Ensuring Data Provenance with Package Watermarking
نویسندگان
چکیده
The last decade has shown tremendous growth data production from different sectors, e.g., biology, financial markets, scientific computing, business processes, Internet of Things. The “Data is New Oil” has become a proverb in academic and corporate circles. Accordingly, tracing, recording origin and deriving data called data provenance has gained tremendous traction across board. Privacy and security of data are major challenges to provenance management. This can be tackled using watermarking. The downside of majority of existing watermarking techniques is data distortion. In this work, we purpose a novel approach called package watermarking that addresses the data capacity, usability, robustness, security, distortion, verifiability, and detectability issues in data provenance. Keywords—Data security; Provenance; Watermarking; Tempering; Cryptography; Encryption; Decryption
منابع مشابه
A Novel Approach to Packet Loss and Detection Techniques in Wireless Sensor Networks
Remote Sensor Network is extensively used as a part of various application ranges. These centers assemble data from various sensor center points. There are various promising attacks like provenance impersonation, Packet drop ambush, DDos strike, Jamming strike thus on are found in the WSN while transmitting the data. A pernicious adversary may show additional center points in the framework or e...
متن کاملReliable Provenance Information for Multimedia Data Using Invertible Fragile Watermarks
Today, more and more data is available in digital form, ranging from normal text to multimedia data such as image or video data. Since some data is of high sensitivity or undergoes legal restrictions, it is important to obtain more reliable information about the data origin and its transformations, known as data provenance. Unfortunately, current approaches for data provenance neither support m...
متن کاملData Provenance for Cloud Computing using Watermark
The term data is new oil which has become a proverb due to large amount of data generation from various sources. Processing and storing such tremendous amount of data is beyond the capabilities of traditional computing system. Cloud computing preferably considered next-generation architecture due to dynamic resource pools, low cost, reliability, virtualization, and high availability. In cloud c...
متن کاملA Self-Identifying Data for Fair Use
Public-use earth science datasets are a useful resource with the unfortunate feature that their provenance is easily disconnected from their content. “Fair-use policies” typically associated with these datasets require appropriate attribution of providers by users, but sound and complete attribution is difficult if provenance information is lost. To address this we introduce a technique to dire...
متن کاملImage provenance inference through content-based device fingerprint analysis
The last few decades have witnessed the increasing popularity of low-cost and highquality digital imaging devices ranging from digital cameras to cellphones with builtin cameras, which makes the acquisition of digital images become easier than ever before. Meanwhile, the ever-increasing convenience of image acquisition has bred the pervasiveness of powerful image editing tools, which allow even...
متن کامل