Implementation of Lime Framework for Data Provenance

Usha Rani


Security is the important component during the data transfer through the network .Secure transmission of confidential data is a challenging issue. The data can be accessed by the unauthorized user for malicious purpose. Identification of the attacker is usually expensive and doesn’t generate the wanted results. So there is the need for a general security mechanism during data transfers. This accountability can be directly associated with provably detecting a communication history of data across multiple entities preliminary from its origin. This is known as data provenance. However, most efforts have been unprepared in nature and there is no official model available. Additionally, most of these approaches only allow identification of the attacker in a non-provable manner, which does not provide enough information. A data provenance framework LIME for data flow across multiple entities is presented in this paper. The exact security to a data provenance is analyzed. A new approach for responsible data transfer protocol between two entities within a malicious environment by building upon unaware transfer, strong watermarking, and mark primitives is analyzed and developed. This paper concentrates on the secure data transfer protocol.

Full Text:



“Chronology of data breaches,”

“Databreach cost,” http: // 01.

“Privacy rights clearinghouse,”.

“Electronic Privacy Information Center (EPIC),”, 1994.

“Facebook in Privacy Breach,” SB10001424052702304772804575558484075236968.html.

“Offshore outsourcing,” 109938/Offshore outsourcing cited in Florida data leak.

A. Mascher-Kampfer, H. St ¨ogner, and A. Uhl, “Multiple re-watermarking scenarios,” in Proceedings of the 13th International Conference on Systems, Signals, and Image Processing (IWSSIP 2006). Citeseer, 2006, pp. 53–56.

P. Papadimitriou and H. Garcia-Molina, “Data leakage detection,” Knowledge and Data Engineering, IEEE Transactions on, vol. 23, no. 1, pp. 51–63, 2011.

“Pairing-Based Cryptography Library (PBC),”

I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” Image Processing, IEEE Transactions on, vol. 6, no. 12, pp. 1673–1687, 1997.

B. Pfitzmann and M. Waidner, “Asymmetric fingerprinting for larger collusions,” in Proceedings of the 4th ACM conference on Computer and communications security, ser. CCS ’97, 1997, pp. 151–160.

S. Goldwasser, S. Micali, and R. L. Rivest, “A digital signature scheme secure against adaptive chosen-message attacks,” SIAM J. Comput., vol. 17, no. 2, pp. 281–308, 1988.

A. Adelsbach, S. Katzenbeisser, and A.-R. Sadeghi, “A computational model for watermark robustness,” in Information Hiding. Springer, 2007, pp. 145–160.

J. Kilian, F. T. Leighton, L. R. Matheson, T. G. Shamoon, R. E. Tarjan, and F. Zane, “Resistance of digital watermarks to collusive attacks,” in IEEE International Symposium on Information Theory, 1998, pp. 271–271.

M. Naor and B. Pinkas, “Efficient oblivious transfer protocols,” in Proceedings of the Twelfth Annual ACM-SIAM Symposium on Discrete Algorithms, 2001, pp. 448–457

“Lime: Data Lineage in the Malicious Environment”, Michael Backes, Niklas Grimm, and Aniket Kate,page no:1-20

. S. Katzenbeisser, B. Skoric, M. U. Celik, and A.-R. Sadeghi. Combining Tardos Fingerprinting Codes and Fingercasting. In Information Hiding, pages 294–310, 2007.

. F. Kelbert and A. Pretschner. Data usage control enforcement in distributed systems. In CODASPY, pages 71–82, 2013.

Simmonds, A; Sandilands, P; van Ekert, L (2004) Ontology for Network Security Attacks". Lecture Notes in Computer Science. Lecture Notes in Computer Science 3285, pp.317–323.

A Role-Based Trusted Network Provides Pervasive Security and Compliance - interview with Jayshree Ullal, senior VP of Cisco.

Dave Dittrich, Network monitoring/Intrusion Detection Systems (IDS), University of Washington.

Sanchez-Avila, C. Sanchez-Reillol, R, ―The Rijndael block cipher (AES proposal): A comparison with DES‖, 35th International Conference on Security Technology 2001, IEEE.

Murat Fiskiran, Ruby B. Lee, ―Workload Characterization of Elliptic Curve Cryptography and other Network Security Algorithms for Constrained Environments‖, IEEE International Workshop on Workload Characterization, 2002. WWC-5. 2002.

Aameer Nadeem, Dr. M.Younus Javed, ―A performance comparison of data Encryption Algorithm‖, Global Telecommunication Workshops, 2004 GlobeCom Workshops 2004, IEEE.

Elkamchouchi, H.M; Emarah, A.-A.M; Hagras, E.A.A, ―A New Secure Hash Dynamic Structure Algorithm (SHDSA) for Public Key Digital Signature Schemes‖, the 23rd National Radio Science Conference (NRSC 2006)

Like Zhang, Gregory B. White, ―Anomaly Detection for Application Level Network Attacks Using Payload Keywords‖, Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications (CISDA 2007).

Suhaila Orner Sharif, S.P. Mansoor, ―Performance analysis of Stream and Block cipher algorithms‖, 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), 2010.

Punita Mellu & Sitender Mali, ―AES: Asymmetric key cryptographic System‖, International Journal of Information Technology and Knowledge Management, 2011, Vol, No. 4 pp. 113-117.

YudhvirSingh, YogeshChaba, ―Information Theory test based Performance Evaluation of Cryptographic Techniques‖ , International Journal of Information Technology and Knowledge Management, Vol 1,No.2,2008 , pp. 475-483

YanWang, Ming Hu, ―Timing Evaluation of known cryptographic Algorithm‖, International Conference on Computational Intelligence and security, 2009.38. G. S. Poh. Design and Analysis of Fair Content Tracing Protocols. PhD thesis, 2009.


  • There are currently no refbacks.

MAYFEB Journal of Electrical and Computer Engineering
Toronto, Ontario, Canada