Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes
Data is a valuable asset for the success of business and organizations these days, as it is
effectively utilized for decision making, risk assessment, prioritizing the goals and …
effectively utilized for decision making, risk assessment, prioritizing the goals and …
On the properties of non-media digital watermarking: a review of state of the art techniques
Over the last 25 years, there has been much work on multimedia digital watermarking. In this
domain, the primary limitation to watermark strength has been in its visibility. For multimedia …
domain, the primary limitation to watermark strength has been in its visibility. For multimedia …
Big data security and privacy
Recent technologies, such as IoT, social networks, cloud computing, and data analytics,
make today possible to collect huge amounts of data. However, for data to be used to their …
make today possible to collect huge amounts of data. However, for data to be used to their …
Secure data provenance in cloud-centric internet of things via blockchain smart contracts
Mission-critical applications such as industrial control, smart grids, security and surveillance
systems are highly dependent on cloud-centric IoT networks. In such networks, the diverse …
systems are highly dependent on cloud-centric IoT networks. In such networks, the diverse …
Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks
Abstract The Internet of Things (IoT) is an emerging paradigm in which billions of devices
communicate, thus producing and exchanging information related to real world objects …
communicate, thus producing and exchanging information related to real world objects …
A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks
Large-scale sensor networks are deployed in numerous application domains, and the data
they collect are used in decision-making for critical infrastructures. Data are streamed from …
they collect are used in decision-making for critical infrastructures. Data are streamed from …
A provenance based mechanism to identify malicious packet drop** adversaries in sensor networks
Malicious packet drop** attack is a major security threat to the data traffic in the sensor
network, since it reduces the legal network throughput and may hinder the propagation of …
network, since it reduces the legal network throughput and may hinder the propagation of …
Introducing secure provenance in IoT: Requirements and challenges
S Suhail, CS Hong, ZU Ahmad… - … Workshop on Secure …, 2016 - ieeexplore.ieee.org
In current cyber-physical systems, IoT represents interconnection of highly heterogeneous
networked entities, providing goods and services to a variety of domains including …
networked entities, providing goods and services to a variety of domains including …
Unifying intrusion detection and forensic analysis via provenance awareness
The existing host-based intrusion detection methods are mainly based on recording and
analyzing the system calls of the invasion processes (such as exploring the sequences of …
analyzing the system calls of the invasion processes (such as exploring the sequences of …
A lightweight secure provenance scheme for wireless sensor networks
Large-scale sensor networks are being deployed in numerous application domains, and
often the data they collect are used in decision-making for critical infrastructures. Data are …
often the data they collect are used in decision-making for critical infrastructures. Data are …