About Me

Monday, 7 January 2019

The Secured Data Provenance: Background and Application Oriented Analysis

It is with the advancement of overwhelming wireless internet access in mobile environments, users and usage data has become huge and voluminous on regular basis. For instance, the financial transactions performed via online by users are unsecure and unauthenticated in many contexts. Methods and algorithms exist for secure data transmission over different channels, perhaps lacks to achieve high performance with respect to the basic goals of security; confidentiality, integrity, availability at a considerable level. The origin of the data i.e., by whom the original transaction thread have been started, is the critical question to be answered while finalizing with the financial transaction. This concept of ‘history of data’ have attained good attention by the researchers from many decades at different application domains and is named as Data Provenance. However, provenance with security has got a little progress with research in the recent times especially in cyber security. This study focuses on the security aspects of data provenance with a unique approach in cryptography. The blend of these two technologies could provide an indigenous solution for securing the provenance of the related data.

No comments:

Post a Comment

The lineage of Data Objects with transformations on CIA: C- confidentiality I- Integrity A- Availability.

 The above figure elucidates the basic transformations among the data objects taken from their origin to the current state. Perha...