Ensuring Data Provenance with Package Watermarking

Abstract

The last decade has shown tremendous growth data production from different sectors, e.g., biology, financial markets, scientific computing, business processes, Internet of Things. The “Data is New Oil” has become a proverb in academic and corporate circles. Accordingly, tracing, recording origin and deriving data called data provenance has gained tremendous traction across board. Privacy and security of data are major challenges to provenance management. This can be tackled using watermarking. The downside of majority of existing watermarking techniques is data distortion. In this work, we purpose a novel approach called package watermarking that addresses the data capacity, usability, robustness, security, distortion, verifiability, and detectability issues in data provenance.

Authors and Affiliations

Muhammad Umer Sarwar, Muhammad Kashif Hanif, Ramzan Talib, Muhammad Asad Abbas

Keywords

Related Articles

 BPM, Agile, and Virtualization Combine to Create Effective Solutions

 The rate of change in business and government is accelerating. A number of techniques for addressing that change have emerged independently to provide for automated solutions in this environment. This paper will ex...

Student Facial Authentication Model based on OpenCV’s Object Detection Method and QR Code for Zambian Higher Institutions of Learning

Facial biometrics captures human facial physiological data, converts it into a data item variable so that this stored variable may be used to provide information security services, such as authentication, integrity manag...

Portable Facial Recognition Jukebox Using Fisherfaces (Frj)

A portable real-time facial recognition system that is able to play personalized music based on the identified person’s preferences was developed. The system is called Portable Facial Recognition Jukebox Using Fisherface...

A Review of Solutions for SDN-Exclusive Security Issues

Software Defined Networking is a paradigm still in its emergent stages in the realm of production-scale networks. Centralisation of network control introduces a new level of flexibility for network administrators and pro...

A Modified Adaptive Thresholding Method using Cuckoo Search Algorithm for Detecting Surface Defects

There are various mathematical optimization problems that can be effectively solved by meta-heuristic algorithms. The improvement of these algorithms is that they carry out iterative search processes which resourcefully...

Download PDF file
  • EP ID EP259131
  • DOI 10.14569/IJACSA.2017.080560
  • Views 103
  • Downloads 0

How To Cite

Muhammad Umer Sarwar, Muhammad Kashif Hanif, Ramzan Talib, Muhammad Asad Abbas (2017). Ensuring Data Provenance with Package Watermarking. International Journal of Advanced Computer Science & Applications, 8(5), 498-501. https://europub.co.uk./articles/-A-259131