Bistro: a scalable and secure data transfer service for digital government applications
Communications of the ACM
A Conceptual Framework for Composing and Managing Scientific Data Lineage
SSDBM '02 Proceedings of the 14th International Conference on Scientific and Statistical Database Management
HPDC '03 Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing
Software—Practice & Experience - Grid Security
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
International Journal of High Performance Computing Applications
A survey of data provenance in e-science
ACM SIGMOD Record
A Multipolicy Authorization Framework for Grid Security
NCA '06 Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications
Domain Based Access Control Model for Distributed Collaborative Applications
E-SCIENCE '06 Proceedings of the Second IEEE International Conference on e-Science and Grid Computing
Introducing secure provenance: problems and challenges
Proceedings of the 2007 ACM workshop on Storage security and survivability
A Stateful Web Service with Scalable Security on HVEM DataGrid
E-SCIENCE '07 Proceedings of the Third IEEE International Conference on e-Science and Grid Computing
Provenance and scientific workflows: challenges and opportunities
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Provenance Tracking with Bit Vectors
IAS '08 Proceedings of the 2008 The Fourth International Conference on Information Assurance and Security
Information Security of Remote File Transfers with Mobile Devices
COMPSAC '08 Proceedings of the 2008 32nd Annual IEEE International Computer Software and Applications Conference
Remote Integrity Check with Dishonest Storage Server
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
The case of the fake Picasso: preventing history forgery with secure provenance
FAST '09 Proccedings of the 7th conference on File and storage technologies
Towards semantics for provenance security
TAPP'09 First workshop on on Theory and practice of provenance
Do You Know Where Your Data's Been? --- Tamper-Evident Database Provenance
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Preventing history forgery with secure provenance
ACM Transactions on Storage (TOS)
GCCB'06 Proceedings of the 2006 international conference on Distributed, high-performance and grid computing in computational biology
Globus toolkit version 4: software for service-oriented systems
NPC'05 Proceedings of the 2005 IFIP international conference on Network and Parallel Computing
HVEM grid: experiences in constructing an electron microscopy grid
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Towards low overhead provenance tracking in near real-time stream filtering
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Performance evaluation of the karma provenance framework for scientific workflows
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Securing data provenance in the cloud
iNetSec'11 Proceedings of the 2011 IFIP WG 11.4 international conference on Open Problems in Network Security
Hi-index | 0.00 |
The e-Science environment provides science researchers with an online laboratory. Objects, including research data and related information, are transferred and shared in electronic form easily in an e-Science environment. Provenance, as a complete record of the changes applied to an object, provides a basis to trust an object. At this point, this paper proposes the ''Provenance Security from Origin up to Now (PSecON)'' scheme to solve the problem of how to trust provenance which is used for object trust. Through PSecON, while tracing the real source of an object transferred between e-Science environments, researchers can ensure the integrity of the object and its provenance, and confirm its actual origin. PSecON satisfies transparent audits and audit availability as well as the confidentiality and privacy of data and its provenance. These are provided by the history pool as an open board and by information hashing, respectively. PSecON supports forgery prevention and detection for provenance as well via two-way certification. Moreover, PSecON is scalable and ensures efficient and fast tracking of provenance. Based on the detailed description of PSecON in the e-Science domain, this paper demonstrates the soundness of PSecON to ensure provenance security and its easy applicability to real-world systems by analyzing the time, space and transmission overhead.