Paper Title:
Research on Confidentiality about Provenance Based on Logical Key Hierarchy
  Abstract

By analysing the security needs and the threat model of data provenance, a Key distribution algorithm based on Logical Key Hierarchy(LKH) is brought forward aiming at the confidentiality of provenance. In this paper, we make use of the LKH tree to reduce the storage of the keys for session encryption keys(SEK) of provenance records and decrease the transmission overhead of the provenance chains, which meet the requirement of compressing provenance chains, and then propose the method of dynamic expansion number of auditors that works out the problem of the auditors number dynamic changes existing in the safety requirements for confidentiality of provenance records.

  Info
Periodical
Advanced Materials Research (Volumes 219-220)
Edited by
Helen Zhang, Gang Shen and David Jin
Pages
1664-1669
DOI
10.4028/www.scientific.net/AMR.219-220.1664
Citation
F. Y. Wang, X. M. Li, "Research on Confidentiality about Provenance Based on Logical Key Hierarchy", Advanced Materials Research, Vols. 219-220, pp. 1664-1669, 2011
Online since
March 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Ming Chu Li, Liang Zhang, Cheng Guo
Chapter 1: Databases, Data Processing and Data Management
Abstract:The paper focused on the construction of an efficient DPDP for public audit. We improved the existing proof of storage model by manipulating...
9
Authors: Hao Li, Cheng Yang, Jia Yin Tian
Chapter 8: Communications and Applied Information Technologies
Abstract:Nowadays, with the development of hardware platform, digital content can be presented in more varieties of forms. The authorized users not...
815