Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Trustworthy 100-year digital objects: Evidence after every witness is dead

Published: 01 July 2004 Publication History

Abstract

In ancient times, wax seals impressed with signet rings were affixed to documents as evidence of their authenticity. A digital counterpart is a message authentication code fixed firmly to each important document. If a digital object is sealed together with its own audit trail, each user can examine this evidence to decide whether to trust the content---no matter how distant this user is in time, space, and social affiliation from the document's source.We propose an architecture and design that accomplish this: encapsulation of digital object content with metadata describing its origins, cryptographic sealing, webs of trust for public keys rooted in a forest of respected institutions, and a certain way of managing information identifiers. These means will satisfy emerging needs in civilian and military record management, including medical patient records, regulatory records for aircraft and pharmaceuticals, business records for financial audit, legislative and legal briefs, and scholarly works.This is true for any kind of digital object, independent of its purposes and of most data type and representation details, and provides every kind of user---information authors and editors, librarians and collection managers, and information consumers---with autonomy for implied tasks. Our prototype will conform to applicable standards, will be interoperable over most computing bases, and will be compatible with existing digital library software.The proposed architecture integrates software that is mostly available and widely accepted.

References

[1]
Arms, W. Y. 1995. Key Concepts in the Architecture of the Digital Library. D-Lib Magazine (July).]]
[2]
Beagrie, N., Bellinger, M., Dale, R., Doerr, M., Hedstrom, M., Jones, M., Kenney, A., Lupovici, C., Russell, K., Webb, C., and Woodyard, D. 2002. Trusted Digital Repositories: Attributes and Responsibilities, RLG-OCLC Report, http://www.rlg.org/longterm/repositories.pdf.]]
[3]
Bearman, D. and Sochats, K. 1996. Metadata Requirements for Evidence. http://www.archimuse.com/papers/nhprc/BACartic.html. http://www.archimuse.com/papers/nhprc/meta96.html.]]
[4]
Bearman, D. and Trant, J. 1998. Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process. D-Lib Magazine (June).]]
[5]
Beit-Arie, O., Blake, M., Caplan, P., Flecker, D., Ingoldsby, T., Lannom, L. W., Mischo, W. H., Pentz, E., Rogers, S., and Van de Sompel, H. 2001. Linking to the Appropriate Copy: Report of a DOI-Based Prototype. D-Lib Magazine 7, 9.]]
[6]
Berners-Lee, T., Fielding, R., and Masinter, L. 1998. Uniform Resource Identifiers (URI): Generic Syntax. IETF RFC 2396.]]
[7]
Caronni, G. 2000. Walking the WWW of trust. In Proceedings of the 9th Workshop on Enabling Technologies. IEEE Computer Society Press.]]
[8]
CCSDS 650.0-R-2. 2001. Reference Model for an Open Archival Information System (OAIS). http://www.ccsds.org/RP9905/RP9905.html.]]
[9]
Cooper, B., Crespo, A., and Garcia-Molina, H. 2000. Implementing a reliable digital object archive, and modeling archival repositories. In Proceedings of the 4th European Conference on Digital Libraries.]]
[10]
Conway, P. 1996. Preservation in the Digital World. CLIR Report pub92.]]
[11]
CNRI (Corporation for National Research Initiatives). 2001. Handle System: A general-purpose global name service enabling secure name resolution over the internet. http://www.handle.net/.]]
[12]
CLIR (Council on Library and Information Resources and the Library of Congress). 2002. The State of Digital Preservation: An International Perspective. pub107.]]
[13]
Cullen, C. T. 2000. Authentication of digital objects: Lessons from a Historian's Research. In Authenticity in a Digital Environment. CLIR Report pub92.]]
[14]
FDA 21 CFR Part 11. 1997. Electronic Records: Electronic Signatures. Federal Register 62, 54, 13430, http://www.21cfr11.com/files/library/government/21cfrpart11_final_rule.pdf.]]
[15]
Doyle, M. 1997. Citing and Linking in Electronic Scholarly Publishing: A Pragmatic Approach. http://ridge.aps.org/DOYLE/sweden/talk/sweden.html.]]
[16]
Duranti, L. 1998. Diplomatics: New Uses for An Old Science. Scarecrow Press, Lanham, Md.]]
[17]
Eastlake, D. E. and Niles, K. 2002. Secure XML: The New Syntax for Signatures and Encryption. Addison Wesley.]]
[18]
Ebersole, J. L. 1994. Protecting Intellectual Property Rights on the Information Superhighways, Information Industry Association report.]]
[19]
Ellison, C. and Schneier, B. 2000. Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure. Comp. Sec. J. 16, 1, 1--7.]]
[20]
Feghhi, J. and Williams, P. 1998. Digital Certificates: Applied Internet Security. Addison-Wesley, Reading, MA.]]
[21]
Garrett, J. and WAters, D., eds. 1995. Preserving Digital Information: Report of the Task Force on Archiving of Digital Information, commissioned by The Commission on Preservation and Access and The Research Libraries Group.]]
[22]
Gerck, E. 2000. Overview of Certification Systems: X.509, PKIX, CA, PGP, SKIP, http://www.mcg.org.br/certover.pdf.]]
[23]
Gladney, H. M. 1993. A Storage Subsystem for Image and Records Management. IBM Syst. J. 32, 3, 512--540.]]
[24]
Gladney, H. M. 1998. Safeguarding Digital Library Contents and Users: A Note on Universal Unique Identifiers. D-Lib Magazine (April).]]
[25]
Gladney, H. M. and Cantu, A., Jr. 2001. Authorization Management for Digital Libraries. Comm. ACM 44, 5, 63--65.]]
