Data Lineage in Malicious Environments

作者: Michael Backes , Niklas Grimm , Aniket Kate

DOI: 10.1109/TDSC.2015.2399296

关键词:

摘要: Intentional or unintentional leakage of confidential data is undoubtedly one the most severe security threats that organizations face in digital era. The threat now extends to our personal lives: a plethora information available social networks and smartphone providers indirectly transferred untrustworthy third party fourth applications. In this work, we present generic lineage framework Lime for flow across multiple entities take two characteristic, principal roles (i.e., owner consumer). We define exact guarantees required by such mechanism toward identification guilty entity, identify simplifying non-repudiation honesty assumptions. then develop analyze novel accountable transfer protocol between within malicious environment building upon oblivious transfer, robust watermarking, signature primitives. Finally, perform an experimental evaluation demonstrate practicality apply important scenarios outsourcing networks. general, consider , be key step towards achieving accountability design .

参考文章(41)
Ahmad-Reza Sadeghi, Secure fingerprinting on sound foundations pp. 1- 302 ,(2003) , 10.22028/D291-25727
Gwenaël Doërr, Jean-Luc Dugelay, A guide tour of video watermarking Signal Processing-image Communication. ,vol. 18, pp. 263- 282 ,(2003) , 10.1016/S0923-5965(02)00144-3
I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia IEEE Transactions on Image Processing. ,vol. 6, pp. 1673- 1687 ,(1997) , 10.1109/83.650120
Defa Hu, Qiaoliang Li, Asymmetric fingerprinting based on 1-out-of-n oblivious transfer IEEE Communications Letters. ,vol. 14, pp. 453- 455 ,(2010) , 10.1109/LCOMM.2010.05.100067
Agostino Cortesi, Raju Halder, Shantanu Pal, Watermarking Techniques for Relational Databases: Survey, Classification and Comparison Journal of Universal Computer Science. ,vol. 16, pp. 3164- 3190 ,(2010) , 10.3217/JUCS-016-21
J. Kilian, F.T. Leighton, L.R. Matheson, T.G. Shamoon, R.E. Tarjan, F. Zane, Resistance of digital watermarks to collusive attacks international symposium on information theory. pp. 271- ,(1998) , 10.1109/ISIT.1998.708876
J.T. Brassil, S. Low, N.F. Maxemchuk, Copyright protection for the electronic distribution of text documents Proceedings of the IEEE. ,vol. 87, pp. 1181- 1196 ,(1999) , 10.1109/5.771071
Shafi Goldwasser, Silvio Micali, Ronald L. Rivest, A digital signature scheme secure against adaptive chosen-message attacks SIAM Journal on Computing. ,vol. 17, pp. 281- 308 ,(1988) , 10.1137/0217017
Nicholas Paul Sheppard, Reihaneh Safavi-Naini, Philip Ogunbona, Secure multimedia authoring with dishonest collaborators EURASIP Journal on Advances in Signal Processing. ,vol. 2004, pp. 2214- 2223 ,(2004) , 10.1155/S1110865704401085
Florian Kelbert, Alexander Pretschner, Data usage control enforcement in distributed systems Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13. pp. 71- 82 ,(2013) , 10.1145/2435349.2435358