Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes

F Zafar, A Khan, S Suhail, I Ahmed, K Hameed… - Journal of network and …, 2017 - Elsevier
Data is a valuable asset for the success of business and organizations these days, as it is
effectively utilized for decision making, risk assessment, prioritizing the goals and …

On the properties of non-media digital watermarking: a review of state of the art techniques

AS Panah, R Van Schyndel, T Sellis, E Bertino - IEEE Access, 2016 - ieeexplore.ieee.org
Over the last 25 years, there has been much work on multimedia digital watermarking. In this
domain, the primary limitation to watermark strength has been in its visibility. For multimedia …

Big data security and privacy

E Bertino, E Ferrari - A comprehensive guide through the Italian database …, 2017 - Springer
Recent technologies, such as IoT, social networks, cloud computing, and data analytics,
make today possible to collect huge amounts of data. However, for data to be used to their …

Secure data provenance in cloud-centric internet of things via blockchain smart contracts

S Ali, G Wang, MZA Bhuiyan… - 2018 IEEE SmartWorld …, 2018 - ieeexplore.ieee.org
Mission-critical applications such as industrial control, smart grids, security and surveillance
systems are highly dependent on cloud-centric IoT networks. In such networks, the diverse …

Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks

K Hameed, A Khan, M Ahmed, AG Reddy… - Future Generation …, 2018 - Elsevier
Abstract The Internet of Things (IoT) is an emerging paradigm in which billions of devices
communicate, thus producing and exchanging information related to real world objects …

A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks

S Sultana, G Ghinita, E Bertino… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Large-scale sensor networks are deployed in numerous application domains, and the data
they collect are used in decision-making for critical infrastructures. Data are streamed from …

A provenance based mechanism to identify malicious packet drop** adversaries in sensor networks

S Sultana, E Bertino, M Shehab - 2011 31st International …, 2011 - ieeexplore.ieee.org
Malicious packet drop** attack is a major security threat to the data traffic in the sensor
network, since it reduces the legal network throughput and may hinder the propagation of …

Introducing secure provenance in IoT: Requirements and challenges

S Suhail, CS Hong, ZU Ahmad… - … Workshop on Secure …, 2016 - ieeexplore.ieee.org
In current cyber-physical systems, IoT represents interconnection of highly heterogeneous
networked entities, providing goods and services to a variety of domains including …

Unifying intrusion detection and forensic analysis via provenance awareness

Y **e, D Feng, Z Tan, J Zhou - Future Generation Computer Systems, 2016 - Elsevier
The existing host-based intrusion detection methods are mainly based on recording and
analyzing the system calls of the invasion processes (such as exploring the sequences of …

A lightweight secure provenance scheme for wireless sensor networks

S Sultana, G Ghinita, E Bertino… - 2012 IEEE 18th …, 2012 - ieeexplore.ieee.org
Large-scale sensor networks are being deployed in numerous application domains, and
often the data they collect are used in decision-making for critical infrastructures. Data are …