Fengying Wang
College of Computer Science and technology, Shandong University of Technology, Zibo, Shandong, 255049, China
Xiumei Li
Zibo High School, Zibo,Shandong, 255000, China
Caihong Li
College of Computer Science and technology, Shandong University of Technology, Zibo, Shandong, 255049, China
Hui Zhao
College of Computer Science and technology, Shandong University of Technology, Zibo, Shandong, 255049, China
ABSTRACT
Information provenance is a new research field that can be used to determine the source, quality and reliability of the Information. We focus on the unique security needs of the provenance information in electronic commerce and study regrowth method of broadcast encryption tree for the insufficiencies of encryption scheme of information provenance. We propose a new security provenance model with the introduction of time-stamp technology in order to increase the security of signatures which protect the security of provenance information.
PDF References Citation
How to cite this article
Fengying Wang, Xiumei Li, Caihong Li and Hui Zhao, 2013. Research on Provenance Security of E-commerce Information. Information Technology Journal, 12: 7568-7573.
DOI: 10.3923/itj.2013.7568.7573
URL: https://scialert.net/abstract/?doi=itj.2013.7568.7573
DOI: 10.3923/itj.2013.7568.7573
URL: https://scialert.net/abstract/?doi=itj.2013.7568.7573
REFERENCES
- Bhagwat, D., L. Chiticariu, W.C. Tan and G. Vijayvargiya, 2004. An annotation management system for relational databases. Proceedings of the 30th International Conference on Very Large Data Bases, August 29-September 3, 2004, Toronto, Canada, pp: 900-911.
Direct Link - Buneman, P., A. Chapman and J. Cheney, 2006. Provenance management in curated databases. Proceedings of the ACM SIGMOD International Conference on Management of Data, June 27-29, 2006, Chicago, IL., USA., pp: 539-550.
CrossRef - Buneman, P., S. Khanna and W.C. Tan, 2001. Why and where: A characterization of data provenance. Proceedings of the 8th International Conference on Database Theory, January 4-6, 2001, London, UK., pp: 316-330.
CrossRef - Buneman, P., S. Khanna and W.C. Tan, 2002. On propagation of deletions and annotations through views. Proceedings of the 21st ACM Symposium on Principles of Database Systems, June 2-6, 2002, Madison, WI., USA., pp: 150-158.
CrossRef - Chapman, A.P., H.V. Jagadish and P. Ramanan, 2008. Efficient provenance storage. Proceedings of the ACM SIGMOD International Conference on Management of Data, June 9-12, 2008, Vancouver, Canada, pp: 993-1006.
CrossRef - Cui, Y., J. Widom and J. Wiener, 2000. Tracing the lineage of view data in a warehousing environment. ACM Trans. Database Syst., 25: 179-227.
CrossRef - Hasan, R., R. Sion and M. Winslett, 2009. The case of the fake Picasso: Preventing history forgery with secure provenance. Proceedings of the 7th USENIX Conference on File and Storage Technologies, February 24-27, 2009, San Francisco, CA., USA., pp: 1-14.
Direct Link - Tan, W.C., 2004. Containment of relational queries with annotation propagation. Proceedings of the 9th International Workshop on Database and Programming Languages, September 6-8, 2003, Potsdam, Germany, pp: 37-53.
CrossRef - Zhang, J., A. Chapman and K. LeFevre, 2009. Do you know where your data's been?-Tamper-evident database provenance. Proceedings of the 6th VLDB Workshop on Secure Data Management, August 28, 2009, Lyon, France, pp: 17-23.
CrossRef