Layering in Provenance Systems
نویسندگان
چکیده
Digital provenance describes the ancestry or history of a digital object. Most existing provenance systems, however, operate at only one level of abstraction: the system call layer, a workflow specification, or the high-level constructs of a particular application. The provenance collectable in each of these layers is different, and all of it can be important. Single-layer systems fail to account for the different levels of abstraction at which users need to reason about their data and processes. These systems cannot integrate data provenance across layers and cannot answer questions that require an integrated view of the provenance. We have designed a provenance collection structure facilitating the integration of provenance across multiple levels of abstraction, including a workflow engine, a web browser, and an initial runtime Python provenance tracking wrapper. We layer these components atop provenance-aware network storage (NFS) that builds upon a Provenance-Aware Storage System (PASS). We discuss the challenges of building systems that integrate provenance across multiple layers of abstraction, present how we augmented systems in each layer to integrate provenance, and present use cases that demonstrate how provenance spanning multiple layers provides functionality not available in existing systems. Our evaluation shows that the overheads imposed by layering provenance systems are reasonable.
منابع مشابه
Trustworthy Whole-System Provenance for the Linux Kernel
In a provenance-aware system, mechanisms gather and report metadata that describes the history of each object being processed on the system, allowing users to understand how data objects came to exist in their present state. However, while past work has demonstrated the usefulness of provenance, less attention has been given to securing provenance-aware systems. Provenance itself is a ripe atta...
متن کاملLayering in Provenance-Aware Storage Systems
Digital provenance describes the ancestry or history of a digital document. Provenance provides answers to questions such as: “How does the ancestry of these objects differ?” “Are there source code files tainted by proprietary software?” “How was this object created?” Prior systems used to collect and maintain provenance operate within a single layer of abstraction: the system call boundary, a ...
متن کاملLinux Provenance Modules: Secure Provenance Collection for the Linux Kernel
In spite of a growing interest in provenance-aware systems, mechanisms for automated provenance collection have failed to win acceptance in mainstream operating systems. This is due in part to a lack of consensus within disparate provenance development communities on a single general solution – provenance collection mechanisms have been proposed at a variety of operational layers wthin host sys...
متن کاملFeldspar-provenance Dates in a Stratigraphic Section of till in Gahanna, Ohio
The internal layering and provenance of feldspar in 3 tills and in one outwash deposit at Gahanna, Ohio, were studied by determining pebble lithologies and Rb-Sr dates of feldspar. Variations in lithology of pebbles and in the Rb-Sr ratios of feldspar in the 125—250 micrometer fractions reveal discontinuities which divide the upper 2 tills into 2 subunits each. Each of the lower subunits appear...
متن کاملModelling Provenance Collection Points and Their Impact on Provenance Graphs
As many domains employ ever more complex systems-of-systems, capturing provenance among component systems is increasingly important. Applications such as intrusion detection, load balancing, traffic routing, and insider threat detection all involve monitoring and analyzing the data provenance. Implicit in these applications is the assumption that “good” provenance is captured (e.g. complete pro...
متن کامل