Design and Implementation of Dynamic Fingerprint Traceability Architecture for Sensitive Documents Based on Scripts
CSTR:
Author:
Affiliation:

1.Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences、 College of Mathematics and Information Science of Hebei University;2.Xinjiang Institute of Ecology and Geography, Chinese Academy of Sciences;3.Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences

Clc Number:

Fund Project:

the 3rd Xinjiang Scientific Expedition Program (2021xjkk1300), the National Key R&D Program of China (2021YFF1201700), and the Shenzhen Science and Technology Plan Project (SGDX20220530111001003)

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Data provenance technology is capable of recording and tracking the origins of sensitive documents to prevent their leakage. Traditional network path tracing methods are ineffective in tracking offline documents, and key tracing for encrypted files does not ensure reliable provenance for shared files. Existing techniques such as annotation, reverse querying, and data watermarking often require user involvement and are implemented at the application layer, resulting in inadequate security, lack of transparency and flexibility, and insufficient overall system scalability. This paper introduces an innovative script-based dynamic fingerprint provenance architecture that utilizes modifications to the Linux kernel to achieve foundational provenance, enhancing the security and transparency of document tracing. The fingerprint tracking algorithm is implemented through user scripts, improving the flexibility and effectiveness of document provenance. Additionally, the fingerprint-driven algorithm is designed to meet the demands of multi-load sharing, ensuring efficient and scalable document sharing. Upon verification, this architecture has a minimal impact on the operating system and exhibits excellent scalability. In scenarios involving single or multiple load sharing, the fingerprint-driven algorithm demonstrates transparency, real-time performance, and efficiency.

    Reference
    Related
    Cited by
Get Citation
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:April 23,2024
  • Revised:April 23,2024
  • Adopted:
  • Online: June 11,2024
  • Published:
Article QR Code