[26]
Gladney, H. M. and Bennett, J. L. 2003a. What do We Mean by Authentic? What's the Real McCoy?. D-Lib Magazine 9, 7/8 (July).]]
[27]
Gladney, H. M. and Lorie, R. 2003b. Trustworthy 100-Year Digital Objects: Durable Encoding for When it's too Late to Ask, preprint available on request.]]
[28]
Gladney, H. M. 2003c. Trustworthy 100-Year Digital Objects: Syntax and Semantics---Tension between Facts and Values, preprint available on request (December).]]
[29]
Grandison, T. and Sloman, M. 2000. A Survey of Trust in Internet Applications. IEEE Comm. Surveys & Tutorials (4th Quarter).]]
[30]
Green, B. and Bide, M. 1997. Unique Identifiers: a brief introduction. http://www.bic.org.uk/uniquid.]]
[31]
Herzberg, A. 2002. Securing XML: Ensuring confidentiality, authentication, authorization, and more. Dr. Dobb's Journal (March), 56--62.]]
[32]
Hill, K. 1999. A Perspective. The Role of Identifiers in Managing and Protecting Intellectual Property in the Digital Age. Proc. IEEE 87, 7, 12--28.]]
[33]
Hunter, J. 2001. MetaNet---A Metadata Term Thesaurus to Enable Semantic Interoperability Between Metadata Domains. J. Dig. Info. 1, 8.]]
[34]
IBM, DB2 Data Links Manager v.8.1, 2003.http://www-3.ibm.com/software/data/db2/datalinks/.]]
[35]
Illing, R. 1980. The Art of Japanese Prints. Calmann & Cooper, London, p. 170.]]
[36]
Kahn, R. and Wilensky, R. 1995. A Framework for Distributed Digital Object Services (May 1995). http://www.cnri.reston.va.us/cstr/arch/k-w.html.]]
[37]
Lee, K.-H., Slattery, O., Lu, R., Tang, X., and McCrary, V. 2002. The state of the Art and Practice in Digital Preservation. J. Res. Natl. Inst. Stand. Technol. 107, 93--106.]]
[38]
Lampson, B., Abadi, M., Burrows, M., and Wobber, E. 1992. Authentication in Distributed Systems: Theory and Practice. ACM Trans. Computer Sys. 10, 4, 265--310.]]
[39]
LC (Library of Congress). 2003. Preserving Our Digital Heritage: Plan for the National Digital Information Infrastructure and Preservation Program. http://www.digitalpreservation.gov/repor/ndiipp_plan.pdf.]]
[40]
Lupovici, C. and Masanès, J. 2000. Metadata for the Long Term Preservation of Electronic Publications. NedLib Report Series 2.]]
[41]
Lynch, C. 1997. Identifiers and Their Role in Networked Information Applications. ARL: A Bimonthly Newsletter of Research Library Issues and Actions 194.]]
[42]
Lynch, C. 2000. Authenticity and Integrity in the Digital Environment: An Exploratory Analysis of the Central Role of Trust, in Authenticity in the Digital Environment. CLIR Report pub92; ISBN 1-887334-77-7.]]
[43]
MacNeil, H. 2000. Providing Grounds for Trust: Developing Conceptual Requirements for the Long-Term Preservation of Authentic Electronic Records. Archivaria 50 (Autumn), 53--76.]]
[44]
Marcum, D. B. 2003. Research Questions for the Digital Era Library. Library Trends 51, 4, 636--651.]]
[45]
Menezes, A. J., van Oorschot, P. C., and Vanstone, S. A. 1997. Handbook of Applied Cryptography. CRC Press, New York.]]
[46]
METS (Metadata Encoding and Transmission Standard). 2002. http://www.loc.gov/standards/mets/.]]
[47]
Miller, E., Swick, R., and Brickley, D. 2001. Resource Description Framework (RDF), http://www.w3.org/RDF/.]]
[48]
Moore, R., Baru, C., Rajasekar, A., Ludaescher, B., Marciano, R., Wan, M., Schroeder, W., and Gupta, A. 2000. Collection-Based Persistent Digital Archives---Part 1. D-Lib Magazine 6, 3. Part 2 D-lib Magzine 6, 4.]]
[49]
NRC (National Research Council). 2000. LC21: A Digital Strategy for the Library of Congress. National Academy Press (Especially Ch., Preserving a Digital Heritage.)]]
[50]
Nelson, M., Maly, K., Zubair, M., and Shen, S. N. T. 1999. SODA: Smart Objects, Dumb Archives. ECDL99, Lecture Notes in Computer Science. Springer Verlag.]]
[51]
NLNZ (National Library of New Zealand). 2002. Metadata Standards Framework---Preservation Metadata, http://www.natlib.govt.nz/files/4initiatives_metaschema.pdf.]]
[52]
Okerson, A., Bennett, S., Conway, P., Gewirtz, D., Martz, F., Parker, K., and Szary, R. 2002. YEA: The Yale Electronic Archive, One Year of Progress: Report on the Digital Preservation Planning Project, http://www.library.yale.edu/∼okerson/yea/.]]
[53]
Paskin, N. 2003. The DOI Handbook Version 3.1, http://www.doi.org/hb.html.]]
[54]
Payette, S. and Lagoze, C. 2000. Policy-Carrying, Policy-Enforcing Digital Objects. 4th European Conference on Research and Advanced Technology for Digital Libraries. Portugal, Springer Verlag.]]
[55]
Reich, V. and Rosenthal, D. S. H. 2001. LOCKSS: A Permanent WWW Publishing and Access System. D-Lib Magazine 7, 6.]]
[56]
Rust, G. and Bide, M. 2000. The metadata framework: Principles, model and data dictionary, http://www.indecs.org/pdf/framework.pdf.]]
[57]
Sandhu, R. S. 1998. Role-based Access Control. Advances in Computers 46, 237--286.]]
[58]
Schneier, B. 1996. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, New York, NY,]]
[59]
Smith, M. Barton, M., Boss, M., Branschofsky, M., McClellan, G., Stuve, D., Transley, R., and Walker, J. H. 2003. DSpace: An Open Source Dynamic Digital Repository. D-Lib Magazine 9, 1.]]
[60]
SMPTE. 2000. Recommended Best Practice, Application of Unique Material Identifiers in Production and Broadcast Environments at www.smpte.org, RP 205.]]
[61]
Sollins, K. and Masinter, L. 1994. Functional Requirements for Uniform Resource Names. IETF RFC 1737.]]
[62]
Thorsteinson, P. and Ganesh, G. 2003. NET Security and Cryptography. Prentice Hall, ISBN: 0-131-00851-X.]]
[63]
Walsh, N. 2001. A URN Namespace for Public Identifiers. IETF RFC 3151.]]

