UVisP: User-centric Visualization of Data Provenance with Gestalt Principles

  title={UVisP: User-centric Visualization of Data Provenance with Gestalt Principles},
  author={Jeffery Garae and Ryan Kok Leong Ko and Sivadon Chaisiri},
  journal={2016 IEEE Trustcom/BigDataSE/ISPA},
The need to understand and track files (and inherently, data) in cloud computing systems is in high demand. Over the past years, the use of logs and data representation using graphs have become the main method for tracking and relating information to the cloud users. While being used, tracking related information with 'data provenance' (i.e. series of chronicles and the derivation history of data on metadata) is the new trend for cloud users. However, there is still much room for improving data… 

Visualization and Data Provenance Trends in Decision Support for Cybersecurity

This chapter introduces the SCeeL-VisT Standard, the Security Visualization Effectiveness Measurement Theory, and highlights growing trends of using data provenance methodologies and security visualization methods to aid data analytics and decision support for cyber security.

Visualizing the New Zealand Cyber Security Challenge for Attack Behaviors

User-centric features with the theoretical concept of Data Provenance as a Security Visualization Service (DPaaSVS) reused to display attacks commencing at the reconnaissance stage through to compromising a defending team machine and exploiting the systems are presented.

Returning Control of Data to Users with a Personal Information Crunch - A Position Paper

This paper presents alternatives to vendors having all of a users personal information and raises many concerns about the current state of play, including a simple model where personal information is stored on the users mobile device, and requested by vendors when needed.

Guidelines for cybersecurity visualization design

This work surveys human factors concepts and principles that have been applied in the past decade of human factors research and provides guidelines to help cybersecurity visualization designers address some human factors challenges in the context of interface design.

Better state pictures facilitating state machine characteristic conjecture

This work reports on a core part of a formal verification case study in which the new state picture design and the SMGA tool largely contributed to the successful completion of the formal proof that MCS protocol enjoys the mutual exclusion property.



Visualization of network data provenance

Visualization facilitates the understanding of scientific data both through exploration and explanation of the visualized data. Provenance also contributes to the understanding of data by containing

A survey of data provenance techniques

The main aspect of the taxonomy categorizes provenance systems based on why they record provenance, what they describe, how they represent and storeprovenance, and ways to disseminate it can help those building scientific and business metadata-management systems to understand existing provenance system designs.

A survey of data provenance in e-science

The main aspect of the taxonomy categorizes provenance systems based on why they record provenance, what they describe, how they represent and storeprovenance, and ways to disseminate it.

Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking

  • R. KoM. Will
  • Computer Science
    2014 IEEE 7th International Conference on Cloud Computing
  • 2014
Progger (Provenance Logger), a kernel-space logger which potentially empowers all cloud stakeholders to trace their data, is presented, which provides high assurance of data security and data activity audit.

Data Provenance: Some Basic Issues

The term data provenance is used to refer to the process of tracing and recording the origins of data and its movement between databases.

Provenance: a future history

It is posited that provenance will play a central role in emerging advanced digital infrastructures and hard open research problems involving provenance semantics, formal modeling, and security are identified.

A user-centered look at glyph-based security visualization

The intrusion detection toolkit (IDtk), an information visualization tool for intrusion detection (ID), was developed through a user-centered design process, in which design guidelines to support ID users were identified and the findings of the user evaluation are reported.

The Craft of Information Visualization: Readings and Reflections

This book collects 38 of the key papers on information visualization from a leading and prominent research lab, the University of Maryland's Human-Computer Interaction Lab (HCIL), and provides an "insider" view to the scientific process and evolution of innovation as told by the researchers themselves.

Security Issues in a SOA-Based Provenance System

The security considerations pertaining to a Service Oriented Architecture based provenance system are discussed and possible approaches to address them are outlined.

Recursive pattern: a technique for visualizing very large amounts of data

This paper proposes a new visualization technique called a 'recursive pattern', which has been developed for visualizing large amounts of multidimensional data, based on a generic recursive scheme which generalizes a wide range of pixel-oriented arrangements for displaying large data sets.