-
RootNode
Item
{"_buckets": {"deposit": "24e4d61b-0069-4b8e-869c-601a7bed92fa"}, "_deposit": {"id": "4791", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4791"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4791", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Time-stamp Oriented Efficient Secure Provenance Scheme", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The amount of valuable information, which is stored and shared digitally on online and cloud computing, is dynamically increasing. So, the storage and sharing service providers must have the ability to identify the ownership and access history of each object for trustworthiness. The provenance is the most promising technology for this ability. Although the small numbers of researches have been done for secure provenance, they are weak in overhead and supporting integrity. So, this paper proposes the new secure provenance scheme to solve these weak points. In the proposed scheme, H (Dout) is created for data integrity and C and IToken are constructed for chain integrity. For chain integrity constructions, this scheme takes only the essential materials of previous and next provenance records instead of all other provenance records to reduce overhead. This scheme also provides the privacy (confidentiality) for user’s sensitive data using broadcast encryption with divisive clustering algorithm."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eleventh International Conference On Computer Applications (ICCA 2013)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aye, Myat Mon"}, {"subitem_authors_fullname": "Soe, Than Naing"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2013-02-26"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/684"}, "item_title": "Time-stamp Oriented Efficient Secure Provenance Scheme", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004791", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-11"}, "publish_date": "2019-07-11", "publish_status": "0", "recid": "4791", "relation": {}, "relation_version_is_last": true, "title": ["Time-stamp Oriented Efficient Secure Provenance Scheme"], "weko_shared_id": -1}
Time-stamp Oriented Efficient Secure Provenance Scheme
http://hdl.handle.net/20.500.12678/0000004791
http://hdl.handle.net/20.500.12678/0000004791