Paper
A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks
Published Sep 25, 2018 · Idrees Ahmed, Abid Khan, A. Anjum
International Journal of Parallel Programming
4
Citations
1
Influential Citations
Abstract
Data provenance is becoming extremely important these days for distributed environment, due to the ease in sharing and modifying data stored (e.g. cloud storage systems). However, the protection of provenance chain has been greatly understudied problem. This paper presents a secure provenance scheme for a distributed environment, designed to ensure data confidentiality, integrity, and non-repudiation. Specifically, the proposed scheme is designed to detect attacks on a provenance chain launched by multiple concurrent adversaries, such as forged provenance records and provenance record shuffling attacks. Moreover, the proposed scheme detects the provenance record, which has been perturbed and identifies the malicious or compromised user. We then evaluate our scheme empirically and analytically with the state of the art to demonstrate its security and performance in terms of computational and storage overheads.
The proposed secure provenance scheme effectively detects and identifies malicious users in distributed networks, ensuring data confidentiality, integrity, and non-repudiation.
Full text analysis coming soon...