Computer Systems Science & Engineering DOI:10.32604/csse.2021.015004 | |
Article |
Front-end Control Mechanism of Electronic Records
1School of Computer and Software, Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science & Technology, Nanjing, 210044, China
2Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET), Nanjing University of Information Science & Technology, Nanjing, 210044, China
3School of Mines, China University of Mining and Technology, Xuzhou, 221116, China
4International Business Machines Corporation (IBM), NY, USA
*Corresponding Author: Yongjun Ren. Email: renyj100@126.com
Received: 01 November 2020; Accepted: 22 March 2021
Abstract: In the digital era, how to ensure the authenticity and integrity of electronic records has become an open challenging issue. Front-end control is an important concept as well as a basic principle in electronic record management. Under the instruction of front-end control, many original management links in the record-management stage are required to move forward, and the managers enter the formation stage of the electronic records to ensure the originality. However, the front-end control technique primarily focuses on transaction management, and it lacks the strategy of providing the control of electronic records. In this paper, a novel electronic record front-end control mechanism is proposed by adopting proxy re-encryption and requiring archivists to participate in the management of electronic records before the record is created to solve the problem. Specifically, when an electronic record is generated, the proposed mechanism interacts with the producer of the electronic record to generate a corresponding encryption key. Moreover, electronic records are encrypted by the key to protect their confidentiality, which can prevent the leakage of electronic record information. In addition, when transferring the electronic record, archivists use proxy re-encryption technology to convert electronic records, allowing management by an archivist, ensuring their originality and authenticity.
Keywords: Electronic record; front-end control; proxy re-encryption
It is widely acknowledged that front-end control is an important idea and basic principle of electronic records management, which is based on record life cycle theory. This concept also emphasizes that control of the electronic record starts at the beginning of its life cycle and runs through the entire archive management process [1–3]. Under the guidance of front-end control, many management links that belonged originally to the record management stage need to be advanced to the electronic record formation stage. The goal is to capture and control relevant records and information as required, as well as to meet the filing and archival preservation demands for electronic records [4–6]. This is the key to ensuring the originality and authenticity of electronic records from the source, and also aids in avoiding the distortion, loss and inadequate control of electronic records.
At present, the front-end management of electronic records mainly focuses on dividing the electronic record formation process into specific record management functions. According to the functions, the electronic record formation process can be subdivided into the following six stages: generate, capture, integrate, solidify, register, and audit trail [7–9]. However, the front-end management of electronic records focuses primarily on transaction management at present. In addition, there are few technical means available to support it. To solve this problem, this paper proposes a front-end control method of electronic records based on proxy re-encryption. In the proposed mechanism, the archivist and the producer of the electronic records interact before the electronic record is created. Moreover, when the electronic record is transferred from the producer to the archivist, proxy re-encryption technology is used to ensure its originality and authenticity [10–12].
The front-end control of electronic records is based on the digital characteristics of these records, which are totally different from those of paper records [13–15]. According to record life cycle theory and the whole-process control principle, the objectives, requirements and rules of the entire electronic record management process are systematically analyzed. In this way, during the design phase of the electronic record system, the management functions implemented in the electronic record formation phase can be planned as uniformly as possible. Moreover, effective supervision should be conducted during the record formation and maintenance stage; this will ensure that the content, background and structure of electronic records are not changed or lost, keep it consistently, thereby providing better assurance of the authenticity, integrity, readability and availability of electronic records [16–18].
According to record life cycle theory, electronic records have a life cycle in a similar way to paper records. The management of electronic records is a systematic process that runs through the entire life cycle when records are generated. Throughout the whole life cycle, records may be changed or lost at any time for various reasons and purposes [19–21]. Accordingly, the archive scope and preservation value should be determined before records are produced, at the design phase, and corresponding protection technology should be adopted. If the archive management organization waits passively, some valuable records may be lost, or received records may be mislaid or out of date. Front-end control should focus on the overall planning of the entire record operation process. Supervision should be implemented during the record formation and maintenance phase. In other words, the value of archives should be identified during the record formation stage, with a focus on the entire record life cycle, extending the protection work forward and reflecting its foresight [22–24]. Intervening from the beginning of record formation and taking corresponding protection measures for valuable records can thus effectively prevent leakage or the destruction of records by other links. This will maximize work efficiency and realize comprehensive record management in a true sense.
