A Big Data Provenance Model for Data Security Supervision Based on PROV-DM Model

被引:26
作者
Gao, Yuanzhao [1 ,2 ]
Chen, Xingyuan [1 ,2 ]
Du, Xuehui [1 ]
机构
[1] Zhengzhou Sci & Technol Inst, Zhengzhou 450000, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
关键词
Big Data; Data models; Data security; Analytical models; Organizations; Solid modeling; Memory; Provenance model; big data; provenance representation; data security supervision;
D O I
10.1109/ACCESS.2020.2975820
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, big data has become a hot research topic. It gives fresh impetus to the economic and social development. However, the huge value of big data also makes it the focus of attacks. Big data security incidents occur frequently in recent years. The security supervision capacities for big data do not match its important role. Data provenance which describes the origins of data and the process by which it arrived the current state, is an effective approach for data supervision. For the full use of provenance in big data supervision, a provenance model which defines the concepts used to represent the provenance types and relations is required to be built in advance, but current provenance models do not adapt to big data scenarios well. In this paper, we comprehensively consider the characteristics of big data and the requirements of data security supervision, extend the widely used provenance model PROV-DM by subtyping and new relation definition, and propose a big data provenance model (BDPM) for data supervision. BDPM model supports the provenance representation of various data types and diverse data processing modes to represent the entire data transformation process through different components in the big data system, and defines new relations to enrich provenance analysis functions. Based on BDPM model, we introduce the constraints that should be satisfied in the construction of valid provenance graph and present the data security supervision methods via provenance graph analysis. Finally, we evaluated the satisfiability of BDPM model through a case study.
引用
收藏
页码:38742 / 38752
页数:11
相关论文
共 40 条
[1]  
Alabi O., 2015, Proceedings of the 2015 Workshop on Changing Landscapes in HPC Security, P9, DOI [10.1145/2752499.2752502, DOI 10.1145/2752499.2752502]
[2]  
[Anonymous], [No title captured]
[3]  
[Anonymous], [No title captured]
[4]  
[Anonymous], [No title captured]
[5]  
[Anonymous], [No title captured]
[6]  
[Anonymous], [No title captured]
[7]  
[Anonymous], 2011, 1142 IDC
[8]  
[Anonymous], [No title captured]
[9]  
[Anonymous], [No title captured]
[10]  
Barros M., 2019, 2019 14 IB C INF SYS, P1