Provenance Based Classification Access Policy System Based on Encrypted Search for Cloud Data Storage

Digital provenance, as an important type of cloud data, has aroused increasing attention on improving system performance. Currently, provenance have been employed to provide hints on access control and estimate data quality. However, provenance itself might also be sensitive information. Therefore, provenance might be encrypted to store on cloud. In this paper, we provide a mechanism to classify cloud documents by searching specific keywords from their encrypted provenance, and we proof our scheme achieves semantic security.

[1]  Robert H. Deng,et al.  Dynamic Secure Cloud Storage with Provenance , 2012, Cryptography and Security.

[2]  Bertram Ludäscher,et al.  Efficient provenance storage over nested data collections , 2009, EDBT '09.

[3]  Thomas Heinis,et al.  Efficient lineage tracking for scientific workflows , 2008, SIGMOD Conference.

[4]  Shouhuai Xu,et al.  An Access Control Language for a General Provenance Model , 2009, Secure Data Management.

[5]  Shouhuai Xu,et al.  A roadmap for privacy-enhanced secure data provenance , 2014, Journal of Intelligent Information Systems.

[6]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[7]  Jaehong Park,et al.  A provenance-based access control model for dynamic separation of duties , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.

[8]  Martin Doerr,et al.  CRMdig: A Generic Digital Provenance Model for Scientific Observation , 2011, TaPP.

[9]  Jin Li,et al.  Digital provenance: Enabling secure data forensics in cloud computing , 2014, Future Gener. Comput. Syst..

[10]  James Cheney,et al.  Provenance management in curated databases , 2006, SIGMOD Conference.

[11]  Yogesh L. Simmhan,et al.  The Open Provenance Model core specification (v1.1) , 2011, Future Gener. Comput. Syst..

[12]  James Cheney,et al.  A Graph Model of Data and Workflow Provenance , 2010, TaPP.

[13]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[14]  Rasool Jalili,et al.  GTHBAC: A Generalized Temporal History Based Access Control Model , 2010, Telecommun. Syst..

[15]  Jennifer Widom,et al.  Databases with uncertainty and lineage , 2008, The VLDB Journal.

[16]  Vladimiro Sassone,et al.  A logical framework for history-based access control and reputation systems , 2008, J. Comput. Secur..

[17]  Jaehong Park,et al.  A provenance-based access control model , 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust.

[18]  Dan Boneh,et al.  Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.

[19]  Margo I. Seltzer,et al.  Securing Provenance , 2008, HotSec.

[20]  Anindya Banerjee,et al.  History-Based Access Control and Secure Information Flow , 2004, CASSIS.

[21]  Elisa Bertino,et al.  Secure data provenance compression using arithmetic coding in wireless sensor networks , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).

[22]  Christoph Bier How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective , 2013, 2013 IEEE Security and Privacy Workshops.