期刊文献+

基于Merkle树的起源完整性解决方案 被引量:6

Research on the integrity of data provenance based on Merkle tree
下载PDF
导出
摘要 分析了数据起源需要满足的完整性要求和可能遭受到的完整性威胁,制定了通过电子签名和哈希图等技术手段来保证数据起源完整性的方案.阐述了该方案的安全性,并提出了安全起源的下一步研究内容. Provenance can locate the mistakes in the process of data derived, it also can verify the credibility of the current data object. Both the needed integrity requirements and potential integri- ty threats of data provenance are analyzed. The integrity scheme is formulated mainly through the electronic signature and hash graph to ensure the integrity of provenance. Finally, we expound the safety of the scheme and put forward next study of securing provenance.
作者 刘通 王凤英
出处 《山东理工大学学报(自然科学版)》 CAS 2012年第3期68-71,共4页 Journal of Shandong University of Technology:Natural Science Edition
基金 山东省自然科学基金资助项目(ZRZ101FL003)
关键词 数据起源 起源关系图 完整性 哈希图 data provenance causality graph integrity hash graph
  • 相关文献

参考文献8

  • 1Moreau L, Clifford B, Freire J, et al. The open provenance model core specfication (vl. 1)[J]. Future Generation Comput- er Systems,2011,20(3) : 1-42. 被引量:1
  • 2Braun U, Shinnar A, Seltzer M. Securing provenance[C]//InHOTSEC'08: Proceedings of the 3rd conference on Hot topics in security 2008 : 1-5. 被引量:1
  • 3李亚子.数据起源标注模式与描述模型[J].现代图书情报技术,2007(7):10-13. 被引量:16
  • 4戴超凡,王涛,张鹏程.数据起源技术发展研究综述[J].计算机应用研究,2010,27(9):3215-3221. 被引量:41
  • 5Hasan R, Sion R, Winslett M. Introducing secure provenance: problems and challenges[C]//In StorageSS'07 Proceedings of the ACM Workshop on Storage Security and Survivability, ACM Press, 2007 : 13-18. 被引量:1
  • 6Hasan R, Sion R, Winslett M. The case of the fake picassO : preventing history forgery with secure provenance[C]//Margo Seltzer, Ric Wheeler. Proceedings of the 7th USENIX Confer- ence on File and Storage Technologies, In: FAST, 2009 : 1-14. 被引量:1
  • 7Chaum D, Heyst E V. Group signatures[A], proceedings of the 10th annual international conference on Theory and application of coyptographic techniques, springer Verlag Berlin, Heidel berg 1991:257-265. 被引量:1
  • 8Merkle R C. Protocols for public key cryptosystems[C]//In IEEE Symposium on Security and Privacy, 1980 : 122-134. 被引量:1

二级参考文献93

  • 1刘喜平,万常选.数据起源研究综述[J].科技广场,2005(1):47-52. 被引量:13
  • 2李亚子.数据起源标注模式与描述模型[J].现代图书情报技术,2007(7):10-13. 被引量:16
  • 3BOSE R,FREW J.Lineage retrieval for scientific data processing:a survey[J].ACM Computing Surveys,2005,37(1):1-28. 被引量:1
  • 4WIDOM J.Trio:a system for integrated management of data,accuracy,lineage[C]//Proc of the 2nd Biennial Conference on Innovative Data Systems.2006:262-276. 被引量:1
  • 5IKEDA R,WIDOM J.Panda:a system for provenance and data[J].IEEE Data Engineering Bulletin,2010,33(3):1-4. 被引量:1
  • 6WANG Y R,MADNICK S E.A polygen model for heterogeneous database systems:the source tagging perspective[R].Cambridge:Sloan School of Management,1990. 被引量:1
  • 7WOODRUFF A,STONEBRAKER G.Supporting fine-grained data lineage in a database visualization environment[C]//Proc of the 13th International Conference on Data Engineering.Washington DC:IEEE Computer Society,1997:91-102. 被引量:1
  • 8STONEBRAKER M,CHEN J,NATHAN N,et al.Tioga:providing data management support for scientific visualization applications[C]//Proc of the 19th International Conference on Very Large Databases.San Francisco:Morgan Kaufmann,1993:25-38. 被引量:1
  • 9BUNEMAN P,MAIER D,WIDOM J.Where was your data yesterday,where will it go tomorrow? data annotation and provenance for scientific applications[EB/OL].(2000-02-28).http://hermes.dpi.inpe.br:1910/col/dpi.inpe.br/ban on/2004/04.21.11.45/doc/BunemanWhereTomorrow.pdf. 被引量:1
  • 10CUI Ying-wei,WIDOM J,WIENER J L.Tracing the lineage of view data in a data warehousing environment[J].ACM Trans on Database Systems,2000,25(2):179-227. 被引量:1

共引文献49

同被引文献75

引证文献6

二级引证文献63

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部