Ensuring Distributed Culpability for Provenance Sharing in the cloud

Authors

  • Wolali Ametepe School of Computer Science and Communication Engineering, Jiangsu University
  • Wang Changda School of Computer Science and Communication Engineering, Jiangsu University
  • Li Xiaowei School of Computer Science and Communication Engineering, Jiangsu University

DOI:

https://doi.org/10.31755/ijcis/2022.2.2

Keywords:

Provenance, automation, secret sharing, cloud security

Abstract

Cloud computing infrastructure is a new skill for sharing information Technology and data based services over the information super highway. Society, industry and science are being developed by essential new skills for information sharing. The major aspect for crosscutting question is recording and managing provenance, or information about the derivation, context, origin, or history of data. We postulate that data provenance will perform a vital role in developing advanced digital setups. Several researches have been conducted by focusing on managing, recording mechanisms or by means of provenance information. In this paper, we present the implementation of an automatic collection and storage of data provenance, by developing provenance collection and storage model. We also designed uniform interface with provenance triggering protocol for sending provenance to more than one cloud at the same time. To satisfy the basic models that define data provenance and relate it to security goals such as confidentiality, integrity and availability (CIA), we deployed security implementation on data provenance using Shamir’s secret sharing principle.

References

A Vouk, M. (2008). Cloud computing–issues, research and implementations. CIT. Journal of Computing and Information Technology, 16(4), 235-246.

Alon, N., Kaplan, H., Krivelevich, M., Malkhi, D., & Stern, J. (2000). Scalable secure storage when half the system is faulty. Paper presented at the International Colloquium on Automata, Languages, and Programming.

Alon, N., Kaplan, H., Krivelevich, M., Malkhi, D., & Stern, J. (2002). Scalable secure storage when half the system is faulty. Information and Computation, 174(2), 203-213.

Bahrami, M. (2016). A Dynamic Cloud with Data Privacy Preservation. University of California, Merced.

Beebe, N. H. (2017). A Complete Bibliography of Publications in Computer Systems Science and Engineering and International Journal of Computer Systems Science and Engineering.

Buneman, P., Chapman, A., & Cheney, J. (2006). Provenance management in curated databases. Paper presented at the Proceedings of the 2006 ACM SIGMOD international conference on Management of data.

Buneman, P., Khanna, S., & Tan, W. C. (2001). Why and where: A characterization of data provenance. Paper presented at the ICDT.

Buyya, R., Ranjan, R., & Calheiros, R. N. (2010). Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services. Paper presented at the International Conference on Algorithms and Architectures for Parallel Processing.

Chen, P. (2016). Big Data analytics in static and streaming provenance. Indiana University.

Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., & Molina, J. (2009). Controlling data in the cloud: outsourcing computation without outsourcing control. Paper presented at the Proceedings of the 2009 ACM workshop on Cloud computing security.

Davidson, S. B., & Freire, J. (2008). Provenance and scientific workflows: challenges and opportunities. Paper presented at the Proceedings of the 2008 ACM SIGMOD international conference on Management of data.

Dimarogonas, D. V., Frazzoli, E., & Johansson, K. H. (2012). Distributed event-triggered control for multi-agent systems. IEEE Transactions on Automatic Control, 57(5), 1291-1297.

Egele, M., Scholte, T., Kirda, E., & Kruegel, C. (2012). A survey on automated dynamic malware-analysis techniques and tools. ACM Computing Surveys (CSUR), 44(2), 6.

Goble, C., Wolstencroft, K., Goderis, A., Hull, D., Zhao, J., Alper, P., . . . Turi, D. (2007). Knowledge discovery for biology with taverna Semantic Web (pp. 355-395): Springer.

Goh, E.-J., Shacham, H., Modadugu, N., & Boneh, D. (2003). SiRiUS: Securing Remote Untrusted Storage. Paper presented at the NDSS.

Hussain, S. R., Wang, C., Sultana, S., & Bertino, E. (2014). Secure data provenance compression using arithmetic coding in wireless sensor networks. Paper presented at the Performance Computing and Communications Conference (IPCCC), 2014 IEEE International.

Juels, A., & Kaliski Jr, B. S. (2007). PORs: Proofs of retrievability for large files. Paper presented at the Proceedings of the 14th ACM conference on Computer and communications security.

Juels, A., Rivest, R. L., & Szydlo, M. (2003). The blocker tag: Selective blocking of RFID tags for consumer privacy. Paper presented at the Proceedings of the 10th ACM conference on Computer and communications security.

Karpovsky, M., & Taubin, A. (2004). New class of nonlinear systematic error detecting codes. IEEE Transactions on Information Theory, 50(8), 1818-1819.

Khanaa, V., Mohanta, K., & Satheesh, B. (2013). Comparative study of uwb communications over fiber using direct and external modulations. Indian Journal of Science and Technology, 6(6), 4845-4847.

Kim, K., Obregon, J., & Jung, J.-Y. (2014). Analyzing information flow and context for facebook fan pages. IEICE TRANSACTIONS on Information and Systems, 97(4), 811-814.

