Skip to main content

2015 | OriginalPaper | Buchkapitel

Data Trustworthiness—Approaches and Research Challenges

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the increased need of data sharing among multiple organizations, such as government organizations, financial corporations, medical hospitals and academic institutions, it is critical to assess and assure data trustworthiness so that effective decisions can be made based on data. In this paper, we first discuss motivations and relevant techniques for data trustworthiness. We then present an architectural framework for a comprehensive system for trustworthiness assurance and discuss relevant recent work. We highlight open research issues and research directions throughout the paper.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bertino, E.: Protection from Insider Threats. Morgan&Claypool, San Rafael (2012) Bertino, E.: Protection from Insider Threats. Morgan&Claypool, San Rafael (2012)
2.
Zurück zum Zitat Lim, H.S., Moon, Y.-S., Bertino, E.: Provenance-based trustworthiness assessment in sensor networks. In: Proceedings of the 7th International Workshop on Data Management for Sensor Network (DMSN’10). Singapore (2010) Lim, H.S., Moon, Y.-S., Bertino, E.: Provenance-based trustworthiness assessment in sensor networks. In: Proceedings of the 7th International Workshop on Data Management for Sensor Network (DMSN’10). Singapore (2010)
3.
Zurück zum Zitat Biba, K.J.: Integrity Considerations for Secure Computer Systems. Technical Report TR-3153, Mitre (1977) Biba, K.J.: Integrity Considerations for Secure Computer Systems. Technical Report TR-3153, Mitre (1977)
4.
Zurück zum Zitat Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in P2P networks. In: Twelfth International World Wide Web Conference, pp. 640–651. ACM (2003) Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in P2P networks. In: Twelfth International World Wide Web Conference, pp. 640–651. ACM (2003)
5.
Zurück zum Zitat Clark, D.D., Wilson, D.R.: A comparison of commercial and military computer security policies. In: Proceedings of IEEE Symposium on Security and Privacy Symposium, Oakland (CA) (1987) Clark, D.D., Wilson, D.R.: A comparison of commercial and military computer security policies. In: Proceedings of IEEE Symposium on Security and Privacy Symposium, Oakland (CA) (1987)
6.
Zurück zum Zitat Juran, J.M.: Juran on Leadership for Quality—an Executive Handbook. Free Press, New York (1989) Juran, J.M.: Juran on Leadership for Quality—an Executive Handbook. Free Press, New York (1989)
7.
Zurück zum Zitat Kahn, B., Strong, D., Wang, R.: Information Quality Benchmarks: Product and Service Performance. Communications of the ACM, vol. 45, pp. 184–192. ACM (2002) Kahn, B., Strong, D., Wang, R.: Information Quality Benchmarks: Product and Service Performance. Communications of the ACM, vol. 45, pp. 184–192. ACM (2002)
8.
Zurück zum Zitat Price, R., Shanks, G.: A semiotic information quality framework. In: IFIP International Conference on Decision Support Systems: Decision Support in an Uncertain and Complex World. Prato (Italy) (2004) Price, R., Shanks, G.: A semiotic information quality framework. In: IFIP International Conference on Decision Support Systems: Decision Support in an Uncertain and Complex World. Prato (Italy) (2004)
9.
Zurück zum Zitat Wand, Y., Wang, R.Y.: Anchoring Data Quality Dimensions in Ontological Foundations. Communications of the ACM, vol. 39, pp. 86–95. ACM (1996) Wand, Y., Wang, R.Y.: Anchoring Data Quality Dimensions in Ontological Foundations. Communications of the ACM, vol. 39, pp. 86–95. ACM (1996)
10.
Zurück zum Zitat Batini, C., Scannapieco, M.: Data Quality: Concepts, Methodologies and Techniques. Springer (2006) Batini, C., Scannapieco, M.: Data Quality: Concepts, Methodologies and Techniques. Springer (2006)
11.
Zurück zum Zitat Levien, R:. Attack resistant trust metrics. PhD thesis, University of California—Berkeley, CA, USA (2002) Levien, R:. Attack resistant trust metrics. PhD thesis, University of California—Berkeley, CA, USA (2002)
12.
