Security and Data Accountability in Distributed Systems: A Provenance Survey

被引:24
作者
Tan, Yu Shyang [1 ]
Ko, Ryan K. L. [1 ]
Holmes, Geoff [1 ]
机构
[1] Univ Waikato, Cyber Secur Lab, Dept Comp Sci, Hamilton, New Zealand
来源
2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC) | 2013年
关键词
Provenance; Security; Data Accountability; Distributed Systems; Cloud Computing; SCIENTIFIC-DATA;
D O I
10.1109/HPCC.and.EUC.2013.221
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While provenance research is common in distributed systems, many proposed solutions do not address the security of systems and accountability of data stored in those systems. In this paper, we survey provenance solutions which were proposed to address the problems of system security and data accountability in distributed systems. From our survey, we derive a set of minimum requirements that are necessary for a provenance system to be effective in addressing the two problems. Finally, we identify several gaps in the surveyed solutions and present them as challenges that future provenance researchers should tackle. We argue that these gaps have to be addressed before a complete and fool-proof provenance solution can be arrived at in the future.
引用
收藏
页码:1571 / 1578
页数:8
相关论文
共 55 条
[1]  
Alpdemir M. N., 2005, LECT NOTES COMPUTER
[2]  
[Anonymous], P 8 INT C DAT THEOR
[3]  
[Anonymous], 2010, P 5 ACM S INF COMP C
[4]  
[Anonymous], 2006, P 3 S NETW SYST DES
[5]  
[Anonymous], P 24 ACM SIGPLAN C C
[6]  
Becker R. A., 1986, P 3 INT WORKSH STAT
[7]  
Biton O., 2008, P 2008 IEEE 24 INT C
[8]   Lineage retrieval for scientific data processing: A survey [J].
Bose, R ;
Frew, J .
ACM COMPUTING SURVEYS, 2005, 37 (01) :1-28
[9]  
Boyen X., 2007, P 10 INT C PRACT THE
[10]  
Braun U., 2006, TR0406 HARV U COMP S