Abstract
This chapter introduces the secure data provenance technique. We mainly focus on secure data provenance schemes for cloud storage systems. In the subsequent sections of this chapter, we first introduce the basic paradigms and principles of secure data provenance. Then, we give a comprehensive survey on the secure data provenance schemes. Finally, we review the latest advances in secure data provenance and introduce how to construct a secure data provenance scheme on a public blockchain.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Simmhan YL, Plale B, Gannon D (2005) A survey of data provenance in e-science. ACM SIGMOD Rec 34(3):31–36
Gupta A (2009) Data provenance. Springer, Boston, pp 608–608. https://doi.org/10.1007/978-0-387-39940-9_1305
Moreau L, Groth P, Miles S, Vazquez-Salceda J, Ibbotson J, Jiang S, Munroe S, Rana O, Schreiber A, Tan V, Varga L (2008) The provenance of electronic data. Commun ACM 51(4):52–58
Zhang Y, Xu C, Li H, Yang K, Zhou J, Lin X (2018) HealthDep: an efficient and secure deduplication scheme for cloud-assisted eHealth systems.IEEE Trans Ind Inf 14(9):4101–4112
Wu Y, Cegielski CG, Hazen BT, Hall DJ (2013) Cloud computing in support of supply chain information system infrastructure: understanding when to go to the cloud. J Supply Chain Manag 49(3):25–41
Codeanywhere. https://codeanywhere.com
Google doc. http://www.google.cn/intl/zh-cn_all/docs/about/
Xue J, Xu C, Zhang Y (2018) Private blockchain-based secure access control for smart home systems. KSII Trans Inter Inf Syst 12(12):6057–6078
Zhang Y, Xu C, Li H, Yang K, Cheng N, Shen X (2020) PROTECT: efficient password-based threshold single-sign-on authentication for mobile users against perpetual leakage. IEEE Trans Mob Comput. https://doi.org/10.1109/TMC.2020.2975792
Btk killer. https://en.wikipedia.org/wiki/Dennis_Rader
Audit trails. http://csrc.nist.gov/publications/nistbul/itl97-03.txt
Madden BA, Adams IF, Storer MW, Miller EL, Long DD, Kroeger TM (2011) Provenance based rebuild: using data provenance to improve reliability. UCSC, Technical Report
Ashcroft J, Daniels DJ, Hart SV (2011) Forensic examination of digital evidence: a guide for law enforcement. https://www.ncjrs.gov/txtfiles1/nij/199408.txt
Lin X, Chen T, Zhu T, Yang K, Wei F (2018) Automated forensic analysis of mobile applications on android devices.Digital Investigation 26:59–66
Health insurance portability and accountability act. https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Account-ability_Act
Zhang Y, Xu C, Lin X, Shen X (2019) Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Trans Cloud Comput. https://doi.org/10.1109/TCC.2019.2908400
Zhang Y, Xu C, Ni J, Li H, Shen X (2019) Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Trans Cloud Comput. https://doi.org/10.1109/TCC.2019.2923222
Lynch CA (2001) When documents deceive: trust and provenance as new factors for information retrieval in a tangled web. J Assoc Inf Sci Technol52(1):12
Lu R, Lin X, Liang X, Shen X (2010) Secure provenance: the essential of bread and butter of data forensics in cloud computing. In: ACM symposium on information, computer and communications security, pp 282–292
Chow S, Chu C, Huang X, Zhou J, Deng RH (2012) Dynamic secure cloud storage with provenance. In: Cryptography and security, pp 442–464
Margo DW, Smogor R (2010) Using provenance to extract semantic file attributes. In: Conference on theory and practice of provenance
Di L, Yue P, Ramapriyan HK, King RL (2013) Geoscience data provenance: an overview. IEEE Trans Geosci. Remote Sensing 51(11):5065–5072
He L, Yue P, Di L, Zhang M, Hu L (2014) Adding geospatial data provenance into SDI—a service-oriented approach. IEEE J Selected Topics Appl Earth Observations and Remote Sensing 8(2):926–936
Interlandi M, Ekmekji A, Shah , MA Gulzar, Tetali SD, Kim M, Millstein T, Condie T (2017) Adding data provenance support to apache spark. VLDB J 27(5):1–21
Hasan R, Sion R, Winslett M (2007) Introducing secure provenance: problems and challenges. In: ACM workshop on storage security and survivability, pp 13–18
Zhang Y, Xu C, Li H, Yang H, She X (2019) Chronos: secure and accurate time-stamping scheme for digital files via blockchain. In: IEEE international conference on communications, pp 1–6
Zhang Y, Xu C, Cheng N, Li H, Yang H, Shen X (2019) Chronos+: an accurate blockchain-based time-stamping scheme for cloud storage. IEEE Trans Serv Comput 13(2):216–229. https://doi.org/10.1109/TSC.2019.2947476
Nakamoto S, Bitcoin: a peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf
Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151:1–32
Zhang Y, Lin X, Xu C (2018) Blockchain-based secure data provenance for cloud storage. In: International conference on information and communications security, pp 3–19
Kiayias A, Russell A, David B, Oliynykov R (2017) Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Annual cryptology conference, pp 357–388
Pass R, Shi E (2018) Thunderella: blockchains with optimistic instant confirmation. In: International conference on the theory and applications of cryptographic techniques, pp 3–33
Wang J, Crawl D, Purawat S, Nguyen M, Altintas I (2015) Big data provenance: challenges, state of the art and opportunities. In: IEEE international conference on big data, pp 2509–2516
Ramachandran A, Kantarcioglu M (2018) Smartprovenance: a distributed, blockchain based dataprovenance system. In: ACM conference on data and application security and privacy, pp 35–42.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Zhang, Y., Xu, C., Shen, X.S. (2020). Secure Data Provenance. In: Data Security in Cloud Storage. Wireless Networks. Springer, Singapore. https://doi.org/10.1007/978-981-15-4374-6_6
Download citation
DOI: https://doi.org/10.1007/978-981-15-4374-6_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-4373-9
Online ISBN: 978-981-15-4374-6
eBook Packages: Computer ScienceComputer Science (R0)