Research on Confidentiality about Provenance Based on Logical Key Hierarchy

Abstract:

Article Preview

By analysing the security needs and the threat model of data provenance, a Key distribution algorithm based on Logical Key Hierarchy(LKH) is brought forward aiming at the confidentiality of provenance. In this paper, we make use of the LKH tree to reduce the storage of the keys for session encryption keys(SEK) of provenance records and decrease the transmission overhead of the provenance chains, which meet the requirement of compressing provenance chains, and then propose the method of dynamic expansion number of auditors that works out the problem of the auditors number dynamic changes existing in the safety requirements for confidentiality of provenance records.

Info:

Periodical:

Advanced Materials Research (Volumes 219-220)

Edited by:

Helen Zhang, Gang Shen and David Jin

Pages:

1664-1669

DOI:

10.4028/www.scientific.net/AMR.219-220.1664

Citation:

F. Y. Wang and X. M. Li, "Research on Confidentiality about Provenance Based on Logical Key Hierarchy", Advanced Materials Research, Vols. 219-220, pp. 1664-1669, 2011

Online since:

March 2011

Export:

Price:

$35.00

In order to see related information, you need to Login.

In order to see related information, you need to Login.