Skip to main content

Trustworthy Information: Concepts and Mechanisms

  • Conference paper
Web-Age Information Management (WAIM 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6184))

Included in the following conference series:

Abstract

We used to treating information received (from recognized sources) as trustworthy, which is unfortunately not true because of attacks. The situation can get worse with the emerging shift of information sharing paradigm from “need to know” to “need to share.” In order to help information consumers make the “best” decision possible, it is imperative to formulate concepts, models, frameworks, architectures, and mechanisms to facilitate information trustworthiness management in distributed and decentralized environment. In this paper we initiate a study in this direction by proposing an abstraction called information networks as well as two supporting mechanisms called provenance digital signatures and optimal security hardening of information network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Archer, D., Delcambre, L., Maier, D.: A Framework for Fine-grained Data Integration and Curation, with Provenance, in a Dataspace. In: TaPP 2009 (2009)

    Google Scholar 

  2. Bellare, M., Namprempre, C., Neven, G.: Unrestricted aggregate signatures. In: Arge, L., Cachin, C., Jurdziński, T., Tarlecki, A. (eds.) ICALP 2007. LNCS, vol. 4596, pp. 411–422. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  3. Boldyreva, A., Gentry, C., O’Neill, A., Yum, D.: Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. In: ACM CCS 2007 (2007)

    Google Scholar 

  4. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, p. 514. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Dai, C., Lin, D., Bertino, E., Kantarcioglu, M.: Approach to Evaluate Data Trustworthiness Based on Data Provenance. In: Jonker, W., Petković, M. (eds.) SDM 2008. LNCS, vol. 5159, pp. 82–98. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  7. Denning, D.: A Lattice Model of Secure Information Flow. CACM 19(5), 237–243 (1976)

    MathSciNet  Google Scholar 

  8. Halevy, A., Franklin, M., Maier, D.: Principles of dataspace systems. In: PODS 2006 (2006)

    Google Scholar 

  9. Hasan, R., Sion, R., Winslett, M.: The case of the fake picasso: Preventing history forgery with secure provenance. In: FAST 2009 (2009)

    Google Scholar 

  10. Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the Spread of Influence through a Social Network. In: ACM KDD 2003 (2003)

    Google Scholar 

  11. Kossinets, G., Kleinberg, J., Watts, D.: The Structure of Information Pathways in a Social Communication Network. In: ACM KDD 2008 (2008)

    Google Scholar 

  12. Lamport, L.: Time, clocks, and the ordering of events in a distributed system. CACM 21(7), 558–565 (1978)

    MATH  Google Scholar 

  13. Lu, S., Ostrovsky, R., Sahai, A., Shacham, H., Waters, B.: Sequential Aggregate Signatures and Multisignatures Without Random Oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 465–485. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  14. Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential Aggregate Signatures from Trapdoor Permutations. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 74–90. Springer, Heidelberg (2004)

    Google Scholar 

  15. Mattern, F.: Virtual time and global states of distributed systems. In: Workshop on Parallel and Distributed Algs. (1989)

    Google Scholar 

  16. Muniswamy-Reddy, K., Macko, P., Seltzer, M.: Making a Cloud Provenance-Aware. In: TaPP 2009 (2009)

    Google Scholar 

  17. Nemhauser, G., Wolsey, L., Fisher, M.: An analysis of the approximations for maximizing submodular set functions. Mathematical Programming 14, 265–294 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  18. Reilly, C., Naughton, J.: Transparently Gathering Provenance with Provenance Aware Condor. In: TaPP 2009 (2009)

    Google Scholar 

  19. Sabefield, A., Myers, A.C.: Language-Based Information-Flow Security. In: IEEE JSAC (2003)

    Google Scholar 

  20. Spillane, R., Sears, R., Yalamanchili, C., Gaikwad, S., Chinni, M., Zadok, E.: Story Book: An Efficient Extensible Provenance Framework. In: TaPP 2009 (2009)

    Google Scholar 

  21. Xu, S., Sandhu, R., Bertino, E.: TIUPAM: A Framework for Trustworthiness-Centric Information Sharing. In: IFIPTM 2009 (2009)

    Google Scholar 

  22. Zhang, J., Chapman, A., Lefevre, K.: Do You Know Where Your Data’s Been? — Tamper-Evident Database Provenance. In: SDM 2009 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xu, S., Qian, H., Wang, F., Zhan, Z., Bertino, E., Sandhu, R. (2010). Trustworthy Information: Concepts and Mechanisms. In: Chen, L., Tang, C., Yang, J., Gao, Y. (eds) Web-Age Information Management. WAIM 2010. Lecture Notes in Computer Science, vol 6184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14246-8_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14246-8_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14245-1

  • Online ISBN: 978-3-642-14246-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics