Monday, 7 January 2019
The Secured Data Provenance: Background and Application Oriented Analysis
It is with the
advancement of overwhelming wireless internet access in mobile environments,
users and usage data has become huge and voluminous on regular basis. For
instance, the financial transactions performed via online by users are unsecure
and unauthenticated in many contexts. Methods and algorithms exist for secure
data transmission over different channels, perhaps lacks to achieve high
performance with respect to the basic goals of security; confidentiality,
integrity, availability at a considerable level. The origin of the data i.e.,
by whom the original transaction thread have been started, is the critical
question to be answered while finalizing with the financial transaction. This
concept of ‘history of data’ have attained good attention by the researchers
from many decades at different application domains and is named as Data
Provenance. However, provenance with security has got a little progress with research
in the recent times especially in cyber security. This study focuses on the
security aspects of data provenance with a unique approach in cryptography. The
blend of these two technologies could provide an indigenous solution for
securing the provenance of the related data.
Subscribe to:
Post Comments (Atom)
The lineage of Data Objects with transformations on CIA: C- confidentiality I- Integrity A- Availability.
The above figure elucidates the basic transformations among the data objects taken from their origin to the current state. Perha...

-
Abstract — The developments in the information technology has led the modern world to rely on the internet for digital information. Peo...
-
It is with the advancement of overwhelming wireless internet access in mobile environments, users and usage data has become huge and volumi...
-
Estimating and attempting to overcome congestion in high radix topologies that use global adaptive routing decisions will have a great impa...
No comments:
Post a Comment