The ideological root of front-end control was first developed by the French archivist C. Nogales, who stated that “Archivists need to rethink the timing of their interventions in the record life cycle, even rethink the life cycle itself” [25–27]. The Guidelines for the Management of Electronic Records (Draft) prepared by the Electronic Records Committee of the International Archives Council also dedicates significant space to the importance of rethinking the electronic record life cycle and the appropriate time to intervene in this life cycle. Eventually, this work determines that the “time to intervene” is at the design stage of the electronic record management system; it further puts many “post control” means in the original paper record management system at the front end, and advocates “taking action before record formation” [28–30].
With the rapid development of the information age, the number of electronic records is increasing day by day, exhibiting an exponential growth trend. Information waste is also increasing, which is generating more interest in the use of front-end control to avoid generating electronic records without practical significance [31–33].
The quality of electronic records is variable. In the era of electronic records, due to the influence of traditional habits, along with the convenience and operability of sending records, the number of resulting records is much higher than in the traditional environment, and their quality is also uneven [34–36]. Therefore, to ensure the record's certificate, it is necessary to control the front-end.
The security of electronic records is expected to be guaranteed. Because of their unique characteristics, matters of their security are more serious than those pertaining to paper records [37–39]. It is thus urgent to strengthen the front-end control of electronic records. Electronic records exhibit a separation between information and carrier, as well as dependence on the system. Following technical innovation or improper operation, the recorded information content may be easily lost or become a “dead record”; resolving this situation also requires proper front-end control of electronic records.
The current situation in the field of electronic records management is worrying. At present, electronic record management typically adopts the “double set system” management method and multi-carrier backup. This not only demonstrates that the legal effect of electronic records has not yet been finally confirmed, but also reflects people's distrust of the security of electronic records management systems. The current situation of electronic records management and the popularization of electronic records management systems therefore needs to be addressed [40–42]. Therefore, to ensure that electronic records can be safely saved, uploaded and released, it is also necessary to control the front-end.
As electronic records are processed by means of computers and network technology, it is easy to add, delete and modify electronic records without leaving any trace. This causes a loss of originality and authenticity for electronic records. The authenticity of electronic record content is linked with the premise of its original record formation and the role of investigation [43–45]. The original voucher checking function is also an underlying principle of electronic records: without this function, there could be no electronic records. In addition, the content of electronic records can be read by any terminal device on the network, which puts the electronic record itself and its verification and security at risk.
In order to ensure the authenticity of electronic records, we can use “front-end control” technology. That is to say, in the formation stage of electronic records, the value of archives should be identified, with filing marks added as needed to prevent records from being modified or deleted. This approach fundamentally breaks the traditional management mode and the boundary between records and archives, enabling archives departments to intervene in the life cycle of records in advance [46–48]. Adopting this approach can thus effectively prevent leakage or the destruction of electronic records by other links, thereby maximizing work efficiency and enabling truly comprehensive record management to be realized. Front-end control is therefore an important method for ensuring the authenticity and originality of archived records.
4 Front-end Control Mechanism of Electronic Records Based on Proxy Re-encryption
After an electronic record is generated, it is encrypted by the record producer. When the electronic record is transferred from the producer to the archivist, the archivist re-encrypts it. In this way, the front-end management of electronic records can be realized.
