Secure Systems
نویسنده
چکیده
MARCH/APRIL 2011 1540-7993/11/$26.00 © 2011 IEEE COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES 83 Patrick McDaniel Pennsylvania State University cesses and inputs that created or transformed the data. Where provenance enumerates the entities that contributed to the data. Consider a patient x-ray image document used in a healthcare system. The provenance record for that document would identify the x-ray inputs; any postprocessing operations, such as image enhancements; the annotations created by specialists (why provenance) as well as technicians, nurses, and doctors who created and modified the record; the hosts on which the software executed; and the times and dates the processes were formed (where provenance). Data provenance has had its widest adoption in the scientific computing community. Provenance is often recorded in these environments by capturing data from instrumented workflows and systems that process large data sets. The database community has recently explored how to support provenance collection in database records and streams by retaining query structures and input. Others have examined the use of these features to measure provenance in social networks and general information retrieval processes. A more recent area of focus is provenance in operating and storage systems, which have the advantage of being difficult to circumvent, but are expensive and hard to deploy. The ProvenanceAware Storage System uses a modified Linux kernel, collecting elaborate information flow and workflow descriptions at the OS level. Further efforts defined Information is often filtered, sampled, repackaged, condensed, or altered to suit any number of purposes. Over time, the entropy of these processes causes information to lose its essential validity. Far too often, we’re left with data without knowledge. Context is necessary for good decision-making. Whether attempt ing to determine if a website is legitimate or diagnosing a patient ailment, understanding the origins and processes that formed the data is essential to a successful outcome. However, this understanding is frequently cobbled together from vague notions of physical origins and assumed datahandling practices. Intelligence failures, poor medical diagnoses, and monetary losses resulting from poor source data and attribution are far too common in both physical processes and computer systems. Data provenance documents data’s genesis and subsequent modification as it’s processed in and across systems. Manifest as annotations, logs, or workflow histories, provenance indicates the data’s origins and pedigree. Data provenance and security are symbiotic. Good security leads to accurate, timely, and detailed provenance, and good provenance lets systems and users make good security decisions. Unfortunately, support for provenance in information systems is largely experimental at this time.
منابع مشابه
Secure Communication in Shotgun Cellular Systems
In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...
متن کاملModified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption
In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply due to using special technic for fractional-order systems. Also, unlike most manuscripts, the ...
متن کاملAnti-Synchronization of Complex Chaotic T-System Via Optimal Adaptive Sliding-Mode and Its Application In Secure Communication
In this paper, an optimal adaptive sliding mode controller is proposed for anti-synchronization of two identical hyperchaotic systems. We use hyperchaotic complex T-system for master and slave systems with unknown parameters in the slave system. To construct the optimal adaptive sliding mode controller, first a simple sliding surface is designed. Then, the optimal adaptive sliding mode controll...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملDistance-Aware Beamforming for Multiuser Secure Communication Systems
Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consid...
متن کاملA Secure Chaos-Based Communication Scheme in Multipath Fading Channels Using Particle Filtering
In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynami...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011