Why and Where: A Characterization of Data Provenance
ICDT '01 Proceedings of the 8th International Conference on Database Theory
Data Provenance: Some Basic Issues
FST TCS 2000 Proceedings of the 20th Conference on Foundations of Software Technology and Theoretical Computer Science
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Provenance-aware storage systems
ATEC '06 Proceedings of the annual conference on USENIX '06 Annual Technical Conference
The Open Provenance Model: An Overview
Provenance and Annotation of Data and Processes
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
The case of the fake Picasso: preventing history forgery with secure provenance
FAST '09 Proccedings of the 7th conference on File and storage technologies
Unified Declarative Platform for Secure Netwoked Information Systems
ICDE '09 Proceedings of the 2009 IEEE International Conference on Data Engineering
Preventing history forgery with secure provenance
ACM Transactions on Storage (TOS)
Provenance as first class cloud data
ACM SIGOPS Operating Systems Review
Secure provenance: the essential of bread and butter of data forensics in cloud computing
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Understanding the semantics of data provenance to support active conceptual modeling
Active conceptual modeling of learning
Efficient querying and maintenance of network provenance at internet-scale
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Privacy issues in scientific workflow provenance
Proceedings of the 1st International Workshop on Workflow Approaches to New Data-centric Science
FAST'10 Proceedings of the 8th USENIX conference on File and storage technologies
Proceedings of the 14th International Conference on Database Theory
The Open Provenance Model core specification (v1.1)
Future Generation Computer Systems
Provenance security guarantee from origin up to now in the e-Science environment
Journal of Systems Architecture: the EUROMICRO Journal
Shared and searchable encrypted data for untrusted servers
Journal of Computer Security - DBSEC 2008
Security issues in a SOA-Based provenance system
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Hi-index | 0.00 |
Cloud storage offers the flexibility of accessing data from anywhere at any time while providing economical benefits and scalability. However, cloud stores lack the ability to manage data provenance. Data provenance describes how a particular piece of data has been produced. It is vital for a post-incident investigation, widely used in healthcare, scientific collaboration, forensic analysis and legal proceedings. Data provenance needs to be secured since it may reveal private information about the sensitive data while the cloud service provider does not guarantee confidentiality of the data stored in dispersed geographical locations. This paper proposes a scheme to secure data provenance in the cloud while offering the encrypted search.