Ko, R. K., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., & Lee, B. S. (2011). TrustCloud: A framework for accountability and trust in cloud computing. Paper presented at the Services (SERVICES), 2011 IEEE World Congress on.

Kobara, K. (2016). Cyber Physical Security for Industrial Control Systems and IoT. IEICE TRANSACTIONS on Information and Systems, 99(4), 787-795.

Koeberl, P., Li, J., Maes, R., Rajan, A., Vishik, C., Wójcik, M., & Wu, W. (2012). A practical device authentication scheme using SRAM PUFs. Journal of Cryptographic Engineering, 2(4), 255-269.

Li, J., Li, N., & Winsborough, W. H. (2009). Automated trust negotiation using cryptographic credentials. ACM Transactions on Information and System Security (TISSEC), 13(1), 2.

Liu, B., Chiticariu, L., Chu, V., Jagadish, H., & Reiss, F. R. (2010). Automatic rule refinement for information extraction. Proceedings of the VLDB Endowment, 3(1-2), 588-597.

Liu, X., Zhang, Y., Wang, B., & Yan, J. (2013). Mona: Secure multi-owner data sharing for dynamic groups in the cloud. ieee transactions on parallel and distributed systems, 24(6), 1182-1191.

Luo, P., Lin, A. Y.-L., Wang, Z., & Karpovsky, M. (2014). Hardware implementation of secure shamir's secret sharing scheme. Paper presented at the High-Assurance Systems Engineering (HASE), 2014 IEEE 15th International Symposium on.

McDaniel, P., & Prakash, A. (2006). Methods and limitations of security policy reconciliation. ACM Transactions on Information and System Security (TISSEC), 9(3), 259-291.

Moreau, L. (2010). The foundations for provenance on the web. Foundations and Trends in Web Science, 2(2–3), 99-241.

Muniswamy-Reddy, K.-K., Macko, P., & Seltzer, M. I. (2010). Provenance for the Cloud. Paper presented at the FAST.

Ngoc, T. H., Echizen, I., Komei, K., & Yoshiura, H. (2010). New approach to quantification of privacy on social network sites. Paper presented at the Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on.

Peng, C., Song, Y., Xie, X. P., Zhao, M., & Fei, M.-R. (2016). Event-triggered output tracking control for wireless networked control systems with communication delays and data dropouts. IET Control Theory & Applications, 10(17), 2195-2203.

Stamatogiannakis, M., Groth, P., & Bos, H. (2014). Looking inside the black-box: capturing data provenance using dynamic instrumentation. Paper presented at the International Provenance and Annotation Workshop.

Stoughton, C., Lupton, R. H., Bernardi, M., Blanton, M. R., Burles, S., Castander, F. J., . . . Hennessy, G. (2002). Sloan digital sky survey: early data release. The Astronomical Journal, 123(1), 485.

Udo, G. J. (2001). Privacy and security concerns as major barriers for e-commerce: a survey study. Information Management & Computer Security, 9(4), 165-174.

Valafar, M., & Butler, K. Poster: Secure provenance for cloud storage. Paper presented at the IEEE Symposium on Security and Privacy.

Vicknair, C., Macias, M., Zhao, Z., Nan, X., Chen, Y., & Wilkins, D. (2010). A comparison of a graph database and a relational database: a data provenance perspective. Paper presented at the Proceedings of the 48th annual Southeast regional conference.

Vijayakumar, A., & Kundu, S. (2015). A novel modeling attack resistant PUF design based on non-linear voltage transfer characteristics. Paper presented at the Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015.

Voas, J., & Zhang, J. (2009). Cloud computing: New wine or just a new bottle? IT professional, 11(2), 15-17.

Wang, P., Chao, K.-M., & Lo, C.-C. (2015). A reputation-based computing approach in trusted web service provisions. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 30, 285-301.

Wu, D., Thames, J. L., Rosen, D. W., & Schaefer, D. (2013). Enhancing the product realization process with cloud-based design and manufacturing systems. Journal of Computing and Information Science in Engineering, 13(4), 041004.

Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. Paper presented at the Infocom, 2010 proceedings IEEE.

Yuan, D., Cui, L., Liu, X., Fu, E., & Yang, Y. (2016). A Cost-Effective Strategy for Storing Scientific Datasets with Multiple Service Providers in the Cloud. arXiv preprint arXiv:1601.07028.

Zhang, O. Q., Kirchberg, M., Ko, R. K., & Lee, B. S. (2011). How to track your data: The case for cloud computing provenance. Paper presented at the Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on.

Zhou, L., Varadharajan, V., & Hitchens, M. (2014). Cryptographic role-based access control for secure cloud data storage systems Security, privacy and trust in cloud systems (pp. 313-344): Springer.

Zhou, W., Mapara, S., Ren, Y., Li, Y., Haeberlen, A., Ives, Z., . . . Sherr, M. (2012). Distributed time-aware provenance. Paper presented at the Proceedings of the VLDB Endowment.

Zhou, W., Sherr, M., Tao, T., Li, X., Loo, B. T., & Mao, Y. (2010). Efficient querying and maintenance of network provenance at internet-scale. Paper presented at the Proceedings of the 2010 ACM SIGMOD International Conference on Management of data.

Published

2022-04-05