4.1.1 Definition 4.1: Bilinear Pairings
G1 is a cyclic group of prime order p, while g is any generator element in G1; G2 is a multiplicative cyclic group of the same order as G1. The bilinear pairing
Bilinear: For any
● Non-degradation: For any
● Computability: For any
4.1.2 Definition 4.2: Hypothesis 3-QDBDH
Here,
4.1.3 Definition 4.3: Hypothesis Truncated q-ABDHE
Here,
4.2 Re-encryption Scheme for Electronic Records
The scheme is defined as follows:
●
●
●
●
●
I) Select a strongly unforgivable signature, set the key pair as
II) Select
III) Generate a signature
IV) Select
V) Generate another one-time signature:
VI) Conditional cipher text original cipher text:
●
●
●
Correctness: Properly generated original re-encryption cipher text can be correctly decrypted. As shown below, re-encryption cipher text encrypted by a proxy without the correct encryption key or conditional key cannot be decrypted by the entrusting party. Given the original conditional cipher text
Case 1 (incorrect conditional key): Assume that the proxy has a partial re-encryption key
Order
Because
Even if it passes the validation test, it is still evident that
Case 2 (incorrect re-encryption key): Assume that the proxy has a partial re-encryption key
Theorem 1: Assuming that the 3-QDBDH problem and q-ABDHE problem are difficult to solve, the above scheme for the re-encryption of electronic records is secure under the standard model.
Lemma 1: If an IND-CCA attacker exists that can attack the scheme in this paper, there is an algorithm 'B' that can solve the 3-QDBDH problem. To prove lemma 1, we first prove an assertion.
Assertion 1: The difficulty assumption of 3-QDBDH is equivalent to whether a given
Proof: Given
Proof of Lemma 1: If there is a PPT attacker that can attack the scheme proposed in this paper, a simulator B exists that can solve the 3-QDBDH problem. The simulation proceeds as follows.
First, the challenger sets the groups G1 and G2, the bilinear pair e, and generator g of group G1. The simulator enters an instance of a q-ABDHE problem
In phase 1, A has no information on the event
(a) System setup: λ is the security parameter,
(b) Query phase 1: The attacker A makes the following queries.
- Uncorrupted-key-generation query
- Corrupt-key-generation query
- Partial-re-encryption-key query
- If
- If
- If
- If
- Conditional key query
- Re-encryption key query
If the equation is not true, then B returns
- If
- If
i) If
ii) Another possible situation is the following:
and knows
- Decryption query
First, if
• For
Therefore,
It is thus easy to calculate the plaintext m.
- If
and
B first obtains
As relationship
It is thus easy to calculate the plaintext
In phase 2, B must check that m is different from the challenge message to m0, m1. According to the security model’s restriction rules, if
(c) Challenge: Once A decides that the query 1 phase is over, it outputs the challenge condition
(d) Query phase 2: A executes the same query as in phase 1.
(e) Guess: The attacker outputs his guess b'. If b=b', it outputs 1,
Probabilistic Analysis: Suppose there is a PPT attacker A in game 1 capable of attacking the scheme proposed in this paper with a non-negligible advantage ε under the standard model. The probability of the simulator is now given, supposing
Because
Lemma 2: Assuming that an IND-CCA can attack KP-CPRE, an algorithm B exists that can solve the q-ABDHE problem for all
Proof: Supposing there is a polynomial time attacker A in the game that can attack the KP-CPRE scheme in the standard model. Let qk be the total number of trap door queries, setting up a simulator A that can solve the q-ABDHE problem for all
This is simulated as follows.
First, the challenger sets up the group G1,G2, the effective bilinear pair e, and the generator g of group G1. The simulator enters an instance of the q-ABDHE problem
purpose of the simulator B is to distinguish
A. System setup: λ is a security parameter, while
B. Query phase 1: The attacker A makes the following queries.
- Non-corrupted-key-generation query
- Corrupted-key-generation query
- Partial-re-encryption-key query
- Conditional key query
For user
- Re-encryption query: Because, for all users i and j, B can calculate a one-way re-encryption key
- Decryption query
- Decryption query
C. Challenge: Once A has decided to end query 1 and output the challenge condition to (w0, w1) and two plaintexts (m0, m1) of the same length, Challenge B randomly chooses
Calculate
D. Query phase 2: A runs the same query as in phase 1.
E. Guess: The attacker outputs his guess b'. If b=b', output 1,
Probability analysis: If
The present paper investigates and applies proxy re-encryption. In our approach, before the electronic record is generated, its producer interacts with the record manager. When an electronic record is generated, the record producer encrypts it. When the electronic record needs to be verified, it is decrypted to verify authenticity. When the producer hands the electronic record over to the record manager, the record manager re-encrypts it. When verifying, our approach can use the record manager's secret key to decrypt again so that the authenticity of the electronic record is guaranteed.
