Secure Provenance Transmission for Data Streams
Salmin Sultana - Purdue University
Jan 18, 2012Size: 517.4MB
Download: MP4 Video
Watch in your Browser Watch on YouTube
AbstractMany application domains, such as real-time financial analysis, e-healthcare systems, sensor networks, are characterized
by continuous data streaming from multiple sources and through intermediate processing by multiple aggregators. Keeping track of
data provenance in such highly dynamic context is an important requirement, since data provenance is a key factor in assessing
data trustworthiness which is crucial for many applications. Provenance management for streaming data requires addressing several
challenges, including the assurance of high processing throughput, low bandwidth consumption, storage efficiency and secure transmission. In this talk, I will discuss a novel approach to securely transmit provenance for streaming data (focusing on sensor network) by embedding provenance into the inter-packet timing domain while addressing the above mentioned issues. As provenance is hidden in another host-medium, our solution can be conceptualized as watermarking technique. However, unlike traditional watermarking approaches, we embed provenance over the inter-packet delays rather than in the sensor data themselves, hence avoiding the problem of data degradation due to watermarking. Provenance is extracted by the data receiver utilizing an optimal threshold-based mechanism which minimizes the probability of provenance decoding errors. The resiliency of the scheme against outside and inside attackers is established through an extensive security analysis. Experiments show that our technique can recover provenance upto a certain level against perturbations to inter-packet timing characteristics.
About the SpeakerSalmin Sultana is pursuing her PhD in Computer Engineering in the School of ECE at Purdue University. Her research interests include secure data provenance, security and fault tolerance of distributed systems, such as cloud computing, power grid, and high performance computing. She is a member of the Center for Education and Research in Information Assurance and Security (CERIAS).
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.