[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

OI Abiodun, M Alawida, AE Omolara… - Journal of King Saud …, 2022 - Elsevier
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …

Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes

F Zafar, A Khan, S Suhail, I Ahmed, K Hameed… - Journal of network and …, 2017 - Elsevier
Data is a valuable asset for the success of business and organizations these days, as it is
effectively utilized for decision making, risk assessment, prioritizing the goals and …

Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks

K Hameed, A Khan, M Ahmed, AG Reddy… - Future Generation …, 2018 - Elsevier
Abstract The Internet of Things (IoT) is an emerging paradigm in which billions of devices
communicate, thus producing and exchanging information related to real world objects …

A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks

S Sultana, G Ghinita, E Bertino… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Large-scale sensor networks are deployed in numerous application domains, and the data
they collect are used in decision-making for critical infrastructures. Data are streamed from …

PROVEST: provenance-based trust model for delay tolerant networks

JH Cho, R Chen - IEEE Transactions on Dependable and …, 2016 - ieeexplore.ieee.org
Delay tolerant networks (DTNs) are often encountered in military network environments
where end-to-end connectivity is not guaranteed due to frequent disconnection or delay …

Dictionary based secure provenance compression for wireless sensor networks

C Wang, SR Hussain, E Bertino - IEEE transactions on parallel …, 2015 - ieeexplore.ieee.org
Due to energy and bandwidth limitations of wireless sensor networks (WSNs), it is crucial
that data provenance for these networks be as compact as possible. Even if lossy …

A lightweight secure provenance scheme for wireless sensor networks

S Sultana, G Ghinita, E Bertino… - 2012 IEEE 18th …, 2012 - ieeexplore.ieee.org
Large-scale sensor networks are being deployed in numerous application domains, and
often the data they collect are used in decision-making for critical infrastructures. Data are …

Sensor network provenance compression using dynamic bayesian networks

C Wang, E Bertino - ACM Transactions on Sensor Networks (TOSN), 2017 - dl.acm.org
Provenance records the history of data acquisition and transmission. In wireless sensor
networks (WSNs), provenance is critical for many different purposes, including assessing the …

[PDF][PDF] Forensic analysis of configuration-based attacks

MA Inam, W Ul - Proceedings of the 2022 Network and Distributed …, 2022 - par.nsf.gov
Causality analysis is an effective technique for investigating and detecting cyber attacks.
However, by focusing on auditing at the Operating System level, existing causal analysis …

Opportunistic networks: fundamentals, applications and emerging trends

A Verma, P Verma, SK Dhurandher, I Woungang - 2021 - books.google.com
The opportunistic network is an emerging and recent area of research. To make this
research area more adaptable for practical and industrial use, there is a need to further …