Funding Statement:Y. J. Ren gratefully acknowledges the financial support of the NSFC (61772280, 62072249), http://www.nsfc.gov.cn.
Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study. Xiujuan Feng and Yongjun Ren are the co-corresponding authors.
1. Y. Bi and H. Xie, “Web archiving and preservation from the archival science perspective,” Archives Science Study, vol. 26, no. 4, pp. 74–78, 2015. [Google Scholar]
2. Y. J. Ren, Y. Leng, F. J. Zhu, J. Wang and H.J. Kim, “Data storage mechanism based on blockchain with privacy protection in wireless body area network,” Sensors, vol. 19, no. 10, pp. 2395.1–2395. 16, 2019. [Google Scholar]
3. Y. N. Liu and J. Y. Li, “Conceptual comparison and linkage between electronic data in law field and electronic records in archival field,” Archives Science Study, vol. 28, no. 4, pp. 92–99, 2017. [Google Scholar]
4. Y. J. Ren, J. Shen, D. Z. Liu, J. Wang and J. Kim, “Evidential quality preserving of electronic record in cloud storage,” Journal of Internet Technology, vol. 17, no. 6, pp. 1125–1132, 2016. [Google Scholar]
5. Y. Fu, S. Wen, L. Ma and J. Shu, “Survey on single disk failure recovery methods for erasure coded storage systems,” Journal of Computer Research and Development, vol. 55, no. 1, pp. 1–13, 2018. [Google Scholar]
6. J. Wang, Y. Gao, W. Liu, W. Wu and S. Lim, “An asynchronous clustering and mobile data gathering schema based on timer mechanism in wireless sensor networks,” Computers, Materials & Continua, vol. 58, no. 3, pp. 711–725, 2019. [Google Scholar]
7. Y. Huang, “Research on the connotation and management of trusted electronic records,” Zhejiang Archives, vol. 31, no. 5, pp. 12–15, 2014. [Google Scholar]
8. S. Zhang, Y. Chang, L. Yan, Z. Sheng, F. Yang et al., “Yang etal, Quantum communication networks and trust management: a survey,” Computers, Materials & Continua, vol. 61, no. 3, pp. 1145–1174, 2019. [Google Scholar]
9. K. Gu, Y. Wang and S. Wen, “Traceable threshold proxy signature,” Journal of Information Science and Engineering, vol. 33, no. 1, pp. 63–79, 2017. [Google Scholar]
10. C. Ge, Z. Liu, J. Xia and L. Fang, “Revocable identity-based broadcast proxy re-encryption for data sharing in clouds,” IEEE Trans. on Dependable and Secure Computing, vol. 19, no. 6, pp. 1–1, 2019. [Google Scholar]
11. Y. Chen, J. Wang, R. Xia, Q. Zhang, Z. Cao et al., “The visual object tracking algorithm research based on adaptive combination kernel,” Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 12, pp. 4855–4867, 2019, 2019. [Google Scholar]
12. Y. J. Ren, F. J. Zhu, J. Qi, J. Wang and A. K. Sangaiah, “Identity management and access control based on blockchain under edge computing for the Industrial Internet of Things,” Applied Sciences, vol. 19, no. 9, pp. 2058.1–2058, 2019. [Google Scholar]
13. Q. Xiao and L. Wu, “Research on digital continuity plan of Australian National Archives,” Journal of Information Resources Management, vol. 5, no. 4, pp. 19–23, 2015. [Google Scholar]
14. Y. J. Ren, Y. Leng, J. Qi, K. S. Pradip, J. Wang et al., “Multiple cloud storage mechanism based on blockchain in smart homes,” Future Generation Computer Systems, vol. 115, no. 2, pp. 304–313, 2021. [Google Scholar]
15. J. Zhang, X. Jin, J. Sun, J. Wang and A. K. Sangaiah, “Spatial and semantic convolutional features for robust visual object tracking,” Multimedia Tools and Applications, vol. 79, no. 21-22, pp. 15095–15115, 2020. [Google Scholar]
16. N. Zhang, C. Wang, Z. Liu and W. Wang, “Study on the evaluation strategy of electronic document authenticity based on digital continuity thought,” Archives Research, vol. 6, pp. 69–72, 2015. [Google Scholar]
