About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Abstract
Use of smart-phones and devices has proliferated almost all aspects of our lives. With that, each of us have become the producers and consumers of different types of data, of different levels of sensitivity, and of different levels of trustworthiness. One important aspect of managing such data on our devices and associated cloud (e.g., iCloud of Apple) is how to manage the authenticity such data. In this paper, we present a data model and a scheme towards assuring authenticity of the data. Our scheme is very efficient - it computes only one signature. © 2012 IEEE.