Research on Confidentiality about Provenance Based on Logical Key Hierarchy

Article Preview

Abstract:

By analysing the security needs and the threat model of data provenance, a Key distribution algorithm based on Logical Key Hierarchy(LKH) is brought forward aiming at the confidentiality of provenance. In this paper, we make use of the LKH tree to reduce the storage of the keys for session encryption keys(SEK) of provenance records and decrease the transmission overhead of the provenance chains, which meet the requirement of compressing provenance chains, and then propose the method of dynamic expansion number of auditors that works out the problem of the auditors number dynamic changes existing in the safety requirements for confidentiality of provenance records.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 219-220)

Pages:

1664-1669

Citation:

Online since:

March 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Hasan, R. Sion, M. Winslett. The case of the fake picasso: Preventing history forgery with secure provenance.In 7th USENIX Conference on File and Storage Technologies(2009). pp.1-14.

DOI: 10.1145/1629080.1629082

Google Scholar

[2] Xiumei Li, Fengying Wang. Research on Data Provenance's Security Model.Journal of Shandong University of Technology, Vol. 24( 2010),p.56.

Google Scholar

[3] Fengying Wang, Xiumei Li. Research on Security Provenance Model of Information-flow in Electronic Commerce. The Ninth WHICEB.Vol.1 (2010),p.905.

Google Scholar

[4] Harney H, Muckenhirn, C. Group key management protocol architecture. IETF RFC2094, (1997).

Google Scholar

[5] Wong CK, Gouda M, Lam SS. Secure group communications using key graphs. IEEE/ACM Transactions on Networking, Vol. 8(1)(2000),pp.16-30.

DOI: 10.1109/90.836475

Google Scholar

[6] Kim Y,Perrig A,Tsudik G.Communication-efficient group key agreement. Information Systems Security. 17th International Information Security Conference.Vol.53 (2001),p.905.

Google Scholar

[7] Steiner M, Tsudik G, Waidner M. Key Agreement in Dynamic Peer Groups. IEEE Transactins on Parallel and Distributed Systems, Vol. 11(8)(2000),pp.769-780.

DOI: 10.1109/71.877936

Google Scholar

[8] Kim Y, et al. Tree-based Group Key Agreement.ACM(TISSEC), Vol. 7(1)( 2004),pp.60-96.

Google Scholar

[9] Chung Kei Wong, S.S. Digital Signatures for Flows and Multicasts. ICNP'98, p.502.

Google Scholar

[10] Wallner, et al. Key management for multicast:issues and architecture. http://www.rfc-archive.org/getrfc.php?rfc=2627. (1998).

Google Scholar

[11] Fengying Wang. Zhen Cheng. Network and Information Security, Beijing:China Railway Publishing House, Beijing(2006).

Google Scholar