Inferring User Actions from Provenance Logs

  title={Inferring User Actions from Provenance Logs},
  author={Xin Li and Chaitanya Joshi and Yu Shyang Tan and R. Ko},
  journal={2015 IEEE Trustcom/BigDataSE/ISPA},
  • Xin Li, Chaitanya Joshi, +1 author R. Ko
  • Published 2015
  • Computer Science
  • 2015 IEEE Trustcom/BigDataSE/ISPA
Progger, a kernel-spaced cloud data provenance logger which provides fine-grained data activity records, was recently developed to empower cloud stakeholders to trace data life cycles within and across clouds. Progger logs have the potential to allow analysts to infer user actions and create a data-centric behaviour history in a cloud computing environment. However, the Progger logs are complex and noisy and therefore, currently this potential can not be met. This paper proposes a statistical… Expand
Data Leakage Detection Using System Call Provenance


Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking
  • R. Ko, M. Will
  • Computer Science
  • 2014 IEEE 7th International Conference on Cloud Computing
  • 2014
Characterizing users’ visual analytic activity for insight provenance
  • D. Gotz, M. Zhou
  • Computer Science
  • 2008 IEEE Symposium on Visual Analytics Science and Technology
  • 2008
S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance
A Framework for Fine-grained Data Integration and Curation, with Provenance, in a Dataspace
Temporal representation for scientific data provenance
BURRITO: Wrapping Your Lab Notebook in Computational Infrastructure
Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments
The WEKA data mining software: an update
Applying data mining techniques for descriptive phrase extraction in digital document collections
Prediction of User's Web-Browsing Behavior: Application of Markov Model
  • M. Awad, Issa M. Khalil
  • Computer Science, Medicine
  • IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)
  • 2012