An Approach to Evaluate Data Trustworthiness Based on Data Provenance
Today, with the advances of information technology, individual people and organizations can obtain and process data from different sources. It is critical to ensure data integrity so that effective decisions can be made based on these data. An important component of any solution for assessing data integrity is represented by techniques and tools to evaluate the trustworthiness of data provenance. However, few efforts have been devoted to investigate approaches for assessing how trusted the data are, based in turn on an assessment of the data sources and intermediaries. To bridge this gap, we propose a data provenance trust model which takes into account various factors that may affect the trustworthiness and, based on these factors, assigns trust scores to both data and data providers. Such trust scores represent key information based on which data users may decide whether to use the data and for what purposes.
KeywordsData Item Data User Edit Distance Trust Score Data Provider
Unable to display preview. Download preview PDF.
- 3.Benjelloun, O., Sarma, A.D., Hayworth, C., Widom, J.: An introduction to uldbs and the trio system. IEEE Data Eng. Bull. 29(1), 5–16 (2006)Google Scholar
- 4.Buneman, P., Khanna, S., Tan, W.C.: Why and where: A characterization of data provenance. In: ICDT, pp. 316–330 (2001)Google Scholar
- 5.Byun, J.-W., Kamra, A., Bertino, E., Li, N.: Efficient k -anonymization using clustering techniques. In: International Conference on Database Systems for Advanced Applications, pp. 188–200 (2007)Google Scholar
- 6.Greenwood, M., Goble, C., Stevens, R., Zhao, J., Addis, M., Marvin, D., Moreau, L., Oinn, T.: Provenance of e-science experiments - experience from bioinformatics. In: UK OST e-Science second All Hands Meeting (2003)Google Scholar
- 7.Han, J., Kamber, M.: Data mining: Concepts and techniques. Morgan Kaufmann, San Francisco (2001)Google Scholar
- 9.Scannapieco, M., Figotin, I., Bertino, E., Elmagarmid, A.K.: Privacy preserving schema and data matching. In: SIGMOD Conference, pp. 653–664 (2007)Google Scholar
- 10.Simmhan, Y.L., Plale, B., Gannon, D.: A survey of data provenance techniques. Technical Report (2007)Google Scholar
- 14.Yin, X., Han, J., Yu, P.S.: Truth discovery with multiple conflicting information providers on the web. In: ACM SIGKDD, pp. 1048–1052 (2007)Google Scholar
- 15.Zimmermann, P.: Pretty Good Privacy Users Guide. Distributed with the PGP software, vol. I & II (June 14, 1993)Google Scholar