Zurück zum Zitat Rezvani, M., Ignjatovic, A., Bertino, E., Jha, S.: Secure data aggregation for wireless sensor networks. IEEE transactions on dependable and secure computing. In press (2014) Rezvani, M., Ignjatovic, A., Bertino, E., Jha, S.: Secure data aggregation for wireless sensor networks. IEEE transactions on dependable and secure computing. In press (2014)
13.
Zurück zum Zitat Lim, H.S., Ghinita, G., Bertino, E., Kantarcioglu, M.: A game-theoretic approach for high-assurance of data trustworthiness in sensor networks. In Proceedings of IEEE 28th International Conference on Data Engineering (ICDE’12), Washington (DC) (2012) Lim, H.S., Ghinita, G., Bertino, E., Kantarcioglu, M.: A game-theoretic approach for high-assurance of data trustworthiness in sensor networks. In Proceedings of IEEE 28th International Conference on Data Engineering (ICDE’12), Washington (DC) (2012)
14.
Zurück zum Zitat Rezvani, M., Ignjatovic, A., Bertino, E., Jha, S.: A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks. poster abstract. In: Proceedings of ACM Sensys’13 Conference. Rome (Italy) (2013) Rezvani, M., Ignjatovic, A., Bertino, E., Jha, S.: A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks. poster abstract. In: Proceedings of ACM Sensys’13 Conference. Rome (Italy) (2013)
15.
Zurück zum Zitat Mella, G., Ferrari, E., Bertino, E., Koglin, Y.: Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed Systems. ACM Trans. Inf. Syst. Secur. 9, 421–460 (2006)CrossRef Mella, G., Ferrari, E., Bertino, E., Koglin, Y.: Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed Systems. ACM Trans. Inf. Syst. Secur. 9, 421–460 (2006)CrossRef
16.
Zurück zum Zitat Wang, C., Hussein, S.R., Bertino, E.: Dictionary based secure provenance compression for wireless sensor networks. IEEE transactions on parallel and distributed systems, in press (2014) Wang, C., Hussein, S.R., Bertino, E.: Dictionary based secure provenance compression for wireless sensor networks. IEEE transactions on parallel and distributed systems, in press (2014)
17.
Zurück zum Zitat Hussein, S.R., Wang, C., Sultana, S., Bertino, E.: Secure data provenance compression using arithmetic coding in wireless sensor networks. In: Proceedings of 33rd IEEE International Performance Computing and Communications Conference (IPCCC 2014), Phoenix (AZ) in press (2014) Hussein, S.R., Wang, C., Sultana, S., Bertino, E.: Secure data provenance compression using arithmetic coding in wireless sensor networks. In: Proceedings of 33rd IEEE International Performance Computing and Communications Conference (IPCCC 2014), Phoenix (AZ) in press (2014)
18.
Zurück zum Zitat Scannapieco, M., Figotin, I., Bertino, E., Elmagarmid, A.: Privacy preserving schema and data matching. In: ACM SIGMOD International Conference on Management of Data, pp. 653–664 (2007) Scannapieco, M., Figotin, I., Bertino, E., Elmagarmid, A.: Privacy preserving schema and data matching. In: ACM SIGMOD International Conference on Management of Data, pp. 653–664 (2007)
19.
Zurück zum Zitat Inan, A., Kantarcioglu, M., Bertino, E., Scannapieco, M.: A hybrid approach to private record linkage. In: 24th IEEE International Conference on Data Engineering, pp. 496–505 (2008) Inan, A., Kantarcioglu, M., Bertino, E., Scannapieco, M.: A hybrid approach to private record linkage. In: 24th IEEE International Conference on Data Engineering, pp. 496–505 (2008)
20.
Zurück zum Zitat Cao, J., Rao, F.-Y., Bertino, E., Kantarcioglu, M.: A hybrid private record linkage scheme: separating differentially private synopses from matching records. In: Proceedings of IEEE 31st International Conference on Data Engineering (ICDE’15), Seoul Korea in press (2015) Cao, J., Rao, F.-Y., Bertino, E., Kantarcioglu, M.: A hybrid private record linkage scheme: separating differentially private synopses from matching records. In: Proceedings of IEEE 31st International Conference on Data Engineering (ICDE’15), Seoul Korea in press (2015)
21.
Zurück zum Zitat Jackson, M.O.: Social and Economics Networks. Princeton University Press, Princeton (2008) Jackson, M.O.: Social and Economics Networks. Princeton University Press, Princeton (2008)
Metadaten
Titel
Data Trustworthiness—Approaches and Research Challenges
verfasst von
Elisa Bertino
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-17016-9_2