A Security Framework for Scientific Workflow Provenance Access Control Policies

被引:4
作者
Bhuyan, Fahima Amin [1 ]
Lu, Shiyong [1 ]
Reynolds, Robert [1 ]
Zhang, Jia [2 ]
Ahmed, Ishtiaq [1 ]
机构
[1] Wayne State Univ, Dept Comp Sci, Detroit, MI 48202 USA
[2] Carnegie Melon Univ Silicon Valley, Dept Comp Sci, Mountain View, CA 94035 USA
基金
美国国家科学基金会;
关键词
Provenance; access control policy; policy quality; security view of provenance;
D O I
10.1109/TSC.2019.2921586
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of collaborative scientific workflow is coined to address the increasing need for collaborative data analytics. In collaborative environments, access control policies are necessary for controlling the sharing of workflows, data products, and provenance information among collaborating parties. In particular, the protection of workflow provenance is critical because it often encodes the detailed protocol of a scientific experiment and carries the intellectual property of the respective stakeholders. In addition, since scientific workflows often evolve quickly, the corresponding access control policies for workflow provenance have to evolve as well. It is important to ensure that the evolution of workflow provenance access control policies maintain certain properties, in order to guarantee the correctness and performance of the corresponding policy enforcement. In this paper, we 1) propose a role-based access control model for scientific workflow provenance; 2) define three quality requirements for scientific workflow provenance access control policies - consistency, completeness, and conciseness; 3) develop a mechanism mapping from specifications of workflows to their counterparts in a provenance that preserves such quality properties, and 4) conduct a case study on a scientific workflow for autism behavioral data analysis that demonstrates the feasibility of our proposed analysis algorithms.
引用
收藏
页码:97 / 109
页数:13
相关论文
共 61 条
  • [1] Diagnosis Recommendation Using Machine Learning Scientific Workflows
    Ahmed, Ishtiaq
    Lu, Shiyong
    Bai, Changxin
    Bhuyan, Fahima Amin
    [J]. 2018 IEEE INTERNATIONAL CONGRESS ON BIG DATA (IEEE BIGDATA CONGRESS), 2018, : 82 - 90
  • [2] Ahn Gail-Joon., 2000, RBAC 00, P1
  • [3] Aldeco-Pérez R, 2010, LECT NOTES COMPUT SC, V6378, P148, DOI 10.1007/978-3-642-17819-1_18
  • [4] Asghar MR, 2012, LECT NOTES COMPUT SC, V7039, P145
  • [5] Atluri V., 1996, Computer Security-ESORICS 96. 4th European Symposium on Research in Computer Security Proceedings, P44
  • [6] Atluri Vijayalakshmi., 2007, HDB DATABASE SECURIT, P213
  • [7] Bates Adam., 2015, P 7 USENIX C THEORY, P7
  • [8] Bertino E., 1999, ACM Trans. Inf. Syst. Secur., V2, P65, DOI 10.1145/300830.300837
  • [9] Provenance-based Analytics Services for Access Control Policies
    Bertino, Elisa
    Abu Jabal, Amani
    Calo, Seraphin
    Makaya, Christian
    Touma, Maroun
    Verma, Dinesh
    Williams, Christopher
    [J]. 2017 13TH IEEE WORLD CONGRESS ON SERVICES (SERVICES), 2017, : 94 - 101
  • [10] Bhuyan F, 2017, IEEE INT CONF BIG DA, P3847, DOI 10.1109/BigData.2017.8258388