Data Lineage in Malicious Environments
Data Lineage in Malicious Environments
Data Lineage in Malicious Environments
ABSTRACT:
EXISTING SYSTEM:
PROPOSED SYSTEM:
We point out the need for a general accountability mechanism in data
transfers. This accountability can be directly associated with provably
detecting a transmission history of data across multiple entities starting from
its origin. This is known as data provenance, data lineage or source tracing.
In this paper, we formalize this problem of provably associating the guilty
party to the leakages, and work on the data lineage methodologies to solve
the problem of information leakage in various leakage scenarios.
This system defines LIME, a generic data lineage framework for data flow
across multiple entities in the malicious environment.
We observe that entities in data flows assume one of two roles: owner or
consumer. We introduce an additional role in the form of auditor, whose task
is to determine a guilty party for any data leak, and define the exact
properties for communication between these roles.
In the process, we identify an optional non-repudiation assumption made
between two owners, and an optional trust (honesty) assumption made by
the auditor about the owners.
As our second contribution, we present an accountable data transfer protocol
to verifiably transfer data between two entities. To deal with an untrusted
sender and an untrusted receiver scenario associated with data transfer
between two consumers, our protocols employ an interesting combination of
the robust watermarking, oblivious transfer, and signature primitives.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
SOFTWARE REQUIREMENTS:
Michael Backes, Niklas Grimm, and Aniket Kate, “Data Lineage in Malicious
Environments”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE
COMPUTING, VOL. 13, NO. 2, MARCH/APRIL 2016.