Security Issues in a SOA-Based Provenance System

  • Victor Tan
  • Paul Groth
  • Simon Miles
  • Sheng Jiang
  • Steve Munroe
  • Sofia Tsasakou
  • Luc Moreau
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4145)


Recent work has begun exploring the characterization and utilization of provenance in systems based on the Service Oriented Architecture (such as Web Services and Grid based environments). One of the salient issues related to provenance use within any given system is its security. Provenance presents some unique security requirements of its own, which are additionally dependent on the architectural and environmental context that a provenance system operates in. We discuss the security considerations pertaining to a Service Oriented Architecture based provenance system. Concurrently, we outline possible approaches to address them.


Access Control Security Issue Service Orient Architecture Security Domain Process Documentation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Dallas, Texas (2000)Google Scholar
  2. 2.
    Alvarez, S., Vazquez-Salceda, J., Kifor, T., Varga, L.Z., Willmott, S.: Applying provenance in distributed organ transplant management. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 28–36. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  3. 3.
    Branco, M., Moreau, L.: Enabling provenance on large scale e-science applications. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 55–63. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    Braun, U., Shinnar, A.: A security model for provenance. Technical report, Harvard University (2002)Google Scholar
  5. 5.
    Burbeck, S.: The tao of e-business services. Technical report, IBM Software Group (October 2000)Google Scholar
  6. 6.
    Clifton, C., Marks, D.: Security and privacy implications of data mining. In: Proceedings of the ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (1996)Google Scholar
  7. 7.
    Foster, I., Voeckler, J., Wilde, M., Zhao, Y.: Chimera: A virtual data system for representing, querying and automating data derivation. In: Proc. of the 14th Conf. on Scientific and Statistical Database Management (July 2002)Google Scholar
  8. 8.
    Greenwood, M., Goble, C., Stevens, R., Zhao, J., Addis, M., Marvin, D., Moreau, L., Oinn, T.: Provenance of e-science experiments - experience from bioinformatics. In: Cox, S.J. (ed.) Proc. UK e-Science All Hands Meeting 2003, September 2003, pp. 223–226 (2003)Google Scholar
  9. 9.
    Groth, P., Luck, M., Moreau, L.: Formalising a protocol for recording provenance in grids. In: Proc. of the UK OST e-Science second All Hands Meeting 2004 (AHM 2004), Nottingham, UK (September 2004)Google Scholar
  10. 10.
    Groth, P., Luck, M., Moreau, L.: A protocol for recording provenance in service-oriented grids. In: Higashino, T. (ed.) OPODIS 2004. LNCS, vol. 3544, pp. 124–139. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  11. 11.
    Groth, P., Miles, S., Munroe, S.: Principles of high quality documentation for provenance: A philosophical discussion. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 278–286. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  12. 12.
    Groth, P., Miles, S., Tan, V., Jiang, S., Munroe, S., Tsasakou, S., Moreau, L.: Architecture for provenance systems. Technical report, University of Southampton (February 2006)Google Scholar
  13. 13.
    Khan, I., Schroeter, R., Hunter, J.: Implementation of a secure annotation service. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 212–221. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  14. 14.
    Kifor, T., Laszlo, V., Alvarez, S., Vazquez-Salceda, J., Willmott, S.: Privacy issues of provenance in electronic healthcare record systems. In: Proc. 1st Workshop on Privacy and Security in Agent-based Collaborative Environments (PSACE 2006), 5th International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2006), Japan (May 2006)Google Scholar
  15. 15.
    Lunt, T.F., Fernandez, E.D.: Database security. SIGMOD RECORD 19(4), 90–97 (1990)CrossRefGoogle Scholar
  16. 16.
    Adam, N.R., Wortmann, J.C.: Security-control methods for statistical databases: A comparative study. ACM Computing Surveys 21(4), 515–556 (1989)CrossRefGoogle Scholar
  17. 17.
    Szomszor, M., Moreau, L.: Recording and reasoning over data provenance in web and grid services. In: Meersman, R., Tari, Z., Schmidt, D.C. (eds.) CoopIS 2003, DOA 2003, and ODBASE 2003. LNCS, vol. 2888, pp. 603–620. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  18. 18.
    Wiseman, S.R.: On the problem of security in database. In: Spooner, D.L., Landwehr (eds.) Database Security III, North Holland, pp. 301–311. Elsevier Science Publishers, Amsterdam (1990)Google Scholar
  19. 19.
    Wong, H.C., Sycara, K.: Adding security and trust to multi-agent systems. In: Falcone, R., Castelfranchi, C., Tan, Y.H., Firozabadi, B. (eds.) Workshop on Deception, Fraud and Trust in Agent Societies: Proceedings of the 3rd International Conference on Autonomous Agents, Seattle, Washington. ACM Press, New York (1999)Google Scholar
  20. 20.
    Zhao, J., Goble, C., Greenwood, M., Wroe, C., Stevens, R.: Annotating, linking and browsing provenance logs for e-science. In: Proc. of the Workshop on Semantic Web Technologies for Searching and Retrieving Scientific Data (October 2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Victor Tan
    • 1
  • Paul Groth
    • 1
  • Simon Miles
    • 1
  • Sheng Jiang
    • 1
  • Steve Munroe
    • 1
  • Sofia Tsasakou
    • 1
  • Luc Moreau
    • 1
  1. 1.School of Electronics and Computer ScienceUniversity of SouthamptonSouthamptonUK

Personalised recommendations