A Fine-Grained Workflow Model with Provenance-Aware Security Views
نویسندگان
چکیده
In this paper we propose a fine-grained workflow model, based on context-free graph grammars, in which the dependency relation between the inputs and outputs of a module is explicitly specified as a bipartite graph. Using this model, we develop an access control mechanism that supports provenance-aware security views. Our security model not only protects sensitive data and modules from unauthorized access, but also provides the flexibility to expose correct or partially correct data dependency relationships within the provenance information.
منابع مشابه
Fine-Grained Provenance Inference for a Large Processing Chain with Non-materialized Intermediate Views
Many applications facilitate a data processing chain, i.e. a workflow, to process data. Results of intermediate processing steps may not be persistent since reproducing these results are not costly and these are hardly re-usable. However, in stream data processing where data arrives continuously, documenting fine-grained provenance explicitly for a processing chain to reproduce results is not a...
متن کاملHiding Data and Structure in Workflow Provenance
In this paper we discuss the use of views to address the problem of providing useful answers to provenance queries while ensuring that privacy concerns are met. In particular, we propose a hierarchical workflow model, based on context-free graph grammars, in which fine-grained dependencies between the inputs and outputs of a module are explicitly specified. Using this model, we examine how priv...
متن کاملLabeling Workflow Views with Fine-Grained Dependencies
This paper considers the problem of efficiently answering reachability queries over views of provenance graphs, derived from executions of workflows that may include recursion. Such views include composite modules and model fine-grained dependencies between module inputs and outputs. A novel view-adaptive dynamic labeling scheme is developed for efficient query evaluation, in which view specifi...
متن کاملA Study on Data Repertory Acumen Schema to Manage Data Provenance in Geoscience Application
Data provenance accepts and approves the scientists to model as to investigate the beginning of an unexpected value. It can be used as a duplicate recipe for output data products. The capturing provenance requires enormous effort by scientists in terms of time, training and need to design the workflow of the scientific model i.e., workflow source, which requires both time and training. Scientis...
متن کاملPutting Lipstick on Pig: Enabling Database-style Workflow Provenance
Workflow provenance typically assumes that each module is a “black-box”, so that each output depends on all inputs (coarse-grained dependencies). Furthermore, it does not model the internal state of a module, which can change between repeated executions. In practice, however, an output may depend on only a small subset of the inputs (finegrained dependencies) as well as on the internal state of...
متن کامل