asiaccs185-lu - Secure Provenance: The Essential of Bread...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing Rongxing Lu , Xiaodong Lin , Xiaohui Liang , and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada Faculty of Business and Information Technology, University of Ontario Institute of Technology, Canada {rxlu, x27liang, xshen}; ABSTRACT Secure provenance that records ownership and process his- tory of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue today. In this paper, to tackle this unexplored area in cloud com- puting, we proposed a new secure provenance scheme based on the bilinear pairing techniques. As the essential bread and butter of data forensics and post investigation in cloud computing, the proposed scheme is characterized by provid- ing the information confidentiality on sensitive documents stored in cloud, anonymous authentication on user access, and provenance tracking on disputed documents. With the provable security techniques, we formally demonstrate the proposed scheme is secure in the standard model. Categories and Subject Descriptors C.2.0 [ General ]: Security and protection General Terms Security, Privacy Keywords Cloud Computing, Data Forensics, Secure Provenance, Prov- able Security, Standard Model 1. INTRODUCTION Cloud computing, as an emerging computing paradigm aiming to share storage, computation, and services trans- parently among a massive users, has gathered great mo- mentum from not only industry but also academia [5]. In essence, cloud computing overlaps many existing concepts, such as distributed, grid and utility computing [17]. How- ever, driven largely by marketing and service offerings from big corporate players like Google, IBM and Amazon, cloud computing has evolved out of these concepts and become a new buzz word focusing oncloud more abstract resource Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ASIACCS10 April 1316, 2010, Beijing, China. Copyright 2010 ACM 978-1-60558-936-7 ...$10.00. and services delivery [8]. Once cloud computing steps into our daily lives, any locally stored information, such as email, word processing documents and spreadsheets, could be re- motely stored in a cloud [6]. Then, we can use any termi- nals, e.g., computer, laptop and PDA etc., to access these information at anytime, anywhere. Due to these promising characteristics, cloud computing has become increasingly at- tractive to the public [10, 20, 4, 19]....
View Full Document

This note was uploaded on 01/27/2012 for the course CS 600 taught by Professor Smith,r during the Winter '08 term at Alabama.

Page1 / 11

asiaccs185-lu - Secure Provenance: The Essential of Bread...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online