A Security Framework for Scientific Workflow Provenance Access Control Policies

被引:4
作者
Bhuyan, Fahima Amin [1 ]
Lu, Shiyong [1 ]
Reynolds, Robert [1 ]
Zhang, Jia [2 ]
Ahmed, Ishtiaq [1 ]
机构
[1] Wayne State Univ, Dept Comp Sci, Detroit, MI 48202 USA
[2] Carnegie Melon Univ Silicon Valley, Dept Comp Sci, Mountain View, CA 94035 USA
基金
美国国家科学基金会;
关键词
Provenance; access control policy; policy quality; security view of provenance;
D O I
10.1109/TSC.2019.2921586
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of collaborative scientific workflow is coined to address the increasing need for collaborative data analytics. In collaborative environments, access control policies are necessary for controlling the sharing of workflows, data products, and provenance information among collaborating parties. In particular, the protection of workflow provenance is critical because it often encodes the detailed protocol of a scientific experiment and carries the intellectual property of the respective stakeholders. In addition, since scientific workflows often evolve quickly, the corresponding access control policies for workflow provenance have to evolve as well. It is important to ensure that the evolution of workflow provenance access control policies maintain certain properties, in order to guarantee the correctness and performance of the corresponding policy enforcement. In this paper, we 1) propose a role-based access control model for scientific workflow provenance; 2) define three quality requirements for scientific workflow provenance access control policies - consistency, completeness, and conciseness; 3) develop a mechanism mapping from specifications of workflows to their counterparts in a provenance that preserves such quality properties, and 4) conduct a case study on a scientific workflow for autism behavioral data analysis that demonstrates the feasibility of our proposed analysis algorithms.
引用
收藏
页码:97 / 109
页数:13
相关论文
共 60 条
[31]   Unified authentication factors and fuzzy service access using interaction provenance [J].
Hasan, Ragib ;
Khan, Rasib .
COMPUTERS & SECURITY, 2017, 67 :211-231
[32]  
Herrmann G, 1998, P ANN HICSS, P766, DOI 10.1109/HICSS.1998.649280
[33]  
Huang W., 1999, P 12 INT WORK C DAT, P43
[34]   SecureFlow: A secure web-enabled Workflow Management System [J].
Huang, WK ;
Atluri, V .
FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, :83-94
[35]  
Hung P.C., 2003, Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, V21, P33
[36]  
Jia Zhang, 2013, 2013 IEEE Ninth World Congress on Services (SERVICES), P29, DOI 10.1109/SERVICES.2013.64
[37]  
Jing Jin, 2006, SACMAT 2006. Proceedings of Eleventh ACM Symposium on Access Control Models and Technologies, P200
[38]   Provenance security guarantee from origin up to now in the e-Science environment [J].
Jung, Im Y. ;
Yeom, Heon Y. .
JOURNAL OF SYSTEMS ARCHITECTURE, 2011, 57 (04) :425-440
[39]  
Kandala S, 2002, INT FED INFO PROC, V87, P45
[40]  
Kang M.H., 2001, P 6 ACM S ACC CONTR, P66, DOI [10.1145/373256.373266, DOI 10.1145/373256.373266]