کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
425884 | 685948 | 2014 | 8 صفحه PDF | دانلود رایگان |
• We propose a practical secure provenance scheme with fine-grained access control.
• A broadcast encryption technique is utilized to decrease the data owner’s computational overhead.
• An attribute-based signature is applied to realize efficient anonymous authentication.
Secure provenance that records the ownership and process history of data objects is vital to the success of data forensics in cloud computing. In this paper, we propose a new secure provenance scheme based on group signature and attribute-based signature techniques. The proposed provenance scheme provides confidentiality on sensitive documents stored in a cloud, unforgeability of the provenance record, anonymous authentication to cloud servers, fine-grained access control on documents, and provenance tracking on disputed documents. Furthermore, it is assumed that the cloud server has huge computation capacity, while users are regarded as devices with low computation capability. Aiming at this, we show how to utilize the cloud server to outsource and decrease the user’s computational overhead during the process of provenance. With provable security techniques, we formally demonstrate the security of the proposed scheme under standard assumptions.
Journal: Future Generation Computer Systems - Volume 37, July 2014, Pages 259–266