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Information Systems
ACM Transactions on Information Systems  Volume 22, Issue 3
July 2004
145 pages
ISSN:1046-8188
EISSN:1558-2868
DOI:10.1145/1010614
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 2004
Published in TOIS Volume 22, Issue 3

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2013)Investigating the Needs, Capabilities and Decision Making Mechanisms in Digital PreservationInformation Resources Management Journal10.4018/irmj.201307010226:3(17-39)Online publication date: 1-Jul-2013
  • (2013)Data sharing in the sciencesAnnual Review of Information Science and Technology10.1002/aris.2011.144045011345:1(247-294)Online publication date: 2-Jan-2013
  • (2011)Data sharing in the sciencesAnnual Review of Information Science and Technology10.5555/2766865.276687845:1(247-294)Online publication date: 1-Jan-2011
  • (2011)Examining success factors in the adoption of digital object identifier systemsElectronic Commerce Research and Applications10.5555/2069777.207013810:6(626-636)Online publication date: 1-Nov-2011
  • (2011)L.O.S.T RecordsProceedings of the 2011 conference on Databases and Information Systems VI: Selected Papers from the Ninth International Baltic Conference, DB&IS 201010.5555/1940590.1940616(271-282)Online publication date: 13-Aug-2011
  • (2011)A Framework for the Assessment of the Trustworthiness of Digital Records over TimeProceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2011.96(738-744)Online publication date: 16-Nov-2011
  • (2011)Examining success factors in the adoption of digital object identifier systemsElectronic Commerce Research and Applications10.1016/j.elerap.2011.05.00410:6(626-636)Online publication date: Nov-2011
  • (2011)On the long-term retention of geometry-centric digital engineering artifactsComputer-Aided Design10.1016/j.cad.2010.11.01243:7(820-837)Online publication date: 1-Jul-2011
  • (2011)Assessment of the Trustworthiness of Digital RecordsTrust Management V10.1007/978-3-642-22200-9_24(300-311)Online publication date: 2011
  • (2009)A framework for preservable geometry-centric artifacts2009 SIAM/ACM Joint Conference on Geometric and Physical Modeling10.1145/1629255.1629265(67-78)Online publication date: 5-Oct-2009
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media