Secure Provenance Transmission For Streaming Data Using HTTP Protocol
نویسندگان
چکیده
منابع مشابه
Using Blockchain and smart contracts for secure data provenance management
Blockchain technology has evolved from being an immutable ledger of transactions for cryptocurrencies to a programmable interactive environment for building distributed reliable applications. Although, blockchain technology has been used to address various challenges, to our knowledge none of the previous work focused on using blockchain to develop a secure and immutable scientific data provena...
متن کاملA Performance Analysis of Secure HTTP Protocol
Data security plays an essential role in today’s web service. Secure HTTP (HTTPS) is one of the popular protocols to transfer sensitive data over the Internet. This paper shows how the security affects performance compared to HTTP. Based on our preliminary measurements, the average response time ranges from 0.1 to 5 seconds, and from 6 to 8 seconds, for HTTP and HTTPS, respectively. Our experim...
متن کاملSecure Provenance for Data Preservation Repositories
Importance of research data preservation and management has been accepted by the scientists all around the world. Interest and investment in data preservation projects has become higher than ever before. Already there are number of wellknown research data repositories for different types of research data. Data preservation, sharing, discovery and reuse are the key features which are common acro...
متن کاملA lightweight secure data transmission protocol for resource constrained devices
In this paper we present a lightweight but robust security protocol based on the forward and backward property of RC4 stream cipher. The proposed protocol offers data confidentiality, data authentication, data integrity, and data freshness with less operation and low overhead. Also, it allows data packets to be received in any arbitrary order and achieves semantic security. Furthermore, it elim...
متن کاملData-provenance Verification for Secure Hosts
Network or host-based signature scanning approaches alone were proven inadequate against new and emerging malware. We view malicious bots or malware in general as entities stealthily residing on a human user’s computer and interacting with the user’s computing resources. In this existing work we need to improve the trustworthiness of a host and its system data. Specifically, we provide a new me...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering
سال: 2015
ISSN: 2320-3765,2278-8875
DOI: 10.15662/ijareeie.2015.0402029