17. L. Fang, C. Yin, L. Zhou, Y. Li, C. Su et al., “A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine,” Information Sciences, vol. 507, no. 1, pp. 143–160, 2020. [Google Scholar]
18. W. Li, H. Liu, J. Wang, L. Xiang and Y. Yang, “An improved linear kernel for complementary maximal strip recovery: simpler and smaller,” Theoretical Computer Science, vol. 786, no. 1, pp. 55–66, 2019. [Google Scholar]
19. L. Johnston, “ERA 2.0: the national archives new framework for electronic records preservation,” in Proc. of the Association for Information Science and Technology, New York, NY, USA, pp. 197–202, 2017. [Google Scholar]
20. Y. J. Ren, F. J. Zhu, S. P. Kumar, T. Wang, J. Wang et al., “Data query mechanism based on hash computing power of blockchain in Internet of Things,” Sensors, vol. 20, no. 7, pp. 2071–207. 22, 2020. [Google Scholar]
21. K. Gu, L. Yang and B. Yin, “Location data record privacy protection based on differential privacy mechanism,” Information Technology and Control, vol. 47, no. 4, pp. 639–654, 2018. [Google Scholar]
22. Y. Qian, “Millennial-scale phase relationship between North Atlantic deep-level temperature and Qinghai-Tibet Plateau temperature and its evolution since the Last Interglaciation,” Chinese Science Bulletin, vol. 59, no. 3, pp. 75–81, 2014, 2014. [Google Scholar]
23. Y. Mao, J. Zhang, H. Qi and L. Wang, “DNN-MVL: DNN-multi-view-learning-based recover block missing data in a dam safety monitoring system,” Sensors, vol. 19, no. 13, pp. 2895.1–2895.19, 2019. [Google Scholar]
24. Y. Lu and T. Feng, “Research on trusted DNP3-BAE protocol based on hash chain,” EURASIP Journal on Wireless Communications and Networking, vol. 2018, no. 5, pp. 108.1–108.10, 2018, 2018. [Google Scholar]
25. Z. Yi, “Research on the formation process of electronic records based on the thought of front-end control,” Archives Science Study, vol. 23, no. 3, pp. 16–23, 2012. [Google Scholar]
26. Y. J. Ren, J. Qi, Y. P. Cheng, J. Wang and O. Alfarraj, “Digital continuity guarantee approach of electronic record based on data quality theory,” Computers, Materials & Continua, vol. 63, no. 3, pp. 1471–1483, 2020. [Google Scholar]
27. J. Wang, X. Gu, W. Liu, A. K. Sangaiah and H. Kim, “An empower Hamilton loop based data collection algorithm with mobile agent for WSNs,” Human-Centric Computing and Information Sciences, vol. 18, no. 9, pp. 1794–1808, 2019. [Google Scholar]
28. F. Upword, B. Reed, G. Oliver and J. Evans, “Record keeping informatics: Re-figuring a discipline in crisis with a single-minded approach,” Records Management Journal, vol. 23, no. 1, pp. 47–54, 2013. [Google Scholar]
29. J. M. Zhang, W. Wang, Ch Q. Lu, J. Wang and A. K. Sangaiah, “Lightweight deep network for traffic sign classification,” Annals of Telecommunications, vol. 75, no. 7-8, pp. 369–379, 2020. [Google Scholar]
30. Y. J. Ren, Y. Leng, Y. P. Cheng and J. Wang, “Secure data storage based on blockchain and coding in edge computing,” Mathematical Biosciences and Engineering, vol. 16, no. 4, pp. 1874–1892, 2019. [Google Scholar]
31. Y. Chen, H. Hou, H. Su and Q. Yang, “Records management in e-government system: issues and reflections,” Archives Science Study, vol. 26, no. 2, pp. 28–37, 2015. [Google Scholar]
32. W. Zhang, F. Y. Shih, S. Hu and M. Jian, “A visual secret sharing scheme based on improved local binary pattern,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 32, no. 6, pp. 185–195, 2018. [Google Scholar]
