article

Trustworthy 100-year digital objects: Evidence after every witness is dead

Online:01 July 2004Publication History

Abstract

In ancient times, wax seals impressed with signet rings were affixed to documents as evidence of their authenticity. A digital counterpart is a message authentication code fixed firmly to each important document. If a digital object is sealed together with its own audit trail, each user can examine this evidence to decide whether to trust the content---no matter how distant this user is in time, space, and social affiliation from the document's source.We propose an architecture and design that accomplish this: encapsulation of digital object content with metadata describing its origins, cryptographic sealing, webs of trust for public keys rooted in a forest of respected institutions, and a certain way of managing information identifiers. These means will satisfy emerging needs in civilian and military record management, including medical patient records, regulatory records for aircraft and pharmaceuticals, business records for financial audit, legislative and legal briefs, and scholarly works.This is true for any kind of digital object, independent of its purposes and of most data type and representation details, and provides every kind of user---information authors and editors, librarians and collection managers, and information consumers---with autonomy for implied tasks. Our prototype will conform to applicable standards, will be interoperable over most computing bases, and will be compatible with existing digital library software.The proposed architecture integrates software that is mostly available and widely accepted.

References

  1. Arms, W. Y. 1995. Key Concepts in the Architecture of the Digital Library. D-Lib Magazine (July).]]Google ScholarGoogle Scholar
  2. Beagrie, N., Bellinger, M., Dale, R., Doerr, M., Hedstrom, M., Jones, M., Kenney, A., Lupovici, C., Russell, K., Webb, C., and Woodyard, D. 2002. Trusted Digital Repositories: Attributes and Responsibilities, RLG-OCLC Report, http://www.rlg.org/longterm/repositories.pdf.]]Google ScholarGoogle Scholar
  3. Bearman, D. and Sochats, K. 1996. Metadata Requirements for Evidence. http://www.archimuse.com/papers/nhprc/BACartic.html. http://www.archimuse.com/papers/nhprc/meta96.html.]]Google ScholarGoogle Scholar
  4. Bearman, D. and Trant, J. 1998. Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process. D-Lib Magazine (June).]]Google ScholarGoogle Scholar
  5. Beit-Arie, O., Blake, M., Caplan, P., Flecker, D., Ingoldsby, T., Lannom, L. W., Mischo, W. H., Pentz, E., Rogers, S., and Van de Sompel, H. 2001. Linking to the Appropriate Copy: Report of a DOI-Based Prototype. D-Lib Magazine 7, 9.]]Google ScholarGoogle Scholar
  6. Berners-Lee, T., Fielding, R., and Masinter, L. 1998. Uniform Resource Identifiers (URI): Generic Syntax. IETF RFC 2396.]] Google ScholarGoogle Scholar
  7. Caronni, G. 2000. Walking the WWW of trust. In Proceedings of the 9th Workshop on Enabling Technologies. IEEE Computer Society Press.]] Google ScholarGoogle Scholar
  8. CCSDS 650.0-R-2. 2001. Reference Model for an Open Archival Information System (OAIS). http://www.ccsds.org/RP9905/RP9905.html.]]Google ScholarGoogle Scholar
  9. Cooper, B., Crespo, A., and Garcia-Molina, H. 2000. Implementing a reliable digital object archive, and modeling archival repositories. In Proceedings of the 4th European Conference on Digital Libraries.]] Google ScholarGoogle Scholar
  10. Conway, P. 1996. Preservation in the Digital World. CLIR Report pub92.]] Google ScholarGoogle Scholar
  11. CNRI (Corporation for National Research Initiatives). 2001. Handle System: A general-purpose global name service enabling secure name resolution over the internet. http://www.handle.net/.]]Google ScholarGoogle Scholar
  12. CLIR (Council on Library and Information Resources and the Library of Congress). 2002. The State of Digital Preservation: An International Perspective. pub107.]]Google ScholarGoogle Scholar
  13. Cullen, C. T. 2000. Authentication of digital objects: Lessons from a Historian's Research. In Authenticity in a Digital Environment. CLIR Report pub92.]]Google ScholarGoogle Scholar
  14. FDA 21 CFR Part 11. 1997. Electronic Records: Electronic Signatures. Federal Register 62, 54, 13430, http://www.21cfr11.com/files/library/government/21cfrpart11_final_rule.pdf.]]Google ScholarGoogle Scholar
  15. Doyle, M. 1997. Citing and Linking in Electronic Scholarly Publishing: A Pragmatic Approach. http://ridge.aps.org/DOYLE/sweden/talk/sweden.html.]]Google ScholarGoogle Scholar
