Gehani, A. and Tariq, D. (2012). c. In Proceedings of
the 13th International Middleware Conference, Mid-
dleware ’12, pages 101–120, New York, NY, USA.
Springer-Verlag New York, Inc.
Grawrock, D. (2009). Dynamics of a Trusted Platform: A
building block approach. Intel Press.
Hasan, R., Sion, R., and Winslett, M. (2009). Preventing
history forgery with secure provenance. ACM Trans-
actions on Storage (TOS), 5(4):1–43.
Intel (2016). Introduction to Intel SGX sealing.
https://software.intel.com/en-us/blogs/2016/05/
04/introduction-to-intel-sgx-sealing. Last accessed:
September 10, 2018.
Kaaniche, N., Belguith, S., and Russello, G. (2018). Ema-
lab: Efficient multi authorisation level attribute based
access control. In International Conference on Net-
work and System Security, pages 187–201. Springer.
Kaaniche, N. and Laurent, M. (2017). Attribute based en-
cryption for multi-level access control policies. In
14th International Conference on Security and Cryp-
tography (SECRYPT).
Kaaniche, N. and Laurent, M. (2018). Bdua: Blockchain-
based data usage auditing. In 2018 IEEE 11th Inter-
national Conference on Cloud Computing (CLOUD),
pages 630–637. IEEE.
Kaaniche, N., Laurent, M., and Levallois-Barth, C. (2020).
Id-based user-centric data usage auditing scheme for
distributed environments. Frontiers in Blockchain,
3:17.
Karame, G., Androulaki, E., Roeschlin, M., Gervais, A.,
and Capkun, S. (2015). Misbehavior in bitcoin: A
study of double-spending and accountability. ACM
Transactions on Information and System Security
(TISSEC), 18(1):2.
Ko, R. K. and Will, M. A. (2014). Progger: An effi-
cient, tamper-evident kernel-space logger for cloud
data provenance tracking. In 2014 IEEE 7th Interna-
tional Conference on Cloud Computing, pages 881–
889. IEEE.
Laurent, M., Kaaniche, N., Le, C., and Vander Plaetse, M.
(2018). A blockchain-based access control scheme. In
15th International Conference on Security and Cryp-
tography (SECRYPT), pages 168–176.
Li, H., Gai, K., Fang, Z., Zhu, L., Xu, L., and Jiang, P.
(2019). Blockchain-enabled data provenance in cloud
datacenter reengineering. In Proceedings of the 2019
ACM International Symposium on Blockchain and Se-
cure Critical Infrastructure, pages 47–55.
Li, Y., Marier-Bienvenue, T., Perron-Brault, A., Wang, X.,
and Par
´
e, G. (2018). Blockchain technology in busi-
ness organizations: A scoping review. In Proceedings
of the 51st Hawaii International Conference on Sys-
tem Sciences.
Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K.,
and Njilla, L. (2017). Provchain: A blockchain-
based data provenance architecture in cloud environ-
ment with enhanced privacy and availability. In Pro-
ceedings of the 17th IEEE/ACM International Sympo-
sium on Cluster, Cloud and Grid Computing, pages
468–477. IEEE Press.
Main, T. (2007). Part 2 tpm structures. Specification ver-
sion, 1.
McKeen, F., Alexandrovich, I., Berenzon, A., Rozas, C. V.,
Shafi, H., Shanbhogue, V., and Savagaonkar, U. R.
(2013). Innovative instructions and software model
for isolated execution. Hasp@ isca, 10(1).
Moreau, L., Clifford, B., Freire, J., Futrelle, J., Gil, Y.,
Groth, P., Kwasnikowska, N., Miles, S., Missier, P.,
Myers, J., et al. (2011). The open provenance model
core specification (v1. 1). Future generation computer
systems, 27(6):743–756.
Moreau, L. et al. (2010). The foundations for provenance
on the web. Foundations and Trends® in Web Science,
2(2–3):99–241.
Muniswamy-Reddy, K.-K., Barillari, J., Braun, U., Hol-
land, D. A., Maclean, D., Seltzer, M. I., and Holland,
S. D. (2008). Layering in provenance-aware storage
systems.
Muniswamy-Reddy, K.-K., Holland, D. A., Braun, U., and
Seltzer, M. I. (2006). Provenance-aware storage sys-
tems. In Usenix annual technical conference, general
track, pages 43–56.
Pohly, D. J., McLaughlin, S., McDaniel, P., and Butler, K.
(2012). Hi-fi: collecting high-fidelity whole-system
provenance. In Proceedings of the 28th Annual Com-
puter Security Applications Conference, pages 259–
268.
Ramachandran, A. and Kantarcioglu, M. (2018). Smart-
provenance: A distributed, blockchain based dat-
aprovenance system. In Proceedings of the Eighth
ACM Conference on Data and Application Security
and Privacy, pages 35–42. ACM.
Shetty, S., Red, V., Kamhoua, C., Kwiat, K., and Njilla, L.
(2017). Data provenance assurance in the cloud us-
ing blockchain. In Disruptive Technologies in Sensors
and Sensor Systems, volume 10206, page 102060I. In-
ternational Society for Optics and Photonics.
Suen, C. H., Ko, R. K., Tan, Y. S., Jagadpramana, P., and
Lee, B. S. (2013). S2logger: End-to-end data track-
ing mechanism for cloud data provenance. In 2013
12th IEEE International Conference on Trust, Secu-
rity and Privacy in Computing and Communications,
pages 594–602. IEEE.
Swan, M. (2015). Blockchain: Blueprint for a new econ-
omy. O’Reilly Media, Inc.
Taha, M. M. B., Chaisiri, S., and Ko, R. K. (2015). Trusted
tamper-evident data provenance. In 2015 IEEE Trust-
com/bigdatase/ispa, volume 1, pages 646–653. IEEE.
Vukolic, M. (2017). Rethinking permissioned blockchains.
In Proceedings of the ACM Workshop on Blockchain,
Cryptocurrencies and Contracts, BCC ’17, pages 3–7,
New York, NY, USA. ACM.
Wood, G. (2014). Ethereum: A secure decentralised gen-
eralised transaction ledger. Ethereum Project Yellow
Paper, 151.
Zafar, F., Khan, A., Suhail, S., Ahmed, I., Hameed, K.,
Khan, H. M., Jabeen, F., and Anjum, A. (2017). Trust-
worthy data: A survey, taxonomy and future trends of
secure provenance schemes. Journal of Network and
Computer Applications, 94:50–68.
Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System
237