메뉴 건너뛰기




Volumn 37, Issue , 2014, Pages 259-266

Digital provenance: Enabling secure data forensics in cloud computing

Author keywords

Attribute based signature; Cloud computing; Privacy; Provenance

Indexed keywords

DATA PRIVACY; HARDWARE; SOFTWARE ENGINEERING;

EID: 84901595577     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2013.10.006     Document Type: Article
Times cited : (43)

References (29)
  • 1
    • 84901635605 scopus 로고    scopus 로고
    • Amazon Web Services, AWS
    • Amazon Web Services, AWS. Online at: http://aws.amazon.com.
  • 2
    • 84901635606 scopus 로고    scopus 로고
    • Google App Engine
    • Google App Engine. Online at: http://code.google.com/appengine/.
  • 3
    • 84901620059 scopus 로고    scopus 로고
    • Microsoft Azure
    • Microsoft Azure. http://www.microsoft.com/azure/.
  • 4
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
    • Elsevier
    • R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility Future Generation Computer Systems 25 6 2009 599 616 Elsevier
    • (2009) Future Generation Computer Systems , vol.25 , Issue.6 , pp. 599-616
    • Buyya, R.1    Yeo, C.S.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 5
    • 77954472312 scopus 로고    scopus 로고
    • Secure provenance: The essential of bread and butter of data forensics in cloud computing
    • ACM
    • Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin Shen Secure provenance: the essential of bread and butter of data forensics in cloud computing ASIACCS 2010 2010 ACM
    • (2010) ASIACCS 2010
    • Lu, R.1    Lin, X.2    Liang, X.3    Shen, X.4
  • 7
    • 41149088295 scopus 로고    scopus 로고
    • Automatic capture and efficient storage of e-Science experiment provenance
    • DOI 10.1002/cpe.1235
    • R.S. Barga, and L.A. Digiampietri Automatic capture and efficient storage of e-Science experiment provenance Concurrency and Computation: Practice and Experience 20 5 2008 419 429 (Pubitemid 351428356)
    • (2008) Concurrency Computation Practice and Experience , vol.20 , Issue.5 , pp. 419-429
    • Barga, R.S.1    Digiampietri, L.A.2
  • 9
    • 0035124553 scopus 로고    scopus 로고
    • When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web
    • DOI 10.1002/1532-2890(2000) 52:1<12::AID-ASI1062>3.0.CO;2-V
    • C.A. Lynch When documents deceive: trust and provenance as new factors for information retrieval in a tangled Web Journal of the American Society for Information Science and Technology 52 1 2001 12 17 (Pubitemid 32133545)
    • (2001) Journal of the American Society for Information Science and Technology , vol.52 , Issue.1 , pp. 12-17
    • Lynch, C.A.1
  • 10
    • 24144493423 scopus 로고    scopus 로고
    • How to securely outsource cryptographic computations
    • Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
    • Susan Hohenberger, and Anna Lysyanskaya How to securely outsource cryptographic computations TCC'05 LNCS vol. 3378 2005 264 282 (Pubitemid 41231169)
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 264-282
    • Hohenberger, S.1    Lysyanskaya, A.2
  • 12
    • 0000490812 scopus 로고    scopus 로고
    • A survey of fast exponentiation methods
    • D.M. Gorden A survey of fast exponentiation methods Journal of Algorithms 27 1 1998 129 146
    • (1998) Journal of Algorithms , vol.27 , Issue.1 , pp. 129-146
    • Gorden, D.M.1
  • 13
    • 31444456909 scopus 로고    scopus 로고
    • A survey of data provenance in e-science
    • DOI 10.1145/1084805.1084812
    • Y.L. Simmhan, B. Plale, and D. Gannon A survey of data provenance in e-Science SIGMOD Record 34 3 2005 31 36 (Pubitemid 43152529)
