Title: Secure provenance-based communication using visual encryption

Authors: Kukatlapalli Pradeep Kumar; Ravindranath C. Cherukuri

Addresses: Computer Science and Engineering, Faculty of Engineering, CHRIST (Deemed to be University), Bangalore-560074, Karnataka, India; Electrical and Electronics Engineering and Computer Science and Engineering, Faculty of Engineering, CHRIST (Deemed to be University), Bangalore-560074, Karnataka, India ' Computer Science and Engineering, Faculty of Engineering, CHRIST (Deemed to be University), Bangalore-560074, Karnataka, India; Electrical and Electronics Engineering and Computer Science and Engineering, Faculty of Engineering, CHRIST (Deemed to be University), Bangalore-560074, Karnataka, India

Abstract: Explicit specification of the historical record of an instance or a data item is called data provenance. It has many applications in various fields with regards to its importance on capturing data flow mechanisms. However, on the other hand, there are good number of security mechanisms in place to withstand the cyber-attacks. Almost all of these algorithms uses complex mathematical calculations in providing security for the systems. Visual cryptography is a peculiar approach which uses concept of secret sharing by dividing the message into transparencies as encryption process. Upon superimposing transparencies one obtains the original message. In this paper, we propose secret sharing as a notion of security onto data provenance. Main inference of this writing is to throw a model combining above two mentioned aspects which gives away an indigenous solution in the area of information security. This proposed model is implemented with specific use case scenarios for substantiation and related analysis. Simulated results and discussion of the same is presented in the paper.

Keywords: data provenance; visual cryptography; communication; shares; cyber security.

DOI: 10.1504/IJICA.2019.103394

International Journal of Innovative Computing and Applications, 2019 Vol.10 No.3/4, pp.194 - 206

Received: 14 Dec 2018
Accepted: 29 Apr 2019

Published online: 05 Nov 2019 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article