Security and Data Accountability in Distributed Systems: A Provenance Survey

@article{Tan2013SecurityAD,
  title={Security and Data Accountability in Distributed Systems: A Provenance Survey},
  author={Y. Tan and R. Ko and G. Holmes},
  journal={2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing},
  year={2013},
  pages={1571-1578}
}
  • Y. Tan, R. Ko, G. Holmes
  • Published 2013
  • Computer Science
  • 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing
While provenance research is common in distributed systems, many proposed solutions do not address the security of systems and accountability of data stored in those systems. In this paper, we survey provenance solutions which were proposed to address the problems of system security and data accountability in distributed systems. From our survey, we derive a set of minimum requirements that are necessary for a provenance system to be effective in addressing the two problems. Finally, we… Expand
40 Citations
Towards Secure Provenance in the Cloud: A Survey
  • B. Lee, Abir Awad, Mirna Awad
  • Computer Science
  • 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)
  • 2015
  • 14
Provenance for cloud data accountability
Decision Provenance: Capturing data flow for accountable systems
  • 6
A Forensic Enabled Data Provenance Model for Public Cloud
  • 3
  • PDF
Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes
  • 44
Workload based provenance capture reduction
  • PDF
Provenance Research Issues and Challenges in the Big Data Era
  • A. Cuzzocrea
  • Computer Science, History
  • 2015 IEEE 39th Annual Computer Software and Applications Conference
  • 2015
  • 10
Language-integrated provenance
  • 13
  • PDF
Trusted Tamper-Evident Data Provenance
  • 6
Trusted Tamper-Evident Data Provenance
  • 3
...
1
2
3
4
...

References

SHOWING 1-10 OF 68 REFERENCES
Kairos: An Architecture for Securing Authorship and Temporal Information of Provenance Data in Grid-Enabled Workflow Management Systems
  • 28
TAP: Time-aware Provenance for Distributed Systems
  • 17
  • PDF
How to Track Your Data: The Case for Cloud Computing Provenance
  • 64
  • PDF
A Security Model for Provenance
  • 34
  • PDF
Scientific Workflow Provenance Querying with Security Views
  • 49
Secure Scientific Workflow Provenance Querying with Security Views
  • 12
  • PDF
Provenance-Aware Storage Systems
  • 612
  • Highly Influential
  • PDF
Trusted Computing and Provenance: Better Together
  • 66
  • PDF
Research Problems in Data Provenance
  • W. Tan
  • Computer Science
  • IEEE Data Eng. Bull.
  • 2004
  • 87
  • PDF
A Formal Model of Provenance in Distributed Systems
  • 39
  • PDF
...
1
2
3
4
5
...