A Model for Sharing of Confidential Provenance Information in a Query Based System

  • Meiyappan Nagappan
  • Mladen A. Vouk
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5272)

Abstract

Workflow management systems are increasingly being used to automate scientific discovery. Provenance meta-data is collected about scientific workflows, processes, simulations and data to add value. There is a variety of workflow management tools that cater to this. The provenance information may have as much value as the raw data. Typically, sensitive information produced by a computational processes or experiments is well guarded. However, this may not necessarily be true when it comes to provenance information. The issue is how to share confidential provenance information. We present a model for sharing provenance information when the confidentiality level is decided by the user dynamically. The key feature of this model is the Query Sharing concept. We illustrate the model for workflows implemented using provenance enabled Kepler system.

Keywords

Provenance Confidentiality Workflow management tools 

References

  1. 1.
    Kepler development and download site, http://kepler-project.org/
  2. 2.
    Scientific Data Management Center, http://sdm.lbl.gov/sdmcenter/index.html
  3. 3.
    Altintas, I., Barney, O., Jaeger-Frank, E.: Provenance Collection Support in the Kepler Scientific Workflow System. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 118–132. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    Barga, R.S., Digiampietri, L.A.: Automatic Generation of Workflow Provenance. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 1–9. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  5. 5.
    Barreto, R., Critchlow, T., Khan, A., Klasky, S., Kora, L., Ligon, J., Mouallem, P., Nagappan, M., Podhorszki, N., Vouk, M.: Managing and Monitoring Scientific Workflows through Dashboards. In: Poster # 93, at Microsoft eScience Workshop Friday Center, University of North Carolina, Chapell Hill, NC, October 13 - 15, p. 108 (2007)Google Scholar
  6. 6.
    Bowers, S., McPhillips, T., Ludeascher, B., Cohen, S., Davidson, S.B.: A Model for User-Oriented Data Provenance in Pipelined Scientific Workflows. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 133–147. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  7. 7.
    Braun, U., Garfinkel, S., Holland, D.A., Muniswamy-Reddy, K.-K., Seltzer, M.I.: Issues in Automatic Provenance Collection. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 171–183. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  8. 8.
    Elmaghraby, S.E.: Activity Networks: Project Planning and Control by Network Models. Wiley-Interscience, New York (1977)MATHGoogle Scholar
  9. 9.
    Griffiths, P.P., Wade, B.W.: An authorization mechanism for a relational database system. ACM Transactions on Database Systems 1(3), 242–255 (1976)CrossRefGoogle Scholar
  10. 10.
    Hasan, R., Sion, R., Winslett, M.: Introducing secure provenance: problems and challenges. In: Proceedings of the 2007 ACM workshop on Storage security and survivability, pp. 13–18. ACM, Alexandria (2007)CrossRefGoogle Scholar
  11. 11.
    ISO/IEC 17799. Information technology – Security techniques – Code of practice for information security management (2000) (Rev. 2005), http://www.iso.org/iso/en/prods-services/popstds/informationsecurity.html
  12. 12.
    Ludaescher, B., Podhorszki, N., Altintas, I., Bowers, S., McPhillips, T.: From Computation Models to Models of Provenance: The RWS Approach. Concurrency and Computation: Practise and Experience 20(5), 507–518Google Scholar
  13. 13.
    McGraw, G.: Building secure software: better than protecting bad software. Software, IEEE 19(6), 57–58Google Scholar
  14. 14.
    Moreau, L., Foster, I.: Intl. Provenance and Annotation Workshop (IPAW). In: LNCS, vol. 4145, Chicago. Springer, Heidelberg (May 2006)Google Scholar
  15. 15.
    Moreau, L., Ludäscher, B.: Concurrency and Computation: Practice & Experience – Special Issue on the First Provenance Challenge. Wiley, Chichester (2007)Google Scholar
  16. 16.
    Muniswamy-Reddy, K.-K., Holland, D.A., Braun, U., Seltzer, M.I.: Provenance Aware Storage Systems. In: Proceedings of the 2006 USENIX Annual Technical Conference, p. 4 (June 2006)Google Scholar
  17. 17.
    Nagappan, M., Altintas, I., Chin, G., Crawl, D., Critchlow, T., Koop, D., Ligon, J., Ludaescher, B., Mouallem, P., Podhorszki, N., Silva, C., Vouk, M.: Provenance in Kepler-based Scientific Workflow Systems. In: Poster # 41, at Microsoft eScience Workshop Friday Center, University of North Carolina, Chapell Hill, NC, October 13 - 15, p. 82 (2007)Google Scholar
  18. 18.
    Tan, V., Groth, P., Miles, S., Jiang, S., Munroe, S., Tsasakou, S., Moreau, L.: Security Issues in a SOA-Based Provenance System. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 203–211. Springer, Heidelberg (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Meiyappan Nagappan
    • 1
  • Mladen A. Vouk
    • 1
  1. 1.North Carolina State UniversityRaleighUSA

Personalised recommendations