Dissertation > Excellent graduate degree dissertation topics show

Research on Data Provenance’s Security Model

Author: YanZuoZuo
Tutor: WangFengYing
School: Shandong University of Technology
Course: Applied Computer Technology
Keywords: Cloud Computing Provenance Threshold Cryptography multi-chainConnection
CLC: TP393.08
Type: Master's thesis
Year: 2012
Downloads: 191
Quote: 1
Read: Download Dissertation

Abstract


Cloud computing is a popular computing mode being researched and discussed by IT industry, which together with the Object Internet is becoming the development trend of Internet. However, the development and application of cloud computing is still facing some challenges and the most important factor restricting its development is the security issue. If security problems are properly handled, the development of cloud computing will be faster. Provenance records the ownership and process history of data objects. Credible data provenance can be used to judge the quality of data and regenerate data according to provenance. The credibility of provenance data is based on the premise that it has’t been illegally tampered. The security of provenance is an important branch of the security field. The secure provenance is vital to data forensics and auditing in cloud computing. However, research on the subject of provenance security is yet immature and until now it is still a challenging issue.This paper studies data provenance security in cloud. The main contents are:1. According to the characteristics of cloud computing environment, a security provenance model is established in order to ensure the confidentiality, integrity, availability of provenance. The model is an inter-connected provenance chain and its smallest unit is the provenance record within the chain, which is composed by indivisible provenance factor..Provenance factors fall into two categories, one is the narrative provenance factor, and the other is the security provenance factor. The latter kind is used to ensure the security of the former.2. Propose security solutions about the confidentiality and integrity of provenance. In order to ensure confidentiality, we first use session key to encrypt the sensitive information, and then use the improved (k′, n) threshold encryption scheme to encrypt the session key. The advantage of using threshold encryption is that it can distribute the confidence, thus greatly reducing internal attacks from management staff. In terms of integrity, this paper puts digital signure on the harsh value of the provenance and, using multi-chain connection mode, builds the directed acyclic graph for provenances record to enhance their correlation.3. Propose a scheme for the application of secure data provenance to organ transplant cases. The "cloud" and data provenance contributes to improving the efficiency of organ transplant management and the secure provenance can also be used for tracking and determining medical liability.

Related Dissertations

  1. The Research of Dynamic Trust Model on Cloud Computing Platform,TP309
  2. Research and Implementation on Model of Educational Knowledge Service System Based on Eucalyptus,TP393.09
  3. The Research and Implementation of Cloud Network Experiment Platform,TP393.09
  4. Cloud-based digital library service model,G250.76
  5. The Research on Cloud Computing for the Dynamic Fuzzy Measurement Method,TP274
  6. Cloud-based Library Information Services Research,G252
  7. The Crawler of Education in Web by Cloud Computing,TP391.3
  8. Design and Implementation of Online Shopping Prototype System Based on Hadoop,TP311.52
  9. The Study of Seeding Growth and Nutrient Elements Dynamic Change in Different Provenances Vernicia Montana,S792.99
  10. The Research of Text Classification Based on Hadoop,TP391.1
  11. Variation on Fiber and Mechanical Properties in Juvenile Wood among Different Provenances of Eucalyptus Cloeziana,S792.39
  12. Fault Tolerance for MapReduce in the Cloud Environment,TP302.8
  13. Job Scheduling Technologies in Data Intensive Supercomputing Systems,TP311.13
  14. Cloud Computing-based Research on Text Mining Techniques,TP391.1
  15. IaaS cloud computing - based Web application technology research,TP393.09
  16. Metallogenic Regularity of Zircon in Downstream of the Kapuas River, West Kalimantan Province, Indonesia,P618.85
  17. Dynamics Behavior of Beach Sediment under Wave Action,P736.21
  18. Analysis of Sedimentary Characteristics and Provenance of Surficial Sediments on the West South Yellow Sea,P736.21
  19. Determination of Physiological and Biochemical Indexes and Study on Drought Resistance of Nitraria Tangutorum,S793.9
  20. Yangtze River Estuary and adjacent waters sediments element geochemistry and provenance analysis,P736.21
  21. Study on the Provenance Selection and the Growth Process of Liriodendron Pulp Forest,S792.21

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile