A survey of provenance in scientific workflow

被引:0
作者
Lin, Songhai [1 ]
Xiao, Hong [1 ]
Jiang, Wenchao [1 ]
Li, Dafeng [2 ]
Liang, Jiaben [3 ]
Li, Zelin [1 ]
机构
[1] Guangdong Univ Technol, Sch Comp Sci & Technol, Guangzhou 510520, Guangdong, Peoples R China
[2] Guangdong Acad Forestry, Guangzhou 510520, Guangdong, Peoples R China
[3] Guangdong ZhongQingWei Sci Res Partnership, Guangzhou 510520, Guangdong, Peoples R China
关键词
Provenance; scientific workflows; provenance model; blockchain; MANAGEMENT; SYSTEMS; DESIGN; TOOL;
D O I
10.3233/JHS-222017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The automation of data analysis in the form of scientific workflows has become a widely adopted practice in many fields of research. Data-intensive experiments using workflows enabled automation and provenance support, which contribute to alleviating the reproducibility crisis. This paper investigates the existing provenance models as well as scientific workflow applications. Furthermore, here we not only summarize the models at different levels, but also compare the applications, particularly the blockchain applied to the provenance in scientific workflows. After that, a new design of secure provenance system is proposed. Provenance that would be enabled by the emerging technology is also discussed at the end.
引用
收藏
页码:129 / 145
页数:17
相关论文
共 96 条
[1]  
[Anonymous], 2003, INT C DUBLIN CORE ME
[2]  
Baker M, 2016, NATURE, V533, P452, DOI 10.1038/533452a
[3]  
Bates A, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P319
[4]   VisTrails: Enabling interactive multiple-view visualizations [J].
Bavoil, L ;
Callahan, SP ;
Crossno, PJ ;
Freire, J ;
Scheidegger, CE ;
Silva, CT ;
Vo, HT .
IEEE VISUALIZATION 2005, PROCEEDINGS, 2005, :135-142
[5]  
Benabdelkader A., 2015, PEERJ
[6]   TRIGGER DETECTION FOR ADAPTIVE SCIENTIFIC WORKFLOWS USING PERCENTILE SAMPLING [J].
Bennettt, Janine C. ;
Bhagatwala, Ankit ;
Chen, Jacqueline H. ;
Pinar, Ali ;
Salloum, Maher ;
Seshadhri, C. .
SIAM JOURNAL ON SCIENTIFIC COMPUTING, 2016, 38 (05) :S240-S263
[7]  
Bhagwat D., 2004, ANNOTATION MANAGEMEN
[8]  
Bowers S., 2008, KEPLER PPOD SCI WORK
[9]  
Braun U., 2008, USENIX SECURITY S
[10]  
Braun Uri., 2008, 3 USENIX WORKSHOP HO