Back to Search
Start Over
A Roadmap for Privacy-Enhanced Secure Data Provenance
- Source :
- Cyber Center Publications
- Publication Year :
- 2014
- Publisher :
- Purdue University, 2014.
-
Abstract
- The notion of data provenance was formally introduced a decade ago and has since been investigated, but mainly from a functional perspective, which follows the historical pattern of introducing new technologies with the expectation that security and privacy can be added later. Despite very recent interests from the cyber security community on some specific aspects of data provenance, there is no long-haul, overarching, systematic framework for the security and privacy of provenance. The importance of secure provenance R&D has been emphasized in the recent report on Federal game-changing R&D for cyber security especially with respect to the theme of Tailored Trustworthy Spaces. Secure data provenance can significantly enhance data trustworthiness, which is crucial to various decision-making processes. Moreover, data provenance can facilitate accountability and compliance (including compliance with privacy preferences and policies of relevant users), can be an important factor in access control and usage control decisions, and can be valuable in data forensics. Along with these potential benefits, data provenance also poses a number of security and privacy challenges. For example, sometimes provenance needs to be confidential so it is visible only to properly authorized users, and we also need to protect the identity of entities in the provenance from exposure. We thus need to achieve high assurance of provenance without comprising privacy of those in the chain that produced the data. Moreover, if we expect voluntary large-scale participation in provenance-aware applications, we must assure that the privacy of the individuals or organizations involved will be maintained. It is incumbent on the cyber security community to develop a technical and scientific framework to address the security and privacy challenges so that our society can gain maximum benefit from this technology. In this paper, we discuss a framework of theoretical foundations, models, mechanisms and architectures that allow applications to benefit from privacy-enhanced and secure use of provenance in a modular fashion. After introducing the main components of such a framework and the notion of provenance life cycle, we discuss in details research questions and issues concerning each such component and related approaches.
- Subjects :
- Information privacy
Computer Networks and Communications
Computer science
business.industry
Emerging technologies
Internet privacy
Data provenance · Security · Privacy · Trustworthy computing · Cryptography and access control · Risk management · Accountability and compliance
Life Sciences
Access control
Computer security
computer.software_genre
Trustworthy computing
Engineering
Artificial Intelligence
Hardware and Architecture
Component (UML)
Accountability
Medicine and Health Sciences
Physical Sciences and Mathematics
Confidentiality
business
computer
Software
Risk management
Information Systems
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- Cyber Center Publications
- Accession number :
- edsair.doi.dedup.....62b29f9ee1c60b0868013e8fa7aae208
- Full Text :
- https://doi.org/10.1007/s10844-014-0322-7