Preventing history forgery with secure provenance

被引:58
作者
Hasan, Ragib [1 ]
Sion, Radu [2 ]
Winslett, Marianne [1 ]
机构
[1] Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL 61801
[2] Department of Computer Science, Stony Brook University, Stony Brook
关键词
Audit; Confidentiality; Integrity; Lineage; Provenance; Security;
D O I
10.1145/1629080.1629082
中图分类号
学科分类号
摘要
As increasing amounts of valuable information are produced and persist digitally, the ability to determine the origin of data becomes important. In science, medicine, commerce, and government, data provenance tracking is essential for rights protection, regulatory compliance, management of intelligence and medical data, and authentication of information as it flows through workplace tasks. While significant research has been conducted in this area, the associated security and privacy issues have not been explored, leaving provenance information vulnerable to illicit alteration as it passes through untrusted environments. In this article, we show how to provide strong integrity and confidentiality assurances for data provenance information at the kernel, file system, or application layer. We describe Sprov, our provenance-aware system prototype that implements provenance tracking of data writes at the application layer, which makes Sprov extremely easy to deploy. We present empirical results that show that, for real-life workloads, the runtime overhead of Sprov for recording provenance with confidentiality and integrity guarantees ranges from 1% to 13%, when all file modifications are recorded, and from 12% to 16%, when all file read and modifications are tracked. © 2009 ACM.
引用
收藏
相关论文
共 57 条
[1]  
Agrawal N., Bolosky W.J., Douceur J.R., Lorch J.R., A five-year study of file-system metadata, Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST), (2007)
[2]  
Aldeco-Perez R., Moreau L., Provenance-based auditing of private data use, Proceedings of the BCS International Academic Research Conference, Visions of Computer Science, (2008)
[3]  
Barga R.S., Digiampietri L.A., Automatic generation of workflow provenance, Lecture Notes in Computer Science, 4145, pp. 1-9, (2006)
[4]  
Berliner B., CVS II: Parallelizing software development, Proceedings of the Winter USENIX Conference, pp. 341-352, (1990)
[5]  
Blum M., Coin flipping by telephone, Proceedings of the International Cryptology Conference (CRYPTO), pp. 11-15, (1981)
[6]  
Braun U., Garfinkel S.L., Holland D.A., Muniswamy-Reddy K.-K., Seltzer M.I., Issues in automatic provenance collection, Lecture Notes in Computer Science, 4145, pp. 171-183, (2006)
[7]  
Braun U., Shinnar A., Seltzer M., Securing provenance, Proceedings of the 3rd USENIX Workshop on Hot Topics in Security (USENIX HotSec), (2008)
[8]  
Buneman P., Chapman A., Cheney J., Provenance management in curated databases, Proceedings of the ACM International Conference on Management of Data (SIGMOD), pp. 539-550, (2006)
[9]  
Buneman P., Chapman A., Cheney J., Vansummeren S., A provenance model for manually curated data, Lecture Notes in Computer Science, 4145, pp. 162-170, (2006)
[10]  
Buneman P., Khanna S., Tan W.C., Data provenance: Some basic issues, Proceedings of the 20th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS), pp. 87-93, (2000)