A survey of provenance in scientific workflow

被引:0
作者
Lin, Songhai [1 ]
Xiao, Hong [1 ]
Jiang, Wenchao [1 ]
Li, Dafeng [2 ]
Liang, Jiaben [3 ]
Li, Zelin [1 ]
机构
[1] Guangdong Univ Technol, Sch Comp Sci & Technol, Guangzhou 510520, Guangdong, Peoples R China
[2] Guangdong Acad Forestry, Guangzhou 510520, Guangdong, Peoples R China
[3] Guangdong ZhongQingWei Sci Res Partnership, Guangzhou 510520, Guangdong, Peoples R China
关键词
Provenance; scientific workflows; provenance model; blockchain; MANAGEMENT; SYSTEMS; DESIGN; TOOL;
D O I
10.3233/JHS-222017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The automation of data analysis in the form of scientific workflows has become a widely adopted practice in many fields of research. Data-intensive experiments using workflows enabled automation and provenance support, which contribute to alleviating the reproducibility crisis. This paper investigates the existing provenance models as well as scientific workflow applications. Furthermore, here we not only summarize the models at different levels, but also compare the applications, particularly the blockchain applied to the provenance in scientific workflows. After that, a new design of secure provenance system is proposed. Provenance that would be enabled by the emerging technology is also discussed at the end.
引用
收藏
页码:129 / 145
页数:17
相关论文
共 96 条
[51]  
Kranjc Janez, 2012, Machine Learning and Knowledge Discovery in Databases. Proceedings of the European Conference (ECML PKDD 2012), P816, DOI 10.1007/978-3-642-33486-3_54
[52]  
Kumar K.P., 2019, INT C DATA SCI
[53]   Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators [J].
Li, Jin ;
Ye, Heng ;
Li, Tong ;
Wang, Wei ;
Lou, Wenjing ;
Hou, Y. Thomas ;
Liu, Jiqiang ;
Lu, Rongxing .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) :67-76
[54]   Searchable Symmetric Encryption with Forward Search Privacy [J].
Li, Jin ;
Huang, Yanyu ;
Wei, Yu ;
Lv, Siyi ;
Liu, Zheli ;
Dong, Changyu ;
Lou, Wenjing .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) :460-474
[55]   ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability [J].
Liang, Xueping ;
Shetty, Sachin ;
Tosh, Deepak ;
Kamhoua, Charles ;
Kwiat, Kevin ;
Njilla, Laurent .
2017 17TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2017, :468-477
[56]   Towards Eidetic Blockchain Systems with Enhanced Provenance [J].
Linoy, Shlomi ;
Ray, Suprio ;
Stakhanova, Natalia .
2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDEW 2020), 2020, :7-10
[57]   A Survey of Data-Intensive Scientific Workflow Management [J].
Liu, Ji ;
Pacitti, Esther ;
Valduriez, Patrick ;
Mattoso, Marta .
JOURNAL OF GRID COMPUTING, 2015, 13 (04) :457-493
[58]   A Survey of Modern Scientific Workflow Scheduling Algorithms and Systems in the Era of Big Data [J].
Liu, Junwen ;
Lu, Shiyong ;
Che, Dunren .
2020 IEEE 13TH INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2020), 2020, :132-141
[59]  
Luc Moreau P.M., 2013, PROV DM PROV DATA MO
[60]  
Martinho R, 2006, ICEIS 2006: PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, P181