  16. Duranti, L. 1998. Diplomatics: New Uses for An Old Science. Scarecrow Press, Lanham, Md.]]Google ScholarGoogle Scholar
  17. Eastlake, D. E. and Niles, K. 2002. Secure XML: The New Syntax for Signatures and Encryption. Addison Wesley.]] Google ScholarGoogle Scholar
  18. Ebersole, J. L. 1994. Protecting Intellectual Property Rights on the Information Superhighways, Information Industry Association report.]]Google ScholarGoogle Scholar
  19. Ellison, C. and Schneier, B. 2000. Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure. Comp. Sec. J. 16, 1, 1--7.]]Google ScholarGoogle Scholar
  20. Feghhi, J. and Williams, P. 1998. Digital Certificates: Applied Internet Security. Addison-Wesley, Reading, MA.]] Google ScholarGoogle Scholar
  21. Garrett, J. and WAters, D., eds. 1995. Preserving Digital Information: Report of the Task Force on Archiving of Digital Information, commissioned by The Commission on Preservation and Access and The Research Libraries Group.]]Google ScholarGoogle Scholar
  22. Gerck, E. 2000. Overview of Certification Systems: X.509, PKIX, CA, PGP, SKIP, http://www.mcg.org.br/certover.pdf.]]Google ScholarGoogle Scholar
  23. Gladney, H. M. 1993. A Storage Subsystem for Image and Records Management. IBM Syst. J. 32, 3, 512--540.]] Google ScholarGoogle Scholar
  24. Gladney, H. M. 1998. Safeguarding Digital Library Contents and Users: A Note on Universal Unique Identifiers. D-Lib Magazine (April).]]Google ScholarGoogle Scholar
  25. Gladney, H. M. and Cantu, A., Jr. 2001. Authorization Management for Digital Libraries. Comm. ACM 44, 5, 63--65.]] Google ScholarGoogle Scholar
  26. Gladney, H. M. and Bennett, J. L. 2003a. What do We Mean by Authentic? What's the Real McCoy?. D-Lib Magazine 9, 7/8 (July).]]Google ScholarGoogle Scholar
  27. Gladney, H. M. and Lorie, R. 2003b. Trustworthy 100-Year Digital Objects: Durable Encoding for When it's too Late to Ask, preprint available on request.]]Google ScholarGoogle Scholar
  28. Gladney, H. M. 2003c. Trustworthy 100-Year Digital Objects: Syntax and Semantics---Tension between Facts and Values, preprint available on request (December).]]Google ScholarGoogle Scholar
  29. Grandison, T. and Sloman, M. 2000. A Survey of Trust in Internet Applications. IEEE Comm. Surveys & Tutorials (4th Quarter).]] Google ScholarGoogle Scholar
  30. Green, B. and Bide, M. 1997. Unique Identifiers: a brief introduction. http://www.bic.org.uk/uniquid.]]Google ScholarGoogle Scholar
  31. Herzberg, A. 2002. Securing XML: Ensuring confidentiality, authentication, authorization, and more. Dr. Dobb's Journal (March), 56--62.]] Google ScholarGoogle Scholar
  32. Hill, K. 1999. A Perspective. The Role of Identifiers in Managing and Protecting Intellectual Property in the Digital Age. Proc. IEEE 87, 7, 12--28.]]Google ScholarGoogle Scholar
  33. Hunter, J. 2001. MetaNet---A Metadata Term Thesaurus to Enable Semantic Interoperability Between Metadata Domains. J. Dig. Info. 1, 8.]]Google ScholarGoogle Scholar
  34. IBM, DB2 Data Links Manager v.8.1, 2003.http://www-3.ibm.com/software/data/db2/datalinks/.]]Google ScholarGoogle Scholar
  35. Illing, R. 1980. The Art of Japanese Prints. Calmann & Cooper, London, p. 170.]]Google ScholarGoogle Scholar
  36. Kahn, R. and Wilensky, R. 1995. A Framework for Distributed Digital Object Services (May 1995). http://www.cnri.reston.va.us/cstr/arch/k-w.html.]]Google ScholarGoogle Scholar
  37. Lee, K.-H., Slattery, O., Lu, R., Tang, X., and McCrary, V. 2002. The state of the Art and Practice in Digital Preservation. J. Res. Natl. Inst. Stand. Technol. 107, 93--106.]]Google ScholarGoogle Scholar
  38. Lampson, B., Abadi, M., Burrows, M., and Wobber, E. 1992. Authentication in Distributed Systems: Theory and Practice. ACM Trans. Computer Sys. 10, 4, 265--310.]] Google ScholarGoogle Scholar
  39. LC (Library of Congress). 2003. Preserving Our Digital Heritage: Plan for the National Digital Information Infrastructure and Preservation Program. http://www.digitalpreservation.gov/repor/ndiipp_plan.pdf.]]Google ScholarGoogle Scholar
  40. Lupovici, C. and Masanès, J. 2000. Metadata for the Long Term Preservation of Electronic Publications. NedLib Report Series 2.]]Google ScholarGoogle Scholar
  41. Lynch, C. 1997. Identifiers and Their Role in Networked Information Applications. ARL: A Bimonthly Newsletter of Research Library Issues and Actions 194.]]Google ScholarGoogle Scholar
  42. Lynch, C. 2000. Authenticity and Integrity in the Digital Environment: An Exploratory Analysis of the Central Role of Trust, in Authenticity in the Digital Environment. CLIR Report pub92; ISBN 1-887334-77-7.]]Google ScholarGoogle Scholar
