Skip to main content

2015 | OriginalPaper | Buchkapitel

An Analytical Survey of Provenance Sanitization

verfasst von : James Cheney, Roly Perera

Erschienen in: Provenance and Annotation of Data and Processes

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security is likely to be a critical factor in the future adoption of provenance technology, because of the risk of inadvertent disclosure of sensitive information. In this survey paper we review the state of the art in secure provenance, considering mechanisms for controlling access, and the extent to which these mechanisms preserve provenance integrity. We examine seven systems or approaches, comparing features and identifying areas for future work.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bailliage, R.D., Mazaré, L.: Using unification for opacity properties. In: Proceedings of WITS 2004, pp. 165–176 (2004) Bailliage, R.D., Mazaré, L.: Using unification for opacity properties. In: Proceedings of WITS 2004, pp. 165–176 (2004)
2.
Zurück zum Zitat Biton, O., Cohen-Boulakia, S., Davidson, S.B., Hara, C.S.: Querying and managing provenance through user views in scientific workflows. In: ICDE, pp. 1072–1081. IEEE (2008) Biton, O., Cohen-Boulakia, S., Davidson, S.B., Hara, C.S.: Querying and managing provenance through user views in scientific workflows. In: ICDE, pp. 1072–1081. IEEE (2008)
3.
Zurück zum Zitat Blaustein, B.T., Chapman, A., Seligman, L., Allen, M.D., Rosenthal, A.: Surrogate parenthood: protected and informative graphs. PVLDB 4(8), 518–527 (2011) Blaustein, B.T., Chapman, A., Seligman, L., Allen, M.D., Rosenthal, A.: Surrogate parenthood: protected and informative graphs. PVLDB 4(8), 518–527 (2011)
4.
Zurück zum Zitat Braun, U., Shinnar, A., Seltzer, M.: Securing provenance. In: Proceedings of the 3rd Conference on Hot Topics in Security, pp. 4:1–4:5 (2008) Braun, U., Shinnar, A., Seltzer, M.: Securing provenance. In: Proceedings of the 3rd Conference on Hot Topics in Security, pp. 4:1–4:5 (2008)
5.
Zurück zum Zitat Bryans, J.W., Koutny, M., Mu, C.: Towards quantitative analysis of opacity. In: Palamidessi, C., Ryan, M.D. (eds.) TGC 2012. LNCS, vol. 8191, pp. 145–163. Springer, Heidelberg (2013) CrossRef Bryans, J.W., Koutny, M., Mu, C.: Towards quantitative analysis of opacity. In: Palamidessi, C., Ryan, M.D. (eds.) TGC 2012. LNCS, vol. 8191, pp. 145–163. Springer, Heidelberg (2013) CrossRef
6.
Zurück zum Zitat Buneman, P., Chapman, A.P., Cheney, J.: Provenance management in curated databases. In: SIGMOD 2006, pp. 539–550 (2006) Buneman, P., Chapman, A.P., Cheney, J.: Provenance management in curated databases. In: SIGMOD 2006, pp. 539–550 (2006)
7.
Zurück zum Zitat Cadenhead, T., Khadilkar, V., Kantarcioglu, M., Thuraisingham, B.: Transforming provenance using redaction. In: SACMAT, pp. 93–102. ACM, New York (2011) Cadenhead, T., Khadilkar, V., Kantarcioglu, M., Thuraisingham, B.: Transforming provenance using redaction. In: SACMAT, pp. 93–102. ACM, New York (2011)
8.
Zurück zum Zitat Chebotko, A., Chang, S., Lu, S., Fotouhi, F., Yang, P.: Scientific workflow provenance querying with security views. In: WAIM 2008, pp. 349–356 (2008) Chebotko, A., Chang, S., Lu, S., Fotouhi, F., Yang, P.: Scientific workflow provenance querying with security views. In: WAIM 2008, pp. 349–356 (2008)
9.
Zurück zum Zitat Cheney, J.: A formal framework for provenance security. In: CSF, pp. 281–293. IEEE (2011) Cheney, J.: A formal framework for provenance security. In: CSF, pp. 281–293. IEEE (2011)
10.
Zurück zum Zitat Cheney, J., Missier, P., Moreau, L. (eds.) De Nies, T.: Constraints of the PROV data model. W3C recommendation, W3C, April 2013 Cheney, J., Missier, P., Moreau, L. (eds.) De Nies, T.: Constraints of the PROV data model. W3C recommendation, W3C, April 2013
11.
Zurück zum Zitat Chong, S.: Towards semantics for provenance security. In: Cheney, J. (ed.) TaPP 2009. USENIX (2009) Chong, S.: Towards semantics for provenance security. In: Cheney, J. (ed.) TaPP 2009. USENIX (2009)
12.
Zurück zum Zitat Clark, D., Hunt, S., Malacaria, P.: Quantitative analysis of the leakage of confidential data. Electron. Notes Theor. Comput. Sci. 59(3), 238–251 (2002). QAPL 2001CrossRef Clark, D., Hunt, S., Malacaria, P.: Quantitative analysis of the leakage of confidential data. Electron. Notes Theor. Comput. Sci. 59(3), 238–251 (2002). QAPL 2001CrossRef
13.
Zurück zum Zitat Cohen-Boulakia, S., Biton, O., Cohen, S., Davidson, S.: Addressing the provenance challenge using zoom. Concurr. Comput. Pract. Exp. 20(5), 497–506 (2008)CrossRef Cohen-Boulakia, S., Biton, O., Cohen, S., Davidson, S.: Addressing the provenance challenge using zoom. Concurr. Comput. Pract. Exp. 20(5), 497–506 (2008)CrossRef
14.
Zurück zum Zitat Davidson, S.B., Freire, J.: Provenance and scientific workflows: challenges and opportunities. In: Proceedings of SIGMOD 2008, pp. 1345–1350. ACM, New York, (2008) Davidson, S.B., Freire, J.: Provenance and scientific workflows: challenges and opportunities. In: Proceedings of SIGMOD 2008, pp. 1345–1350. ACM, New York, (2008)
15.
Zurück zum Zitat Davidson, S.B., Khanna, S., Milo, T., Panigrahi, D., Roy, S.: Provenance views for module privacy. In: PODS, pp. 175–186 (2011) Davidson, S.B., Khanna, S., Milo, T., Panigrahi, D., Roy, S.: Provenance views for module privacy. In: PODS, pp. 175–186 (2011)
16.
Zurück zum Zitat Davidson, S.B., Milo, T., Roy, S.: A propagation model for provenance views of public/private workflows. In: ICDT, pp. 165–176. ACM, New York (2013) Davidson, S.B., Milo, T., Roy, S.: A propagation model for provenance views of public/private workflows. In: ICDT, pp. 165–176. ACM, New York (2013)
17.
Zurück zum Zitat Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504–513 (1977)MATHCrossRef Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504–513 (1977)MATHCrossRef
18.
Zurück zum Zitat Dey, S.C., Zinn, D., Ludäscher, B.: ProPub: towards a declarative approach for publishing customized, policy-aware provenance. In: Bayard Cushing, J., French, J., Bowers, S. (eds.) SSDBM 2011. LNCS, vol. 6809, pp. 225–243. Springer, Heidelberg (2011) CrossRef Dey, S.C., Zinn, D., Ludäscher, B.: ProPub: towards a declarative approach for publishing customized, policy-aware provenance. In: Bayard Cushing, J., French, J., Bowers, S. (eds.) SSDBM 2011. LNCS, vol. 6809, pp. 225–243. Springer, Heidelberg (2011) CrossRef
19.
Zurück zum Zitat Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006) CrossRef Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006) CrossRef
20.
