[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/Trustcom.2015.430guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Trusted Tamper-Evident Data Provenance

Published: 20 August 2015 Publication History

Abstract

Data provenance, the origin and derivation history of data, is commonly used for security auditing, forensics and data analysis. While provenance loggers provide evidence of data changes, the integrity of the provenance logs is also critical for the integrity of the forensics process. However, to our best knowledge, few solutions are able to fully satisfy this trust requirement. In this paper, we propose a framework to enable tamper-evidence and preserve the confidentiality and integrity of data provenance using the Trusted Platform Module (TPM). Our framework also stores provenance logs in trusted and backup servers to guarantee the availability of data provenance. Tampered provenance logs can be discovered and consequently recovered by retrieving the original logs from the servers. Leveraging on TPM's technical capability, our framework guarantees data provenance collected to be admissible, complete, and confidential. More importantly, this framework can be applied to capture tampering evidence in large-scale cloud environments at system, network, and application granularities. We applied our framework to provide tamper-evidence for Progger, a cloud-based, kernel-space logger. Our results demonstrate the ability to conduct remote attestation of Progger logs' integrity, and uphold the completeness, confidential and admissible requirements.

Cited By

View all
  • (2022)SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computingCluster Computing10.1007/s10586-021-03382-525:1(167-185)Online publication date: 1-Feb-2022
  1. Trusted Tamper-Evident Data Provenance

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    TRUSTCOM '15: Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 01
    August 2015
    2844 pages
    ISBN:9781467379526

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 20 August 2015

    Author Tags

    1. Accountability in Cloud Computing
    2. Cloud Computing
    3. Data Provenance
    4. Data Security
    5. Remote Attestation
    6. Tamper Evidence
    7. Trusted Computing
    8. Trusted Platform Module

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 04 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computingCluster Computing10.1007/s10586-021-03382-525:1(167-185)Online publication date: 1-Feb-2022

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media