Secure Digital Provenance: Challenges and a New Design

dc.contributor.advisorZou, Xukai, 1963-
dc.contributor.authorRangwala, Mohammed M.
dc.contributor.otherLi, Feng
dc.contributor.otherRaje, Rajeev
dc.contributor.otherFang, Shiaofen
dc.date.accessioned2015-03-31T16:19:07Z
dc.date.available2015-03-31T16:19:07Z
dc.date.issued2014
dc.degree.date2014en_US
dc.degree.grantorPurdue Universityen_US
dc.degree.levelM.S.en_US
dc.descriptionIndiana University-Purdue University Indianapolis (IUPUI)en_US
dc.description.abstractDerived from the field of art curation, digital provenance is an unforgeable record of a digital object's chain of successive custody and sequence of operations performed on the object. It plays an important role in accessing the trustworthiness of the object, verifying its reliability and conducting audit trails of its lineage. Digital provenance forms an immutable directed acyclic graph (DAG) structure. Since history of an object cannot be changed, once a provenance chain has been created it must be protected in order to guarantee its reliability. Provenance can face attacks against the integrity of records and the confidentiality of user information, making security an important trait required for digital provenance. The digital object and its associated provenance can have different security requirements, and this makes the security of provenance different from that of traditional data. Research on digital provenance has primarily focused on provenance generation, storage and management frameworks in different fields. Security of digital provenance has also gained attention in recent years, particularly as more and more data is migrated in cloud environments which are distributed and are not under the complete control of data owners. However, there still lacks a viable secure digital provenance scheme which can provide comprehensive security for digital provenance, particularly for generic and dynamic ones. In this work, we address two important aspects of secure digital provenance that have not been investigated thoroughly in existing works: 1) capturing the DAG structure of provenance and 2) supporting dynamic information sharing. We propose a scheme that uses signature-based mutual agreements between successive users to clearly delineate the transition of responsibility of the digital object as it is passed along the chain of users. In addition to preserving the properties of confidentiality, immutability and availability for a digital provenance chain, it supports the representation of DAG structures of provenance. Our scheme supports dynamic information sharing scenarios where the sequence of users who have custody of the document is not predetermined. Security analysis and empirical results indicate that our scheme improves the security of the typical secure provenance schemes with comparable performance.en_US
dc.identifier.urihttps://hdl.handle.net/1805/6051
dc.identifier.urihttp://dx.doi.org/10.7912/C2/2312
dc.language.isoen_USen_US
dc.rightsCC0 1.0 Universal
dc.rights.urihttp://creativecommons.org/publicdomain/zero/1.0/
dc.subjectavailabilityen_US
dc.subjectconfidentialityen_US
dc.subjectcryptographyen_US
dc.subjectintegrityen_US
dc.subjectprovenanceen_US
dc.subjectsignaturesen_US
dc.subject.lcshComputer security -- Management -- Research -- Methodologyen_US
dc.subject.lcshPublic key infrastructure (Computer security)en_US
dc.subject.lcshData encryption (Computer science) -- Evaluationen_US
dc.subject.lcshCryptography -- Researchen_US
dc.subject.lcshData protection -- Researchen_US
dc.subject.lcshDigital signaturesen_US
dc.subject.lcshCultural property -- Protectionen_US
dc.subject.lcshConfidential communications -- Access controlen_US
dc.subject.lcshComputer networks -- Design and constructionen_US
dc.subject.lcshComputer networks -- Security measuresen_US
dc.subject.lcshDatabase managementen_US
dc.subject.lcshDatabases -- Quality controlen_US
dc.subject.lcshInformation services -- Security measuresen_US
dc.subject.lcshComputer networks -- Monitoringen_US
dc.subject.lcshInformation services -- Quality controlen_US
dc.subject.lcshApplication software -- Developmenten_US
dc.subject.lcshComputational intelligence -- Reliabilityen_US
dc.subject.lcshComputer programs -- Validationen_US
dc.titleSecure Digital Provenance: Challenges and a New Designen_US
dc.typeThesisen
thesis.degree.disciplineComputer & Information Scienceen
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
thesis final.pdf
Size:
984.23 KB
Format:
Adobe Portable Document Format
Description:
Main Thesis file
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.88 KB
Format:
Item-specific license agreed upon to submission
Description: