Skip to main content

Secure Data Provenance

  • Chapter
  • First Online:
  • 1049 Accesses

Part of the book series: Wireless Networks ((WN))

Abstract

This chapter introduces the secure data provenance technique. We mainly focus on secure data provenance schemes for cloud storage systems. In the subsequent sections of this chapter, we first introduce the basic paradigms and principles of secure data provenance. Then, we give a comprehensive survey on the secure data provenance schemes. Finally, we review the latest advances in secure data provenance and introduce how to construct a secure data provenance scheme on a public blockchain.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Simmhan YL, Plale B, Gannon D (2005) A survey of data provenance in e-science. ACM SIGMOD Rec 34(3):31–36

    Article  Google Scholar 

  2. Gupta A (2009) Data provenance. Springer, Boston, pp 608–608. https://doi.org/10.1007/978-0-387-39940-9_1305

    Google Scholar 

  3. Moreau L, Groth P, Miles S, Vazquez-Salceda J, Ibbotson J, Jiang S, Munroe S, Rana O, Schreiber A, Tan V, Varga L (2008) The provenance of electronic data. Commun ACM 51(4):52–58

    Article  Google Scholar 

  4. Zhang Y, Xu C, Li H, Yang K, Zhou J, Lin X (2018) HealthDep: an efficient and secure deduplication scheme for cloud-assisted eHealth systems.IEEE Trans Ind Inf 14(9):4101–4112

    Article  Google Scholar 

  5. Wu Y, Cegielski CG, Hazen BT, Hall DJ (2013) Cloud computing in support of supply chain information system infrastructure: understanding when to go to the cloud. J Supply Chain Manag 49(3):25–41

    Article  Google Scholar 

  6. Codeanywhere. https://codeanywhere.com

  7. Google doc. http://www.google.cn/intl/zh-cn_all/docs/about/

  8. Xue J, Xu C, Zhang Y (2018) Private blockchain-based secure access control for smart home systems. KSII Trans Inter Inf Syst 12(12):6057–6078

    Google Scholar 

  9. Zhang Y, Xu C, Li H, Yang K, Cheng N, Shen X (2020) PROTECT: efficient password-based threshold single-sign-on authentication for mobile users against perpetual leakage. IEEE Trans Mob Comput. https://doi.org/10.1109/TMC.2020.2975792

  10. Btk killer. https://en.wikipedia.org/wiki/Dennis_Rader

  11. Audit trails. http://csrc.nist.gov/publications/nistbul/itl97-03.txt

  12. Madden BA, Adams IF, Storer MW, Miller EL, Long DD, Kroeger TM (2011) Provenance based rebuild: using data provenance to improve reliability. UCSC, Technical Report

    Google Scholar 

  13. Ashcroft J, Daniels DJ, Hart SV (2011) Forensic examination of digital evidence: a guide for law enforcement. https://www.ncjrs.gov/txtfiles1/nij/199408.txt

  14. Lin X, Chen T, Zhu T, Yang K, Wei F (2018) Automated forensic analysis of mobile applications on android devices.Digital Investigation 26:59–66

    Article  Google Scholar 

  15. Health insurance portability and accountability act. https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Account-ability_Act

  16. Zhang Y, Xu C, Lin X, Shen X (2019) Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Trans Cloud Comput. https://doi.org/10.1109/TCC.2019.2908400

  17. Zhang Y, Xu C, Ni J, Li H, Shen X (2019) Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Trans Cloud Comput. https://doi.org/10.1109/TCC.2019.2923222

  18. Lynch CA (2001) When documents deceive: trust and provenance as new factors for information retrieval in a tangled web. J Assoc Inf Sci Technol52(1):12

    Article  Google Scholar 

  19. Lu R, Lin X, Liang X, Shen X (2010) Secure provenance: the essential of bread and butter of data forensics in cloud computing. In: ACM symposium on information, computer and communications security, pp 282–292

    Google Scholar 

  20. Chow S, Chu C, Huang X, Zhou J, Deng RH (2012) Dynamic secure cloud storage with provenance. In: Cryptography and security, pp 442–464

    Chapter  Google Scholar 

  21. Margo DW, Smogor R (2010) Using provenance to extract semantic file attributes. In: Conference on theory and practice of provenance

    Google Scholar 

  22. Di L, Yue P, Ramapriyan HK, King RL (2013) Geoscience data provenance: an overview. IEEE Trans Geosci. Remote Sensing 51(11):5065–5072

    Google Scholar 

  23. He L, Yue P, Di L, Zhang M, Hu L (2014) Adding geospatial data provenance into SDI—a service-oriented approach. IEEE J Selected Topics Appl Earth Observations and Remote Sensing 8(2):926–936

    Article  Google Scholar 

  24. Interlandi M, Ekmekji A, Shah , MA Gulzar, Tetali SD, Kim M, Millstein T, Condie T (2017) Adding data provenance support to apache spark. VLDB J 27(5):1–21

    Google Scholar 

  25. Hasan R, Sion R, Winslett M (2007) Introducing secure provenance: problems and challenges. In: ACM workshop on storage security and survivability, pp 13–18

    Google Scholar 

  26. Zhang Y, Xu C, Li H, Yang H, She X (2019) Chronos: secure and accurate time-stamping scheme for digital files via blockchain. In: IEEE international conference on communications, pp 1–6

    Google Scholar 

  27. Zhang Y, Xu C, Cheng N, Li H, Yang H, Shen X (2019) Chronos+: an accurate blockchain-based time-stamping scheme for cloud storage. IEEE Trans Serv Comput 13(2):216–229. https://doi.org/10.1109/TSC.2019.2947476

    Google Scholar 

  28. Nakamoto S, Bitcoin: a peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf

  29. Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151:1–32

    Google Scholar 

  30. Zhang Y, Lin X, Xu C (2018) Blockchain-based secure data provenance for cloud storage. In: International conference on information and communications security, pp 3–19

    Chapter  Google Scholar 

  31. Kiayias A, Russell A, David B, Oliynykov R (2017) Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Annual cryptology conference, pp 357–388

    Chapter  Google Scholar 

  32. Pass R, Shi E (2018) Thunderella: blockchains with optimistic instant confirmation. In: International conference on the theory and applications of cryptographic techniques, pp 3–33

    Chapter  Google Scholar 

  33. Wang J, Crawl D, Purawat S, Nguyen M, Altintas I (2015) Big data provenance: challenges, state of the art and opportunities. In: IEEE international conference on big data, pp 2509–2516

    Google Scholar 

  34. Ramachandran A, Kantarcioglu M (2018) Smartprovenance: a distributed, blockchain based dataprovenance system. In: ACM conference on data and application security and privacy, pp 35–42.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Zhang, Y., Xu, C., Shen, X.S. (2020). Secure Data Provenance. In: Data Security in Cloud Storage. Wireless Networks. Springer, Singapore. https://doi.org/10.1007/978-981-15-4374-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-4374-6_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-4373-9

  • Online ISBN: 978-981-15-4374-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics