Towards Secure Provenance in the Cloud: A Survey

Brian Lee, Abir Awad, Mirna Awad

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

17 Citations (Scopus)

Abstract

Provenance information are meta-data that summarize the history of the creation and the actions performed on an artefact e.g. data, process etc. Secure provenance is essential to improve data forensics, ensure accountability and increase the trust in the cloud. In this paper, we survey the existing cloud provenance management schemes and proposed security solutions. We investigate the current related security challenges resulting from the nature of the provenance model and the characteristics of the cloud and we finally identify potential research directions which we feel necessary t should be covered in order to build a secure cloud provenance for the next generation.

Original languageEnglish
Title of host publicationProceedings - 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing, UCC 2015
EditorsOmer Rana, Rajkumar Buyya, Ioan Raicu
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages577-582
Number of pages6
ISBN (Electronic)9780769556970
DOIs
Publication statusPublished - 2015
Event8th IEEE/ACM International Conference on Utility and Cloud Computing, UCC 2015 - Limassol, Cyprus
Duration: 7 Dec 201510 Dec 2015

Publication series

NameProceedings - 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing, UCC 2015

Conference

Conference8th IEEE/ACM International Conference on Utility and Cloud Computing, UCC 2015
Country/TerritoryCyprus
CityLimassol
Period7/12/1510/12/15

Keywords

  • cloud computing
  • provenance
  • security
  • trust

Fingerprint

Dive into the research topics of 'Towards Secure Provenance in the Cloud: A Survey'. Together they form a unique fingerprint.

Cite this