TY - JOUR
T1 - Digital provenance
T2 - Enabling secure data forensics in cloud computing
AU - Li, Jin
AU - Chen, Xiaofeng
AU - Huang, Qiong
AU - Wong, Duncan S.
PY - 2014/7
Y1 - 2014/7
N2 - Secure provenance that records the ownership and process history of data objects is vital to the success of data forensics in cloud computing. In this paper, we propose a new secure provenance scheme based on group signature and attribute-based signature techniques. The proposed provenance scheme provides confidentiality on sensitive documents stored in a cloud, unforgeability of the provenance record, anonymous authentication to cloud servers, fine-grained access control on documents, and provenance tracking on disputed documents. Furthermore, it is assumed that the cloud server has huge computation capacity, while users are regarded as devices with low computation capability. Aiming at this, we show how to utilize the cloud server to outsource and decrease the user's computational overhead during the process of provenance. With provable security techniques, we formally demonstrate the security of the proposed scheme under standard assumptions. © 2013 Elsevier B.V. All rights reserved.
AB - Secure provenance that records the ownership and process history of data objects is vital to the success of data forensics in cloud computing. In this paper, we propose a new secure provenance scheme based on group signature and attribute-based signature techniques. The proposed provenance scheme provides confidentiality on sensitive documents stored in a cloud, unforgeability of the provenance record, anonymous authentication to cloud servers, fine-grained access control on documents, and provenance tracking on disputed documents. Furthermore, it is assumed that the cloud server has huge computation capacity, while users are regarded as devices with low computation capability. Aiming at this, we show how to utilize the cloud server to outsource and decrease the user's computational overhead during the process of provenance. With provable security techniques, we formally demonstrate the security of the proposed scheme under standard assumptions. © 2013 Elsevier B.V. All rights reserved.
KW - Attribute-based signature
KW - Cloud computing
KW - Privacy
KW - Provenance
UR - http://www.scopus.com/inward/record.url?scp=84901595577&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-84901595577&origin=recordpage
U2 - 10.1016/j.future.2013.10.006
DO - 10.1016/j.future.2013.10.006
M3 - RGC 21 - Publication in refereed journal
SN - 0167-739X
VL - 37
SP - 259
EP - 266
JO - Future Generation Computer Systems
JF - Future Generation Computer Systems
ER -