The secured data provenance: Background and application oriented analysis
- Title
- The secured data provenance: Background and application oriented analysis
- Creator
- Kumar K.P.; Cherukuri R.C.
- Description
- It is with the advancement of overwhelming wireless internet access in mobile environments, users and usage data has become huge and voluminous on regular basis. For instance, the financial transactions performed via online by users are unsecure and unauthenticated in many contexts. Methods and algorithms exist for secure data transmission over different channels, perhaps lacks to achieve high performance with respect to the basic goals of security; confidentiality, integrity, availability at a considerable level. The origin of the data i.e., by whom the original transaction thread have been started, is the critical question to be answered while finalizing with the financial transaction. This concept of 'history of data' have attained good attention by the researchers from many decades at different application domains and is named as Data Provenance. However, provenance with security has got a little progress with research in the recent times especially in cyber security. This study focuses on the security aspects of data provenance with a unique approach in cryptography. The blend of these two technologies could provide an indigenous solution for securing the provenance of the related data. 2016 IEEE.
- Source
- 2016 IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2016 - Proceedings, pp. 1212-1216.
- Date
- 2017-01-01
- Publisher
- Institute of Electrical and Electronics Engineers Inc.
- Subject
- Cyber security; Provenance; Security; Visual encryption
- Coverage
- Kumar K.P., Research Scholar Christ University Bangalore- 560029, India; Cherukuri R.C., Trinity Institute of Technology and Research, Bhopal, 462036, India
- Rights
- Restricted Access
- Relation
- ISBN: 978-150900774-5
- Format
- Online
- Language
- English
- Type
- Conference paper
Collection
Citation
Kumar K.P.; Cherukuri R.C., “The secured data provenance: Background and application oriented analysis,” CHRIST (Deemed To Be University) Institutional Repository, accessed February 24, 2025, https://archives.christuniversity.in/items/show/20921.