Zurück zum Zitat Hasan, R., Sion, R., Winslett, M.: Introducing secure provenance: problems and challenges. In: Proceedings of StorageSS 2007, pp. 13–18. ACM, New York (2007) Hasan, R., Sion, R., Winslett, M.: Introducing secure provenance: problems and challenges. In: Proceedings of StorageSS 2007, pp. 13–18. ACM, New York (2007)
21.
Zurück zum Zitat Hasan, R., Sion, R., Winslett, M.: Preventing history forgery with secure provenance. Trans. Storage 5, 12:1–12:43 (2009)CrossRef Hasan, R., Sion, R., Winslett, M.: Preventing history forgery with secure provenance. Trans. Storage 5, 12:1–12:43 (2009)CrossRef
22.
Zurück zum Zitat Lu, W., Miklau, G., Immerman, N.: Auditing a database under retention policies. VLDB J. 22(2), 203–228 (2013)CrossRef Lu, W., Miklau, G., Immerman, N.: Auditing a database under retention policies. VLDB J. 22(2), 203–228 (2013)CrossRef
23.
Zurück zum Zitat Lyle, J., Martin, A.: Trusted computing and provenance: better together. In: Proceedings of TAPP 2010. USENIX Association, Berkeley (2010) Lyle, J., Martin, A.: Trusted computing and provenance: better together. In: Proceedings of TAPP 2010. USENIX Association, Berkeley (2010)
24.
Zurück zum Zitat Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1) Article 3 (2007) Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1) Article 3 (2007)
25.
Zurück zum Zitat Martin, A., Lyle, J., Namilkuo, C.: Provenance as a security control. In: Proceedings of TaPP 2012, pp. 3–3. USENIX Association, Berkeley (2012) Martin, A., Lyle, J., Namilkuo, C.: Provenance as a security control. In: Proceedings of TaPP 2012, pp. 3–3. USENIX Association, Berkeley (2012)
26.
Zurück zum Zitat Missier, P., Bryans, J., Gamble, C., Curcin, V., Danger, R.: Provenance graph abstraction by node grouping. Technical report CS-TR-1393, Newcastle University (2013) Missier, P., Bryans, J., Gamble, C., Curcin, V., Danger, R.: Provenance graph abstraction by node grouping. Technical report CS-TR-1393, Newcastle University (2013)
27.
28.
Zurück zum Zitat Moreau, L., Clifford, B., Freire, J., Futrelle, J., Gil, Y., Groth, P., Kwasnikowska, N., Miles, S., Missier, P., Myers, J., Plale, B., Simmhan, Y., Stephan, E., Van den Bussche, J.: The OPM core specification (v1.1). Future Gener. Comput. Syst. 27(6), 743–756 (2011)CrossRef Moreau, L., Clifford, B., Freire, J., Futrelle, J., Gil, Y., Groth, P., Kwasnikowska, N., Miles, S., Missier, P., Myers, J., Plale, B., Simmhan, Y., Stephan, E., Van den Bussche, J.: The OPM core specification (v1.1). Future Gener. Comput. Syst. 27(6), 743–756 (2011)CrossRef
29.
Zurück zum Zitat Moreau, L., Missier, P. (eds.): PROV-DM: The PROV Data Model. W3C Recommendation REC-prov-dm-20130430 (2013) Moreau, L., Missier, P. (eds.): PROV-DM: The PROV Data Model. W3C Recommendation REC-prov-dm-20130430 (2013)
30.
Zurück zum Zitat Zhang, J., Chapman, A., LeFevre, K.: Do you know where your data’s been? – tamper-evident database provenance. In: Jonker, W., Petković, M. (eds.) SDM 2009. LNCS, vol. 5776, pp. 17–32. Springer, Heidelberg (2009) CrossRef Zhang, J., Chapman, A., LeFevre, K.: Do you know where your data’s been? – tamper-evident database provenance. In: Jonker, W., Petković, M. (eds.) SDM 2009. LNCS, vol. 5776, pp. 17–32. Springer, Heidelberg (2009) CrossRef
Metadaten
Titel
An Analytical Survey of Provenance Sanitization
verfasst von
James Cheney
Roly Perera
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-16462-5_9

Premium Partner