[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …
sources in the cloud during transit and processing. For instance, data provenance, which …
Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes
Data is a valuable asset for the success of business and organizations these days, as it is
effectively utilized for decision making, risk assessment, prioritizing the goals and …
effectively utilized for decision making, risk assessment, prioritizing the goals and …
Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks
Abstract The Internet of Things (IoT) is an emerging paradigm in which billions of devices
communicate, thus producing and exchanging information related to real world objects …
communicate, thus producing and exchanging information related to real world objects …
A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks
Large-scale sensor networks are deployed in numerous application domains, and the data
they collect are used in decision-making for critical infrastructures. Data are streamed from …
they collect are used in decision-making for critical infrastructures. Data are streamed from …
PROVEST: provenance-based trust model for delay tolerant networks
Delay tolerant networks (DTNs) are often encountered in military network environments
where end-to-end connectivity is not guaranteed due to frequent disconnection or delay …
where end-to-end connectivity is not guaranteed due to frequent disconnection or delay …
Dictionary based secure provenance compression for wireless sensor networks
C Wang, SR Hussain, E Bertino - IEEE transactions on parallel …, 2015 - ieeexplore.ieee.org
Due to energy and bandwidth limitations of wireless sensor networks (WSNs), it is crucial
that data provenance for these networks be as compact as possible. Even if lossy …
that data provenance for these networks be as compact as possible. Even if lossy …
A lightweight secure provenance scheme for wireless sensor networks
Large-scale sensor networks are being deployed in numerous application domains, and
often the data they collect are used in decision-making for critical infrastructures. Data are …
often the data they collect are used in decision-making for critical infrastructures. Data are …
Sensor network provenance compression using dynamic bayesian networks
C Wang, E Bertino - ACM Transactions on Sensor Networks (TOSN), 2017 - dl.acm.org
Provenance records the history of data acquisition and transmission. In wireless sensor
networks (WSNs), provenance is critical for many different purposes, including assessing the …
networks (WSNs), provenance is critical for many different purposes, including assessing the …
[PDF][PDF] Forensic analysis of configuration-based attacks
Causality analysis is an effective technique for investigating and detecting cyber attacks.
However, by focusing on auditing at the Operating System level, existing causal analysis …
However, by focusing on auditing at the Operating System level, existing causal analysis …
Opportunistic networks: fundamentals, applications and emerging trends
The opportunistic network is an emerging and recent area of research. To make this
research area more adaptable for practical and industrial use, there is a need to further …
research area more adaptable for practical and industrial use, there is a need to further …