33. Y. J. Ren, Y. P. Liu, S. Ji, K. Arun and J. Wang, “Incentive mechanism of data storage based on blockchain for wireless sensor networks,” Mobile Information Systems, vol. 2018, no. 8, pp. 1–10, 2018. [Google Scholar]
34. S. B. Dewdney and L. Jason, “Electronic records, registries, and the development of ‘big data’: crowd-sourcing quality toward knowledge,” Frontiers in Oncology, vol. 268, no. 1, pp. 20–27, 2017. [Google Scholar]
35. W. Wan, J. Chen and S. Zhang, “A cluster correlation power analysis against double blinding exponentiation,” Journal of Information Security and Applications, vol. 48, no. 10, pp. 102357, 2019. [Google Scholar]
36. D. Zeng, Y. Dai, J. Wang, F. Li and A. K. Sangaiah, “Aspect based sentiment analysis by a linguistically regularized CNN with gated mechanism,” Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 3971–3980, 2019. [Google Scholar]
37. X. Jia, “Analysis and implications of the New Zealand digital continuity action plan,” Library and Information Work, vol. 2016, no. 1, pp. 45–51, 2016, 2016. [Google Scholar]
38. L. Xie, J. Wang and L. Ma, “Trusting records: findings of team asia InterPARES,” Archives Science Study, vol. 28, no. S1, pp. 8–13, 2017. [Google Scholar]
39. T. Li, Y. Ren and J. Xia, “Blockchain queuing model with non-preemptive limited-priority,” Intelligent Automation & Soft Computing, vol. 26, no. 5, pp. 1111–1122, 2020. [Google Scholar]
40. L. Xie, J. Wang and L. Ma, “The project of InterPARES: Where it has been and where it is going,” Archives Science Study, vol. 28, no. S1, pp. 14–20, 2017. [Google Scholar]
41. Y. T. Chen, J. J. Tao, L. W. Liu, J. Xiong, R. L. Xia et al., “Research of improving semantic image segmentation based on a feature fusion model,” Journal of Ambient Intelligence and Humanized Computing, vol. 20, no. 5, pp. 1–13, 2020. [Google Scholar]
42. J. Wang, Y. Gao, W. Liu, A. K. Sangaiah and H. Kim, “An intelligent data gathering schema with data fusion supported for mobile sink in WSNs,” Int. Journal of Distributed Sensor Networks, vol. 2019, no. 3, pp. 1550–1561, 2019, 2019. [Google Scholar]
43. L. Chao and H. Qu, “Electronic records management systems: from digital continuity to data continuity,” Archives Science Bulletin, vol. 64, no. 1, pp. 20–25, 2019. [Google Scholar]
44. C. P. Ge, W. Susilo, Z. Liu, J. Y. Xia, P. Szalachowski et al., “Secure keyword search and data sharing mechanism for cloud computing,” IEEE Trans. on Dependable and Secure Computing, vol. 20, no. 3, pp. 1–1, 2020. [Google Scholar]
45. Y. Ren, J. Qi, Y. Liu, J. Wang and G. Kim, “Integrity verification mechanism of sensor data based on bilinear map accumulator,” ACM Trans. on Internet Technology, vol. 21, no. 1, pp. 1–19, 2021. [Google Scholar]
46. J. Seymour, “The modern records management program: An overview of electronic records management standards,” Bulletin of the Association for Information Science and Technology, vol. 43, no. 2, pp. 35–39, 2017. [Google Scholar]
47. J. Wang, C. W. Ju, Y. Gao, A. K. Sangaiah and G.-J. Kim, “A PSO based energy efficient coverage control algorithm for wireless sensor networks,” Computers Materials & Continua, vol. 56, no. 3, pp. 433–466, 2018. [Google Scholar]
48. A. A. Aziz, Z. M. Yusof, U. A. Mokhtar and D. I. Jambari, “Establishing policy for the implementation of electronic document and records management system in public sector in Malaysia: the influencing factors,” Advanced Science Letters, vol. 23, no. 11, pp. 10732–10736, 2017. [Google Scholar]
This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |