Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

A roadmap for privacy-enhanced secure data provenance

Published: 01 December 2014 Publication History

Abstract

The notion of data provenance was formally introduced a decade ago and has since been investigated, but mainly from a functional perspective, which follows the historical pattern of introducing new technologies with the expectation that security and privacy can be added later. Despite very recent interests from the cyber security community on some specific aspects of data provenance, there is no long-haul, overarching, systematic framework for the security and privacy of provenance. The importance of secure provenance R&D has been emphasized in the recent report on Federal game-changing R&D for cyber security especially with respect to the theme of Tailored Trustworthy Spaces. Secure data provenance can significantly enhance data trustworthiness, which is crucial to various decision-making processes. Moreover, data provenance can facilitate accountability and compliance (including compliance with privacy preferences and policies of relevant users), can be an important factor in access control and usage control decisions, and can be valuable in data forensics. Along with these potential benefits, data provenance also poses a number of security and privacy challenges. For example, sometimes provenance needs to be confidential so it is visible only to properly authorized users, and we also need to protect the identity of entities in the provenance from exposure. We thus need to achieve high assurance of provenance without comprising privacy of those in the chain that produced the data. Moreover, if we expect voluntary large-scale participation in provenance-aware applications, we must assure that the privacy of the individuals or organizations involved will be maintained. It is incumbent on the cyber security community to develop a technical and scientific framework to address the security and privacy challenges so that our society can gain maximum benefit from this technology. In this paper, we discuss a framework of theoretical foundations, models, mechanisms and architectures that allow applications to benefit from privacy-enhanced and secure use of provenance in a modular fashion. After introducing the main components of such a framework and the notion of provenance life cycle, we discuss in details research questions and issues concerning each such component and related approaches.

References

[1]
Agrawal, P., Benjelloun, O., Sarma, A., Hayworth, C., Nabar, S., Sugihara, T., Widom, J. (2006). In VLDB (pp. 1151-1154).
[2]
Ateniese, G., & Hohenberger, S. (2005). In ACM conference on computer and communications security (CCS'05) (pp. 310-319).
[3]
Bellare, M., & Neven, G. (2006). In ACM conference on computer and communications security (CCS'06) (pp. 390-399).
[4]
Blaze, M., Bleumer, G., Strauss, M. (1998). In EUROCRYPT'98 date (pp. 127-144).
[5]
Boneh, D., & Waters, B. (2007). Theory of cryptography, (pp. 535-554).
[6]
Boneh, D., Gentry, C., Lynn, B., Shacham, H. (2003). In EUROCRYPT'03 (pp. 416-432).
[7]
Boneh, D., Di Crescenzo, R., Ostrovsky, R., Persiano, G. (2004). In Advances in Cryptology-Eurocrypt 2004 (pp. 506-522). Springer.
[8]
Bowers, S., McPhillips, T., Ludäscher, B., Cohen, S., Davidson, S. (2006). In International provenance and annotation workshop (IPAW) (pp. 133-147).
[9]
Braun, U., Shinnar, A., Seltzer, M. (2008). In Proceedings of the 3rd conference on hot topics in security USENIX association (p. 4).
[10]
Buneman, P., Khanna, S., Tan, W.C. (2000). FST TCS 2000: Foundations of software technology and theoretical computer science. In S. Kapoor & S. Prasad (Eds.) Lecture notes in computer science (vol. 1974, pp. 87-93). Berlin: Springer.
[11]
Buneman, P., Khanna, S., Tan, W.C. (2001). Database Theory-ICDT, (pp. 316-330).
[12]
Cadenhead, T., Kantarcioglu, M., Thuraisingham, B. (2011a). In 3th USENIX workshop on the theory and practice of provenance (USENIX Association), TaPP'11.
[13]
Cadenhead, T., Khadilkar, V., Kantarcioglu, M., Thuraisingham, B. (2011b). In Proceedings of the first ACM conference on data and application security and privacy, CODASPY '11 (pp. 133-144). New York: ACM.
[14]
Cadenhead, T., Khadilkar, T., Kantarcioglu, M., Thuraisingham, B. (2012). In Proceedings of the 17th ACM symposium on access control models and technologies, SACMAT '12 (pp. 113-116) New York: ACM.
[15]
Cederquist, J., Conn, R., Dekker, M., Etalle, S., den Hartog, J. (2005). In Sixth IEEE international workshop on policies for distributed systems and networks (pp. 34-43).
[16]
Celikel, E., Kantarcioglu, M., Thuraisingham, B., Bertino, E. (2007). In Proceedings of the 2007 OTM confederated international conference on the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II, OTM'07 (pp. 1548-1566). Berlin / Heidelberg: Springer-Verlag. http://portal.acm.org/citation.cfm?id=1784707.1784750.
[17]
Chapman, A.P., Jagadish, H.V., Ramanan, P. (2008). Proceedings of the 2008 ACM SIGMOD international conference on management of data (pp. 993-1006).
[18]
Chaum, D., & van Heyst, E. (1991). In EUROCRYPT (pp. 257-265).
[19]
Cheney, J. (2007). IEEE Data Engineering Bulletin, 30(4), 22.
[20]
Cheney, J., Chong, S., Foster, N., Seltzer, M., Vansummeren, S. (2009). In Proceeding of the 24th ACM SIGPLAN conference companion on object oriented programming systems languages and applications, OOPSLA '09 (pp. 957-964). New York: ACM.
[21]
Cohen, S., Boulakia, S., Davidson, S. (2006). In Third international workshop on data integration in the life sciences (DILS) (pp. 264-279).
[22]
Corcoran, B., Swamy, N., Hicks, M. (2007). In On-line proceedings of the workshop on principles of provenance (PrOPr) (Citeseer).
[23]
Curbera, F., Doganata, Y., Martens, A., Mukhi, N., Slominski, A. (2008). On the move to meaningful internet systems: OTM, (pp. 100-119).
[24]
Dai, C., Lin, D., Kantarcioglu, M., Bertino, E., Celikel, E., Thuraisingham, B.M. (2009). In Secure data management (pp. 49-67).
[25]
Davidson, S., Boulakia, S., Eyal, A., Ludascher, B., McPhillips, T., Bowers, S., Anand, M., Freire, J. (2007). IEEE Data Engineering Bulletin, 30(4), 44.
[26]
Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Moody, K. (2004). In Proceedings of the ninth ACM symposium on access control models and technologies, SACMAT '04 (pp. 156-162). New York: ACM.
[27]
Demsky, B. (2009). In Proceedings of the 4rd conference on hot topics in security (USENIX Association).
[28]
Ding, X., Tsudik, G., Xu, S. (2009). Journal of Computer Security, 17(4), 489.
[29]
Dwork, C. (2008). In TAMC (pp. 1-19).
[30]
Gentry, C. (2009). In Proceedings of the 41st annual ACM symposium on theory of computing, STOC '09 (pp. 169-178).
[31]
Golbeck, J. (2006). Provenance and annotation of data. In L. Moreau & I. Foster (Eds.), Lecture notes in computer Science (vol. 4145, pp. 101-108). Berlin: Springer.
[32]
Golbeck, J., & Hendler, J. (2008). Concurrency and Computation: Practice and Experience, 20(5), 431.
[33]
Goyal, V., Pandey, O., Sahai, A., Waters, B. (2006). In ACM Conference on computer and communications security (pp. 89-98).
[34]
Green, T., Karvounarakis, G., Ives, Z., Tannen V. (2007). In VLDB.
[35]
Groth, P. (2007). The origin of data: Enabling the determination of provenance in multi-institutional scientific systems through the documentation of processes. Ph.D. thesis University of Southampton. http://eprints. ecs.soton.ac.uk/14649/1/ThesisSubmitted.pdf.
[36]
Groth, P., Jiang, S., Miles, S., Munroe, S., Tan, V., Tsasakou, S., Moreau, L. (2006a). An architecture for provenance systems. Technical report, University of Southampton. http://eprints.ecs.soton.ac.uk/13216/1/provenanceArchitecture10.pdf.
[37]
Groth, P., Jiang, S., Miles, S., Munroe, S., Tan, V., Tsasakou, S., Moreau, L. (2006b). In Technical report D3.1.1, Ver 0.6, www.pasoa.org.
[38]
Groth, P., Miles, S., Moreau, L. (2009). ACM Transactions Internet Technology, 9(3), 1.
[39]
Hajnal, A., Kifor, T., Pedone, G., Varga, L. (2007). In Proceedings of HealthGrid 2007 (pp. 330-341).
[40]
Hasan, R., Sion, R., Winslett, M. (2007). In Proceedings of the 2007 ACM workshop on storage security and survivability, StorageSS '07 (pp. 13-18). New York: ACM.
[41]
Hasan, R., Sion, R., Winslett, M. (2009). In Proceedings of the 7th conference on file and storage technologies (FAST'09) (pp. 1-14).
[42]
Heinis, T., & Alonso, G. (2008). In Proceedings of the 2008 ACM SIGMOD international conference on management of data (pp. 1007-1018).
[43]
Hong, J.I., Ng, J.D., Lederer, S., Landay, J.A. (2004). In Proceedings of the 5th conference on designing interactive systems: Processes, practices, methods,and techniques, DIS '04 (pp. 91-100). New York: ACM.
[44]
Hui, P., Bruce, J., Fink, G., Gregory, M., Best, D., McGrath, L., Endert, A. (2010). In International symposium on collaborative technologies and systems (CTS) (pp. 489-498).
[45]
Ives, Z., Khandelwal, N., Kapur, A., Cakir, M. (2005). In CIDR (pp. 107-118).
[46]
Jones, S.T., Arpaci-Dusseau, A.C., Arpaci-Dusseau, R.H. (2006a). In Proceedings of the annual conference on USENIX '06 annual technical conference (pp. 1-1).
[47]
Jones, S.T., Arpaci-Dusseau, A.C., Arpaci-Dusseau, R.H. (2006b). SIGOPS Operations Systematics Review, 40, 14.
[48]
Kantarcioglu, M., & Clifton, C. (2004). IEEE TKDE, 16(9), 1026. http://ieeexplore.ieee.org/iel5/69/29187/01316832.pdf?isnumber=29187&prod=JNL&arnumber=1316832&arnumber=1316832&arSt=+1026& ared=+1037&arAuthor=Kantarcioglu%2C+M.%3B+Clifton%2C+C.
[49]
Kantarcioglu, M., & Kardes, O. (2009). International Journal of Information and Computer Security, 2(353). http://www.ingentaconnect.com/content/ind/ijics/2009/00000002/00000004/art00002.
[50]
Kiayias, A., Xu, S., Yung, M. (2008). In Proceedings of 6th international conference security and cryptography for networks (SCN'08). Lecture notes in computer science (vol. 5229, pp. 57-76). Springer.
[51]
Kifor, T., Varga, L., Vazquez-Salceda, J., Alvarez, S., Willmott, S., Miles, S., Moreau, L. (2006). IEEE Intelligent Systems, 21(6), 38. DOI 9D04F813-E31E-416F-99B7-DBC4D177ACA7.
[52]
Krishnan, S., Snow, K.Z., Monrose, F. (2010). In Proceedings of the 17th ACM conference on computer and communications security (pp. 50-60).
[53]
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B. (2010). In EUROCRYPT (pp. 62-91).
[54]
Li, N., Li, T., Venkatasubramanian, S. (2007). In ICDE.
[55]
Libert, B., & Vergnaud, D. (2008). In ACM conference on computer and communications security 2008 (pp. 511-520).
[56]
Liu, Y., Futrelle, J., Myers, J., Rodriguez, A., Kooper, R. (2010). In 2010 international symposium on collaborative technologies and systems (CTS) (pp. 330-339).
[57]
Lu, R., Lin, X., Liang, X., Shen, X.S. (2010). In Proceedings of the 5th ACM symposium on information, computer and communications security, ASIACCS '10 (pp. 282-292). New York: ACM.
[58]
Luby, M. (2002). In Annual IEEE symposium on foundations of computer science (p. 271).
[59]
Lyle, J., & Martin, A. (2010). In 2nd USENIX workshop on the theory and practice of provenance (TaPP 10).
[60]
Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H. (2004). Advances in cryptology - EUROCRYPT. In C. Cachin & J. Camenisch (Eds.), Lecture notes in computer science (vol. 3027, pp. 74-90). Springer.
[61]
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M. (2006). In ICDE.
[62]
McDaniel, P., Butler, K., McLaughlin, S., Sion, R., Zadok, E., Winslett, M. (2010). In 2nd USENIX workshop on the theory and practice of provenance (TaPP 10).
[63]
Moitra, A., Barnett, B., Crapo, A., Dill, S. (2009). In Military communications conference, MILCOM 2009. IEEE (pp. 1-7).
[64]
Moreau, L. (2009). Foundations and trends in web science. http://eprints.ecs.soton.ac.uk/18176/1/psurvey.pdf.
[65]
Moreau, L., Groth, P., Miles, S., Vazquez-Salceda, J., Ibbotson, J., Jiang, S., Munroe, S., Rana, O., Schreiber, A., Tan, V., Varga, L. (2008). Communications of the ACM, 51, 52.
[66]
Moreau, L., Clifford, B., Freire, J., Futrelle, J., Gil Y., Groth, P., Kwasnikowska, N., Miles, S., Missier, P., Myers, J., Plale, B., Simmhan, Y., Stephan, E., den Bussche, J.V. (2011). Future Generation Computer Systems, 27(6), 743. http://www.sciencedirect.com/science/article/pii/S0167739X10001275.
[67]
Muniswamy-Reddy, K., Holland, D., Braun, U., Seltzer, M. (2006). In Proceedings of the 2006 USENIX annual technical conference (pp. 43-56).
[68]
Networking, F., Research, I.T., Program, D.N. (2009). (September 2009). http://www.nitrd.gov/pubs/CSIA_ IWG_%Cybersecurity_%20Gamechange_RD_%20Recommendations_20100513.pdf.
[69]
Networking, F., Research, I.T., Program, D.N. (2010). (May 2010). http://www.nitrd.gov/pubs/CSIA_IWG_ %Cybersecurity_%20Gamechange_RD_%20Recommendations_20100513.pdf.
[70]
Nguyen, D., Park, J., Sandhu, R. (2012a). In 4th USENIX workshop on the theory and practice of provenance (USENIX Association), TaPP'12.
[71]
Nguyen, D., Park, J., Sandhu, R. (2012b). In 2012 IEEE international Conference on information reuse and integration (IRI).
[72]
Ni, Q., Xu, S., Bertino, E., Sandhu, R., Han, W. (2009). Secure data management (pp. 68-88).
[73]
Ostrovsky, R., Sahai, A., Waters, B. (2007). In ACM Conference on Computer and Communications Security (pp. 195-203).
[74]
Park, J., Nguyen, D., Sandhu, R. (2011). In 7th international conferenceon collaborative computing: Networking applications and worksharing (CollaborateCom) (pp. 221-230).
[75]
Park, J., Nguyen, D., Sandhu, R. (2012). In 10th annual conference on privacy, security and trust (IEEE), PST 2012.
[76]
Pirretti, M., Traynor, P., McDaniel, P., Waters, B. (2010). Journal of Computer Security, 18(5), 799.
[77]
Perez, J., Arenas, M., Gutierrez, C. (2009). ACM Transactions on Database Systems (TODS), 34(3), 1.
[78]
PrudHommeaux, E., Seaborne, A., et al. (2006). W3C working draft, 4.
[79]
Qian, H., & Xu, S. (2010). Information Processing Letter (accepted in 2010).
[80]
Qian, H., & Xu, S. (2011). In To appear in the Proceedings of First ACM Conference on Data and Application Security and Privacy (ACM CODASPY'11).
[81]
Rachapalli, J., Kantarcioglu, M., Thuraisingham, B. (2012). In 4th USENIX workshop on the theory and practice of provenance (USENIX Association), TaPP'12.
[82]
Sahoo, S., Sheth, A., Henson, C. (2008). IEEE Internet Computing, 12(4), 46.
[83]
Samarati, P., & Sweeney, L. (1998). In Proceedings of principles of database systems (p. 188).
[84]
Simmhan, Y.L., Plale, B., Gannon, D. (2005). SIGMOD Record, 34, 31.
[85]
Simmhan, Y.L., Plale, B., Gannon, D. (2006). In IEEE international conference on web services (pp. 18-22).
[86]
Simmhan, Y., Plale, B., Gannon, D. (2008). International Journal Web Service Research, 5(2), 1.
[87]
Stevens, R.D., Robinson, A.J., Goble, C.A. (2003). Bioinformatics Journal, 19(302).
[88]
Sultana, S., & Bertino, E. (2012). In 4th international provenance and annotation workshop.
[89]
Syalim, A., Hori, Y., Sakurai, K. (2009). In Advances in information security and assurance, (pp. 51-59).
[90]
Taylor, N., & Ives, Z. (2006). In SIGMOD'06 (pp. 13-24).
[91]
Tsudik, G., & Xu, S. (2003). In ASIACRYPT (pp. 269-286).
[92]
Vijayakumar, N., & Plale, B. (2006). Provenance and annotation of data. In L. Moreau & I. Foster (Eds.), Lecture notes in computer science (vol. 4145, pp. 46-54). Berlin: Springer. 6.
[93]
Waters, B. (2005). In EUROCRYPT'05 (pp. 114-127).
[94]
Weitzner D.J., Abelson, H., Berners-Lee, T., Feigenbaum, J., Hendler, J., Sussman, G.J. (2008). Communication ACM, 51(82).
[95]
Xu, S., & Yung, M. (2009). First international conference on trusted systems (INTRUST'09). In Lecture notes in computer science (vol. 6163, pp. 104-128).
[96]
Xu, S., Qian, H., Wang, F., Zhan, Z., Bertino, E., Sandhu, R. (2010). In Proceedings of 11th International Conference Web-Age Information Management (WAIM'10) (pp. 398-404).
[97]
Zhang, J., Chapman, A., Lefevre, K. (2009). In Proceedings of the 6th VLDB workshop on secure data management (SDM'09) (pp. 17-32).

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Journal of Intelligent Information Systems
Journal of Intelligent Information Systems  Volume 43, Issue 3
December 2014
124 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 December 2014

Author Tags

  1. Accountability and compliance
  2. Cryptography and access control
  3. Data provenance
  4. Privacy
  5. Risk management
  6. Security
  7. Trustworthy computing

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Data Provenance in Security and PrivacyACM Computing Surveys10.1145/359329455:14s(1-35)Online publication date: 22-Apr-2023
  • (2022)DPXPlainProceedings of the VLDB Endowment10.14778/3561261.356127116:1(113-126)Online publication date: 1-Sep-2022
  • (2022)Visualizing architectural evolution via provenance trackingProceedings of the Conference on Research in Adaptive and Convergent Systems10.1145/3538641.3561493(83-91)Online publication date: 3-Oct-2022
  • (2022)ProvNetJournal of Parallel and Distributed Computing10.1016/j.jpdc.2022.04.003166:C(32-44)Online publication date: 1-Aug-2022
  • (2021)On Optimizing the Trade-off between Privacy and Utility in Data ProvenanceProceedings of the 2021 International Conference on Management of Data10.1145/3448016.3452835(379-391)Online publication date: 9-Jun-2021
  • (2021)Secure Data Provenance in Internet of Things using Hybrid Attribute based Crypt TechniqueWireless Personal Communications: An International Journal10.1007/s11277-021-08157-0118:4(2821-2842)Online publication date: 1-Jun-2021
  • (2021)Trust Based Approach and Risk Management for IT Systems in Cloud Service SelectionWireless Personal Communications: An International Journal10.1007/s11277-020-07796-z117:4(3109-3127)Online publication date: 1-Apr-2021
  • (2017)Privacy-preserving network provenanceProceedings of the VLDB Endowment10.14778/3137628.313766110:11(1550-1561)Online publication date: 1-Aug-2017
  • (2017)A Cyber-Provenance Infrastructure for Sensor-Based Data-Intensive Applications2017 IEEE International Conference on Information Reuse and Integration (IRI)10.1109/IRI.2017.91(108-114)Online publication date: 4-Aug-2017
  • (2017)A survey on provenanceThe VLDB Journal — The International Journal on Very Large Data Bases10.1007/s00778-017-0486-126:6(881-906)Online publication date: 1-Dec-2017
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media