The case of the fake Picasso: preventing history forgery with secure provenance

作者: Radu Sion , Marianne Winslett , Ragib Hasan

DOI:

关键词: ConfidentialityInternet privacyComputer securityPICASSOApplication layerOverhead (computing)GovernmentAuthenticationProvenanceComputer science

摘要: As increasing amounts of valuable information are produced and persist digitally, the ability to determine origin data becomes important. In science, medicine, commerce, government, provenance tracking is essential for rights protection, regulatory compliance, management intelligence medical data, authentication as it flows through workplace tasks. this paper, we show how provide strong integrity confidentiality assurances information. We describe our provenance-aware system prototype that implements writes at application layer, which makes extremely easy deploy. present empirical results that, typical real-life workloads, run-time overhead approach recording with guarantees ranges from 1%-13%.

参考文章(51)
Manuel Blum, Coin Flipping by Telephone. international cryptology conference. pp. 11- 15 ,(1981)
Giuseppe Ateniese, Zachary N. J. Peterson, Randal Burns, Stephen Bono, Design and implementation of verifiable audit trails for a versioning file system file and storage technologies. pp. 20- 20 ,(2007)
Daniel Sandler, Dan S. Wallach, Casting votes in the auditorium usenix workshop on accurate electronic voting technology. pp. 4- 4 ,(2007)
Nagendra Modadugu, Philippe Golle, Authenticating Streamed Data in the Presence of Random Packet Loss. network and distributed system security symposium. ,(2001)
Jennifer Widom, Trio: A System for Integrated Management of Data, Accuracy, and Lineage conference on innovative data systems research. pp. 262- 276 ,(2004)
Jun Zhao, Carole Goble, Robert Stevens, Sean Bechhofer, Semantically Linking and Browsing Provenance Logs for E-science Lecture Notes in Computer Science. pp. 158- 176 ,(2004) , 10.1007/978-3-540-30145-5_10
Roger S. Barga, Luciano A. Digiampietri, Automatic Generation of Workflow Provenance Provenance and Annotation of Data. pp. 1- 9 ,(2006) , 10.1007/11890850_1
Oded Goldreich, Foundations of Cryptography: Basic Tools Cambridge University Press. ,(2000)