    • (2005) SIGMOD Record , vol.34 , Issue.3 , pp. 31-36
    • Simmhan, Y.L.1    Plale, B.2    Gannon, D.3
  • 14
    • 84948706138 scopus 로고    scopus 로고
    • Chimera. A virtual data system for representing, querying, and automating data derivation
    • IEEE Computer Society
    • I.T. Foster, J. Vockler, M. Wilde, and Y. Zhao Chimera. A virtual data system for representing, querying, and automating data derivation SSDBM'02 2002 IEEE Computer Society 37 46
    • (2002) SSDBM'02 , pp. 37-46
    • Foster, I.T.1    Vockler, J.2    Wilde, M.3    Zhao, Y.4
  • 17
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • LNCS Springer Berlin, Heidelberg
    • B. Waters Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization Proc. of PKC'11 LNCS vol. 6571 2011 Springer Berlin, Heidelberg 53 70
    • (2011) Proc. of PKC'11 , vol.6571 , pp. 53-70
    • Waters, B.1
  • 18
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Amit Sahai, and Brent Waters Fuzzy identity-based encryption EUROCRYPT'05 LNCS vol. 3494 2005 Springer 457 473 (Pubitemid 41313969)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 20
    • 76549089793 scopus 로고    scopus 로고
    • Hidden attribute-based signatures without anonymity revocation
    • Elsevier
    • Jin Li, and Kwangjo Kim Hidden attribute-based signatures without anonymity revocation Information Sciences 180 9 2010 1681 1689 Elsevier
    • (2010) Information Sciences , vol.180 , Issue.9 , pp. 1681-1689
    • Li, J.1    Kim, K.2
  • 22
    • 84901620060 scopus 로고    scopus 로고
    • Improving privacy in multi-authority attribute-based signature
    • Jin Li, Xu Ma, and Dongqing Xie Improving privacy in multi-authority attribute-based signature ChinaCrypt 2011
    • (2011) ChinaCrypt
    • Li, J.1    Ma, X.2    Xie, D.3
  • 23
    • 85024290278 scopus 로고
    • Group signatures
    • LNCS Springer-Verlag
    • D. Chaum, and E. van Heyst Group signatures Eurocrypt'91 LNCS vol. 547 1991 Springer-Verlag 257 265
    • (1991) Eurocrypt'91 , vol.547 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 25
    • 84979291225 scopus 로고
    • Broadcast encryption
    • LNCS Springer-Verlag
    • Amos Fiat, and Moni Naor Broadcast encryption CRYPTO'93 LNCS vol. 773 1993 Springer-Verlag 480 491
    • (1993) CRYPTO'93 , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 26
    • 84988273293 scopus 로고    scopus 로고
    • Multi-authority ciphertext-policy attribute-based encryption with accountability
    • ACM
    • Jin Li, Qiong Huang, Xiaofeng Chen, and Sherman S. Chow Multi-authority ciphertext-policy attribute-based encryption with accountability ASIACCS'11 2011 ACM
    • (2011) ASIACCS'11
    • Li, J.1    Huang, Q.2    Chen, X.3    Chow, S.S.4
  • 28
    • 84899113029 scopus 로고    scopus 로고
    • Outsourcing the decryption of ABE ciphertexts
    • USENIX Association Berkeley
    • M. Green, S. Hohenberger, and B. Waters Outsourcing the decryption of ABE ciphertexts Proc. of SEC'11 2011 USENIX Association Berkeley
    • (2011) Proc. of SEC'11
    • Green, M.1    Hohenberger, S.2    Waters, B.3
  • 29
    • 84865597567 scopus 로고    scopus 로고
    • New algorithms for secure outsourcing of modular exponentiations
    • LNCS Springer
    • Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, and Wenjing Lou New algorithms for secure outsourcing of modular exponentiations ESORICS LNCS vol. 7459 2012 Springer 541 556
    • (2012) ESORICS , vol.7459 , pp. 541-556
    • Chen, X.1    Li, J.2    Ma, J.3    Tang, Q.4    Lou, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.