Towards Semantics for Provenance Security
نویسنده
چکیده
Provenance records the history of data. Careless use of provenance may violate the security policies of data. Moreover, the provenance itself may be sensitive information, necessitating restrictions on the use of both data and provenance to enforce security requirements. This paper proposes extensional semantic definitions for provenance security. The semantic definitions require that provenance information released to the user does not reveal confidential data, and that neither the provenance information given to the user, nor the program’s output, reveal sensitive provenance information.
منابع مشابه
Towards a Threat Model for Provenance in e-Science
Scientists increasingly rely on workflow management systems to perform large-scale computational scientific experiments. These systems often collect provenance information that is useful in the analysis and reproduction of such experiments. On the other hand, this provenance data may be exposed to security threats which can result, for instance, in compromising the analysis of these experiments...
متن کاملDependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems
A unique characteristics of provenance data is that it forms a directed acyclic graph (DAG) in accordance with the underlying causality dependencies between entities (acting users, action processes and data objects) involved in transactions. Data provenance raises at least two distinct security-related issues. One is how to control access to provenance data which we call Provenance Access contr...
متن کاملUnderstanding the Semantics of Data Provenance to Support Active Conceptual Modeling
Data Provenance refers to the lineage of data including its origin, key events that occur over the course of its lifecycle, and other details associated with data creation, processing, and archiving. We believe that tracking provenance enables users to share, discover, and reuse the data, thus streamlining collaborative activities, reducing the possibility of repeating dead ends, and facilitati...
متن کاملTrustworthy Whole-System Provenance for the Linux Kernel
In a provenance-aware system, mechanisms gather and report metadata that describes the history of each object being processed on the system, allowing users to understand how data objects came to exist in their present state. However, while past work has demonstrated the usefulness of provenance, less attention has been given to securing provenance-aware systems. Provenance itself is a ripe atta...
متن کاملA CPN Provenance Model of Workflow: Towards Diagnosis in the Cloud
Workflow provenance is an important supportive component that encompasses knowledge sharing, product reusability and process verification. The emerging cloud computing paradigm offers new application opportunities but also raises research challenges, such as integrity, privacy, security and legal related issues. In this paper, we propose a Colored Petri Net (CPN) model for diagnosis based on Op...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009