Skip to main content

Assuring Data Trustworthiness - Concepts and Research Challenges

  • Conference paper
Book cover Secure Data Management (SDM 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6358))

Included in the following conference series:

Abstract

Today, more than ever, there is a critical need to share data within and across organizations so that analysts and decision makers can analyze and mine the data, and make effective decisions. However, in order for analysts and decision makers to produce accurate analysis and make effective decisions and take actions, data must be trustworthy. Therefore, it is critical that data trustworthiness issues, which also include data quality, provenance and lineage, be investigated for organizational data sharing, situation assessment, multi-sensor data integration and numerous other functions to support decision makers and analysts. The problem of providing trustworthy data to users is an inherently difficult problem that requires articulated solutions combining different methods and techniques. In the paper we first elaborate on the data trustworthiness challenge and discuss a framework to address this challenge. We then present an initial approach for assess the trustworthiness of streaming data and discuss open research directions.

The authors have been partially supported by AFOSR grant FA9550-07-1-0041 “Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control Applications”.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abiteboul, S., Kanellakis, P., Grahne, G.: On the Representation and Querying of Sets of Possible Words. SIGMOD Record 16(3), 34–48 (1987)

    Article  Google Scholar 

  2. Barbara, D., Garcia-Molina, H., Porter, D.: The Management of Probabilistic Data. IEEE Trans. on Knowledge and Data Engineering 4(5), 487–502 (1992)

    Article  Google Scholar 

  3. Bertino, E., Dai, C., Lim, H.-S., Lin, D.: High-Assurance Integrity Techniques for Databases. In: Proc. of the 25th British Nat’l Conf. on Databases, Cardiff, UK, pp. 244–256 (July 2008)

    Google Scholar 

  4. Biba, K.J.: Integrity Considerations for Secure Computer Systems. Technical Report TR-3153, Mitre (1977)

    Google Scholar 

  5. Blount, M., et al.: Century: Automated Aspects of Patient Care. In: Proc. 13th IEEE Int’l. Conf. on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), Daegu, Korea, pp. 504–509 (August 2007)

    Google Scholar 

  6. Clark, D., Wilson, D.: A Comparison of Commercial and Military computer Security Policies. In: Proc. of IEEE Symposium on Security and Privacy (1987)

    Google Scholar 

  7. David, Y., Erich, N., Jim, K., Prashant, S.: Data Quality and Query Cost in Wireless Sensor Networks. In: Proc. of the 5th IEEE Int’l Conf. on Pervasive Computing and Communications Workshops, White Plains, New York, USA, pp. 272–278 (March 2007)

    Google Scholar 

  8. Dai, C., et al.: Query Processing Techniques for Compliance with Data Confidence Policies. In: Proc. of the 6th VLDB Workshop on Secure Data Management, Lyon, France, pp. 49–67 (2009)

    Google Scholar 

  9. Dai, C., Lim, H.-S., Bertino, E., Moon, Y.-S.: Assessing the Trustworthiness of Location Data Based on Provenance. In: Proc. of the 17th ACM SIGSPATIAL Int’l Symposium on Advances in Geographic Information Systems, Seattle, USA, pp. 276–285 (November 2009)

    Google Scholar 

  10. Eckerson, W.: Data Warehousing Special Report: Data quality and the bottom line, http://www.adtmag.com/article.aspx?id=6321

  11. Fernandez, J., Fernandez, A.: SCADA systems: vulnerabilities and remediation. Journal of Computing Sciences in Colleges 20(4), 160–168 (2005)

    Google Scholar 

  12. Fuhr, N.: A Probabilistic Framework for Vague Queries and Imprecise Information in Databases. In: Proc. of the 16th Int’l. Conf. on Very Large Data Bases, Brisbane, Australia, pp. 696–707 (August 1997)

    Google Scholar 

  13. Garey, M.R., Johnson, D.S.: Computers and Intractability, A Guide to the Theory of NP-Completeness (1990)

    Google Scholar 

  14. Hwang, S.-Y., Liu, P.-Y., Lee, C.-H.: Using Resampling for Optimizing Continuous Queries in Wireless Sensor Networks. In: Proc. of the 8th Int’l. Conf. on Intelligent Systems Design and Applications, Kaohsiung, Taiwan, pp. 107–110 (November 2008)

    Google Scholar 

  15. Jackson, M.O.: Social and Economics Networks. Princeton University Press, Princeton (2008)

    Google Scholar 

  16. Juran, J.M.: Juran on Leadership for Quality - an Executive Handbook. Free Press (1989)

    Google Scholar 

  17. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proc. of Twelfth Int’l. World Wide Web Conf., New York, USA, pp. 640–651 (2003)

    Google Scholar 

  18. Lim, H.-S., Moon, Y.-S., Bertino, E.: Assessing the Trustworthiness of Streaming Data. Technical Report TR 2010-09, CERIAS (2010)

    Google Scholar 

  19. Mella, G., Ferrari, E., Bertino, E., Koglin, Y.: Controlled and Cooperative Updates of XML Documents in Byzantine and Failure-prone Distributed Systems. ACM Transactions on Information and System Security 9, 421–460 (2006)

    Article  Google Scholar 

  20. Misra, A., Blount, M., Kementsietsidis, A., Sow, D.M., Wang, M.: Advances and Challenges for Scalable Provenance in Stream Processing Systems. In: Freire, J., Koop, D., Moreau, L. (eds.) IPAW 2008. LNCS, vol. 5272, pp. 253–265. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  21. Olston, C., Jiang, J., Widom, J.: Adaptive Filters for Continuous Queries over Distributed Data Streams. In: Proc. Int’l. Conf. on Management of Data, pp. 563–574. ACM SIGMOD, San Diego (June 2003)

    Google Scholar 

  22. Price, R., Shanks, G.: A Semiotic Information Quality Framework. In: Proc. IFIP International Conference on Decision Support Systems (DSS 2004), Prato, Italy (2004)

    Google Scholar 

  23. Sarma, A.D., Benjelloun, O., Halevy, A., Widom, J.: Working Models for Uncertain Data. In: Proc. of the 22nd Int’l. Conf. on Data Engineering, Atlanta, USA, p. 7 (April 2006)

    Google Scholar 

  24. Sarma, A.D., Theobald, M., Widom, J.: Exploiting Lineage for Confidence Computation in Uncertain and Probabilistic Databases. In: Proc. of the 24th Int’l. Conf. on Data Engineering, Cancun, Mexico, pp. 1023–1032 (April 2008)

    Google Scholar 

  25. Vijayakumar, N., Plale, B.: Towards Low Overhead Provenance Tracking in Near Real-Time Stream Filtering. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 46–54. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  26. Wand, Y., Wang, R.: Anchoring Data Quality Dimensions in Ontological Foundations. Communications of the ACM 39(11), 86–95 (1996)

    Article  Google Scholar 

  27. Widom, J.: Trio: A System for Integrated Management of Data, Accuracy, and Lineage. In: Proc. of the 2nd Biennial Conf. on Innovative Data Systems Research, Asilomar, USA, pp. 262–276 (January 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bertino, E., Lim, HS. (2010). Assuring Data Trustworthiness - Concepts and Research Challenges. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2010. Lecture Notes in Computer Science, vol 6358. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15546-8_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15546-8_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15545-1

  • Online ISBN: 978-3-642-15546-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics