Abstract
Today, more than ever, there is a critical need to share data within and across organizations so that analysts and decision makers can analyze and mine the data, and make effective decisions. However, in order for analysts and decision makers to produce accurate analysis and make effective decisions and take actions, data must be trustworthy. Therefore, it is critical that data trustworthiness issues, which also include data quality, provenance and lineage, be investigated for organizational data sharing, situation assessment, multi-sensor data integration and numerous other functions to support decision makers and analysts. The problem of providing trustworthy data to users is an inherently difficult problem that requires articulated solutions combining different methods and techniques. In the paper we first elaborate on the data trustworthiness challenge and discuss a framework to address this challenge. We then present an initial approach for assess the trustworthiness of streaming data and discuss open research directions.
The authors have been partially supported by AFOSR grant FA9550-07-1-0041 “Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control Applications”.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abiteboul, S., Kanellakis, P., Grahne, G.: On the Representation and Querying of Sets of Possible Words. SIGMOD Record 16(3), 34–48 (1987)
Barbara, D., Garcia-Molina, H., Porter, D.: The Management of Probabilistic Data. IEEE Trans. on Knowledge and Data Engineering 4(5), 487–502 (1992)
Bertino, E., Dai, C., Lim, H.-S., Lin, D.: High-Assurance Integrity Techniques for Databases. In: Proc. of the 25th British Nat’l Conf. on Databases, Cardiff, UK, pp. 244–256 (July 2008)
Biba, K.J.: Integrity Considerations for Secure Computer Systems. Technical Report TR-3153, Mitre (1977)
Blount, M., et al.: Century: Automated Aspects of Patient Care. In: Proc. 13th IEEE Int’l. Conf. on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), Daegu, Korea, pp. 504–509 (August 2007)
Clark, D., Wilson, D.: A Comparison of Commercial and Military computer Security Policies. In: Proc. of IEEE Symposium on Security and Privacy (1987)
David, Y., Erich, N., Jim, K., Prashant, S.: Data Quality and Query Cost in Wireless Sensor Networks. In: Proc. of the 5th IEEE Int’l Conf. on Pervasive Computing and Communications Workshops, White Plains, New York, USA, pp. 272–278 (March 2007)
Dai, C., et al.: Query Processing Techniques for Compliance with Data Confidence Policies. In: Proc. of the 6th VLDB Workshop on Secure Data Management, Lyon, France, pp. 49–67 (2009)
Dai, C., Lim, H.-S., Bertino, E., Moon, Y.-S.: Assessing the Trustworthiness of Location Data Based on Provenance. In: Proc. of the 17th ACM SIGSPATIAL Int’l Symposium on Advances in Geographic Information Systems, Seattle, USA, pp. 276–285 (November 2009)
Eckerson, W.: Data Warehousing Special Report: Data quality and the bottom line, http://www.adtmag.com/article.aspx?id=6321
Fernandez, J., Fernandez, A.: SCADA systems: vulnerabilities and remediation. Journal of Computing Sciences in Colleges 20(4), 160–168 (2005)
Fuhr, N.: A Probabilistic Framework for Vague Queries and Imprecise Information in Databases. In: Proc. of the 16th Int’l. Conf. on Very Large Data Bases, Brisbane, Australia, pp. 696–707 (August 1997)
Garey, M.R., Johnson, D.S.: Computers and Intractability, A Guide to the Theory of NP-Completeness (1990)
Hwang, S.-Y., Liu, P.-Y., Lee, C.-H.: Using Resampling for Optimizing Continuous Queries in Wireless Sensor Networks. In: Proc. of the 8th Int’l. Conf. on Intelligent Systems Design and Applications, Kaohsiung, Taiwan, pp. 107–110 (November 2008)
Jackson, M.O.: Social and Economics Networks. Princeton University Press, Princeton (2008)
Juran, J.M.: Juran on Leadership for Quality - an Executive Handbook. Free Press (1989)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proc. of Twelfth Int’l. World Wide Web Conf., New York, USA, pp. 640–651 (2003)
Lim, H.-S., Moon, Y.-S., Bertino, E.: Assessing the Trustworthiness of Streaming Data. Technical Report TR 2010-09, CERIAS (2010)
Mella, G., Ferrari, E., Bertino, E., Koglin, Y.: Controlled and Cooperative Updates of XML Documents in Byzantine and Failure-prone Distributed Systems. ACM Transactions on Information and System Security 9, 421–460 (2006)
Misra, A., Blount, M., Kementsietsidis, A., Sow, D.M., Wang, M.: Advances and Challenges for Scalable Provenance in Stream Processing Systems. In: Freire, J., Koop, D., Moreau, L. (eds.) IPAW 2008. LNCS, vol. 5272, pp. 253–265. Springer, Heidelberg (2008)
Olston, C., Jiang, J., Widom, J.: Adaptive Filters for Continuous Queries over Distributed Data Streams. In: Proc. Int’l. Conf. on Management of Data, pp. 563–574. ACM SIGMOD, San Diego (June 2003)
Price, R., Shanks, G.: A Semiotic Information Quality Framework. In: Proc. IFIP International Conference on Decision Support Systems (DSS 2004), Prato, Italy (2004)
Sarma, A.D., Benjelloun, O., Halevy, A., Widom, J.: Working Models for Uncertain Data. In: Proc. of the 22nd Int’l. Conf. on Data Engineering, Atlanta, USA, p. 7 (April 2006)
Sarma, A.D., Theobald, M., Widom, J.: Exploiting Lineage for Confidence Computation in Uncertain and Probabilistic Databases. In: Proc. of the 24th Int’l. Conf. on Data Engineering, Cancun, Mexico, pp. 1023–1032 (April 2008)
Vijayakumar, N., Plale, B.: Towards Low Overhead Provenance Tracking in Near Real-Time Stream Filtering. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 46–54. Springer, Heidelberg (2006)
Wand, Y., Wang, R.: Anchoring Data Quality Dimensions in Ontological Foundations. Communications of the ACM 39(11), 86–95 (1996)
Widom, J.: Trio: A System for Integrated Management of Data, Accuracy, and Lineage. In: Proc. of the 2nd Biennial Conf. on Innovative Data Systems Research, Asilomar, USA, pp. 262–276 (January 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bertino, E., Lim, HS. (2010). Assuring Data Trustworthiness - Concepts and Research Challenges. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2010. Lecture Notes in Computer Science, vol 6358. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15546-8_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-15546-8_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15545-1
Online ISBN: 978-3-642-15546-8
eBook Packages: Computer ScienceComputer Science (R0)