Research on Confidentiality about Provenance Based on Logical Key Hierarchy
By analysing the security needs and the threat model of data provenance, a Key distribution algorithm based on Logical Key Hierarchy(LKH) is brought forward aiming at the confidentiality of provenance. In this paper, we make use of the LKH tree to reduce the storage of the keys for session encryption keys(SEK) of provenance records and decrease the transmission overhead of the provenance chains, which meet the requirement of compressing provenance chains, and then propose the method of dynamic expansion number of auditors that works out the problem of the auditors number dynamic changes existing in the safety requirements for confidentiality of provenance records.
Helen Zhang, Gang Shen and David Jin
F. Y. Wang and X. M. Li, "Research on Confidentiality about Provenance Based on Logical Key Hierarchy", Advanced Materials Research, Vols. 219-220, pp. 1664-1669, 2011