Securing data provenance in the cloud

N/ACitations
Citations of this article
41Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Cloud storage offers the flexibility of accessing data from anywhere at any time while providing economical benefits and scalability. However, cloud stores lack the ability to manage data provenance. Data provenance describes how a particular piece of data has been produced. It is vital for a post-incident investigation, widely used in healthcare, scientific collaboration, forensic analysis and legal proceedings. Data provenance needs to be secured since it may reveal private information about the sensitive data while the cloud service provider does not guarantee confidentiality of the data stored in dispersed geographical locations. This paper proposes a scheme to secure data provenance in the cloud while offering the encrypted search. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Asghar, M. R., Ion, M., Russello, G., & Crispo, B. (2012). Securing data provenance in the cloud. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7039 LNCS, pp. 145–160). https://doi.org/10.1007/978-3-642-27585-2_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free