  43. MacNeil, H. 2000. Providing Grounds for Trust: Developing Conceptual Requirements for the Long-Term Preservation of Authentic Electronic Records. Archivaria 50 (Autumn), 53--76.]]Google ScholarGoogle Scholar
  44. Marcum, D. B. 2003. Research Questions for the Digital Era Library. Library Trends 51, 4, 636--651.]]Google ScholarGoogle Scholar
  45. Menezes, A. J., van Oorschot, P. C., and Vanstone, S. A. 1997. Handbook of Applied Cryptography. CRC Press, New York.]] Google ScholarGoogle Scholar
  46. METS (Metadata Encoding and Transmission Standard). 2002. http://www.loc.gov/standards/mets/.]]Google ScholarGoogle Scholar
  47. Miller, E., Swick, R., and Brickley, D. 2001. Resource Description Framework (RDF), http://www.w3.org/RDF/.]]Google ScholarGoogle Scholar
  48. Moore, R., Baru, C., Rajasekar, A., Ludaescher, B., Marciano, R., Wan, M., Schroeder, W., and Gupta, A. 2000. Collection-Based Persistent Digital Archives---Part 1. D-Lib Magazine 6, 3. Part 2 D-lib Magzine 6, 4.]]Google ScholarGoogle Scholar
  49. NRC (National Research Council). 2000. LC21: A Digital Strategy for the Library of Congress. National Academy Press (Especially Ch., Preserving a Digital Heritage.)]]Google ScholarGoogle Scholar
  50. Nelson, M., Maly, K., Zubair, M., and Shen, S. N. T. 1999. SODA: Smart Objects, Dumb Archives. ECDL99, Lecture Notes in Computer Science. Springer Verlag.]] Google ScholarGoogle Scholar
  51. NLNZ (National Library of New Zealand). 2002. Metadata Standards Framework---Preservation Metadata, http://www.natlib.govt.nz/files/4initiatives_metaschema.pdf.]]Google ScholarGoogle Scholar
  52. Okerson, A., Bennett, S., Conway, P., Gewirtz, D., Martz, F., Parker, K., and Szary, R. 2002. YEA: The Yale Electronic Archive, One Year of Progress: Report on the Digital Preservation Planning Project, http://www.library.yale.edu/∼okerson/yea/.]]Google ScholarGoogle Scholar
  53. Paskin, N. 2003. The DOI Handbook Version 3.1, http://www.doi.org/hb.html.]]Google ScholarGoogle Scholar
  54. Payette, S. and Lagoze, C. 2000. Policy-Carrying, Policy-Enforcing Digital Objects. 4th European Conference on Research and Advanced Technology for Digital Libraries. Portugal, Springer Verlag.]] Google ScholarGoogle Scholar
  55. Reich, V. and Rosenthal, D. S. H. 2001. LOCKSS: A Permanent WWW Publishing and Access System. D-Lib Magazine 7, 6.]]Google ScholarGoogle Scholar
  56. Rust, G. and Bide, M. 2000. The metadata framework: Principles, model and data dictionary, http://www.indecs.org/pdf/framework.pdf.]]Google ScholarGoogle Scholar
  57. Sandhu, R. S. 1998. Role-based Access Control. Advances in Computers 46, 237--286.]]Google ScholarGoogle Scholar
  58. Schneier, B. 1996. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, New York, NY,]] Google ScholarGoogle Scholar
  59. Smith, M. Barton, M., Boss, M., Branschofsky, M., McClellan, G., Stuve, D., Transley, R., and Walker, J. H. 2003. DSpace: An Open Source Dynamic Digital Repository. D-Lib Magazine 9, 1.]]Google ScholarGoogle Scholar
  60. SMPTE. 2000. Recommended Best Practice, Application of Unique Material Identifiers in Production and Broadcast Environments at www.smpte.org, RP 205.]]Google ScholarGoogle Scholar
  61. Sollins, K. and Masinter, L. 1994. Functional Requirements for Uniform Resource Names. IETF RFC 1737.]] Google ScholarGoogle Scholar
  62. Thorsteinson, P. and Ganesh, G. 2003. NET Security and Cryptography. Prentice Hall, ISBN: 0-131-00851-X.]] Google ScholarGoogle Scholar
  63. Walsh, N. 2001. A URN Namespace for Public Identifiers. IETF RFC 3151.]] Google ScholarGoogle Scholar

Index Terms

  1. Trustworthy 100-year digital objects: Evidence after every witness is dead

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            ACM Transactions on Information Systems cover image
            ACM Transactions on Information Systems  Volume 22, Issue 3
            July 2004
            145 pages
            ISSN:1046-8188
            EISSN:1558-2868
            DOI:10.1145/1010614
            Issue’s Table of Contents

            Copyright © 2004 ACM

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Online: 1 July 2004

            Permissions

            Request permissions about this article.

            Request Permissions

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader
          About Cookies On This Site

          We use cookies to ensure that we give you the best experience on our website.

          Learn more

          Got it!