Research on trusted computing focuses mainly on the security and integrity of the
, from hardware components to software services. However, this is only one facet of the computation, the other being the
. If our goal is to produce
, a trustworthy execution environment is not enough: we also need
. Provenance of data plays a pivotal role in ascertaining trustworthiness of data. In our work, we explore how to use state-of-the-art systems techniques to capture and reconstruct provenance, thus enabling us to build trust on both newly generated and existing data.