aroused increasing attention on improving system performance. Currently, provenance have been employed to provide hints on access control and estimate data quality. However, provenance itself might also be sensitive information. Therefore, provenance might be encrypted to store on cloud. In this paper, we provide a mechanism to classify cloud documents by searching specific keywords from their encrypted provenance, and we proof our scheme achieves semantic security.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Jaehong, P., Dang, N., Ravi, S.S.: A provenance-based access control model. In: Tenth Annual International Conference on Privacy, Security and Trust, Paris, pp. 137–144 (2012)
Dang, N., Jaehong, P., Ravi, S.S.: A provenance-based access control model for dynamic separation of duties. In: Eleventh Annual International Conference on Privacy, Security and Trust, Tarragona, Catalonia, Spain, pp. 247–256 (2013)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Luc, M., Ben, C., Juliana, F., Joe, F., Yolanda, G., Paul, T.G., Natalia, K., Simon, K., Paolo, M., Jim, M., Beth, P., Yogesh, S., Eric, G.S., Jan, V.D.B.: The open provenance model core specification (v1.1). Future Gener. Comp. Syst. 27, 743–756 (2011)
Umut, A.A., Peter, B., James, C., Jan, V.D.B., Natalia, K., Stijn, V.: A graph model of data and workflow provenance. In: TaPP (2010)
Martin, D., Maria, T.: CRMdig: a generic digital provenance model for scientific observation. In: TaPP (2011)
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440–456. Springer, Heidelberg (2005)
Christoph, B.: How usage control and provenance tracking get together - a data protection perspective. In: Symposium on Security and Privacy Workshops, pp. 13–17. IEEE, San Francisco (2013)
Uri, B., Avraham, S., Margo, I.S.: Securing provenance. In: 3rd USENIX Workshop on Hot Topics in Security, CA, USA (2008)
Elisa, G., Gabriel, G., Murat, K., Dang, N., Jae, P., Ravi, S.S., Bhavani, M.T., Shouhuai, X.: A roadmap for privacy-enhanced secure data provenance. J. Intell. Inf. Syst. 43, 481–501 (2014)
Syed, R.H., Changda, W., Salmin, S., Elisa, B.: Secure data provenance compression using arithmetic coding in wireless sensor networks. In: 33rd International Performance Computing and Communications Conference, IPCCC, TX, USA, pp. 1–10 (2014)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)
Ni, Q., Xu, S., Bertino, E., Sandhu, R., Han, W.: An access control language for a general provenance model. In: Jonker, W., Petković, M. (eds.) SDM 2009. LNCS, vol. 5776, pp. 68–88. Springer, Heidelberg (2009)
Dang, N., Jaehong, P., Ravi, S.S.: A provenance-based access control model for dynamic separation of duties. In: Eleventh Annual International Conference on Privacy, Security and Trust, PST, Catalonia, Spain, pp. 247–256 (2013)
Jin, L., Xiaofeng, C., Qiong, H., Duncan, S.W.: Digital provenance: enabling secure data forensics in cloud computing. Future Gener. Comp. Syst. 37, 259–266 (2014)
Sherman, S.M., Cheng-Kang, W., Jianying, Z., Robert, H.D.: Dynamic secure cloud storage with provenance. In: Cryptography and Security, pp. 442–464 (2012)
Banerjee, A., Naumann, D.A.: History-based access control and secure information flow. In: Barthe, G., Burdy, L., Huisman, M., Lanet, J.-L., Muntean, T. (eds.) CASSIS 2004. LNCS, vol. 3362, pp. 27–48. Springer, Heidelberg (2005)
Omar, B., Anish, D.S., Alon, Y.H., Martin, T., Jennifer, W.: Databases with uncertainty and lineage. VLDB J. 17, 243–264 (2008)
Peter, B., Adriane, C., James, C.: Provenance management in curated databases. In: International Conference on Management of Data, Chicago, Illinois, USA, pp. 539–550 (2006)
Manish, K.A., Shawn, B., Timothy, M.M., Bertram, L.: Efficient provenance storage over nested data collections. In: 12th International Conference on Extending Database Technology, Saint Petersburg, Russia, pp. 958–969 (2009)
Thomas, H., Gustavo, A.: Efficient lineage tracking for scientific workflows. In: International Conference on Management of Data, Vancouver, BC, Canada, pp. 1007–1018 (2008)
Ali, N.R., Jafar, H.J., Morteza, A., Rasool, J.: GTHBAC: a generalized temporal history based access control model. Telecommun. Syst. 45, 111–125 (2010)
Karl, K., Mogens, N., Vladimiro, S.: A logical framework for history-based access control and reputation systems. J. Comput. Secur. 16, 63–101 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Fan, X., Varadharajan, V., Hitchens, M. (2015). Provenance Based Classification Access Policy System Based on Encrypted Search for Cloud Data Storage. In: Lopez, J., Mitchell, C. (eds) Information Security. ISC 2015. Lecture Notes in Computer Science(), vol 9290. Springer, Cham. https://doi.org/10.1007/978-3-319-23318-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-23318-5_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23317-8
Online ISBN: 978-3-319-23318-5
eBook Packages: Computer ScienceComputer Science (R0)