Privacy-preserving network provenance

Y Zhang, A O'Neill, M Sherr, W Zhou - Proceedings of the VLDB …, 2017 - dl.acm.org
… integration of secure network provenance with privacy-preserving network provenance as
… A structured encryption scheme for privacy preserving network provenance is a tuple of four …

Data provenance in security and privacy

B Pan, N Stakhanova, S Ray - ACM Computing Surveys, 2023 - dl.acm.org
… Data provenance has shown tremendous value in numerous security and privacy
applications—for example, for privacy-preserving network analysis to explore system behavior while …

Towards privacy preserving data provenance for the Internet of Things

JLC Sanchez, JB Bernabe… - 2018 IEEE 4th World …, 2018 - ieeexplore.ieee.org
… of proper privacy-preserving data provenance mechanisms … a novel privacypreserving data
provenance solution that … Systems, to sign, in privacy-preserving way, the IoT exchanged data…

On provenance and privacy

SB Davidson, S Khanna, S Roy, J Stoyanovich… - Proceedings of the 14th …, 2011 - dl.acm.org
… There are two natural approaches to create a structuralprivacy preserving graph G′. The
first approach, mentioned earlier, is to simply delete a subset of edges and vertices in G′ so …

A roadmap for privacy-enhanced secure data provenance

E Bertino, G Ghinita, M Kantarcioglu, D Nguyen… - Journal of Intelligent …, 2014 - Springer
… When designing a framework for the secure and privacy-preserving management of provenance
it is important to note that security and privacy are not conducive to absolutes. There are …

Data provenance for IoT with light weight authentication and privacy preservation

MN Aman, MH Basheer, B Sikdar - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
… for data provenance in IoT is not extensive, we compare the performance of the proposed
protocols with one of the most recent privacy preserving data provenance protocols for IoT by …

Pdp: A privacy-preserving data provenance scheme

K Alharbi, X Lin - 2012 32nd international conference on …, 2012 - ieeexplore.ieee.org
provenance and achieve user privacy preservation, we propose a new privacy-preserving
data provenance (… servers and execute the secure provenance operations. Detailed security …

P3GNN: A Privacy-Preserving Provenance Graph-Based Model for APT Detection in Software Defined Networking

H Nazari, A Yazdinejad, A Dehghantanha… - arXiv preprint arXiv …, 2024 - arxiv.org
… This paper presents P3GNN (privacy-preserving provenance graph-based graph neural
network (GNN) model), a novel model that synergizes Federated Learning (FL) with Graph …

Privacy-preserving publication of provenance workflows

M Maruseac, G Ghinita, R Rughinis - … of the 4th ACM conference on Data …, 2014 - dl.acm.org
… , capturing and analyzing provenance information. Sharing provenance brings numerous
benefits, but … In this paper, we study privacy-preserving provenance workflow publication using …

ProvAudit: Enhance High-Level Privacy Inference Through System Provenance Data

D Li, J Xiao, P Jiang, J Gui, D Song… - … on Dependable and …, 2024 - ieeexplore.ieee.org
… protection mechanisms utilized in network/data provenance [13]. Thirdly, network/data
provenance necessitates safeguarding their provenance data through measures such as access …