Provenance of exposure: Identifying sources of leaked documents

Christian Collberg, Aaron Gibson, Sam Martin, Nitin Shinde, Amir Herzberg, Haya Shulman

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We design a provenance system for documents on clouds. The system allows writing documents by several collaborating individuals. Provenance allows recovery of information about the sequence of significant events relevant to the documents. Existing provenance systems focus on editing events, such as creation or removal of document parts. In this work, we introduce provenance of exposure events, allowing identification of one, or more, individuals which are possible sources of the exposure to external source of a particular version of documents. Our design provides a practical solution for provenance of documents via not-fully-trusted cloud systems, with support for provenance of both exposure and editing events.

Original languageEnglish (US)
Title of host publication2013 IEEE Conference on Communications and Network Security, CNS 2013
PublisherIEEE Computer Society
Pages367-368
Number of pages2
ISBN (Print)9781479908950
DOIs
StatePublished - Jan 1 2013
Event1st IEEE International Conference on Communications and Network Security, CNS 2013 - Washington, DC, United States
Duration: Oct 14 2013Oct 16 2013

Publication series

Name2013 IEEE Conference on Communications and Network Security, CNS 2013

Other

Other1st IEEE International Conference on Communications and Network Security, CNS 2013
CountryUnited States
CityWashington, DC
Period10/14/1310/16/13

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Provenance of exposure: Identifying sources of leaked documents'. Together they form a unique fingerprint.

Cite this