A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Journal of the American Society for Information Science and Technology - Special issue on the still the frontier: Information Science at the Millenium
Introducing secure provenance: problems and challenges
Proceedings of the 2007 ACM workshop on Storage security and survivability
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups
Journal of Cryptology
A Tale of Clouds: Paradigm Comparisons and Some Thoughts on Research Issues
APSCC '08 Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference
Cloud Computing: Does Nirvana Hide behind the Nebula?
IEEE Software
Cloud Computing: New Wine or Just a New Bottle?
IT Professional
A High-Performance Computing Forecast: Partly Cloudy
Computing in Science and Engineering
Data Security in the World of Cloud Computing
IEEE Security and Privacy
Full-domain subgroup hiding and constant-size group signatures
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Short group signature without random oracles
ICICS'07 Proceedings of the 9th international conference on Information and communications security
INFOCOM'10 Proceedings of the 29th conference on Information communications
Efficient password-based authentication and key exchange scheme preserving user privacy
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Social snapshots: digital forensics for online social networks
Proceedings of the 27th Annual Computer Security Applications Conference
Dynamic secure cloud storage with provenance
Cryptography and Security
Securing data provenance in the cloud
iNetSec'11 Proceedings of the 2011 IFIP WG 11.4 international conference on Open Problems in Network Security
Provenance as a security control
TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
Classification and Recovery of Fragmented Multimedia Files using the File Carving Approach
International Journal of Mobile Computing and Multimedia Communications
On secure data sharing in cloud environment
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.00 |
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue today. In this paper, to tackle this unexplored area in cloud computing, we proposed a new secure provenance scheme based on the bilinear pairing techniques. As the essential bread and butter of data forensics and post investigation in cloud computing, the proposed scheme is characterized by providing the information confidentiality on sensitive documents stored in cloud, anonymous authentication on user access, and provenance tracking on disputed documents. With the provable security techniques, we formally demonstrate the proposed scheme is secure in the standard model.