Skip to main content

A Privacy-Aware Semantic Model for Provenance Management

  • Conference paper
Metadata and Semantics Research (MTSR 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 478))

Included in the following conference series:

Abstract

The history of data has a crucial importance almost in every scientific application. In order to trust the correctness of data, the ability to determine the origin of data becomes an important issue. Provenance information summarizes the origin of items, the history of the ownership of items and the actions performed on them. Ensuring that data is kept safe from corruption or illegal accesses and detecting privacy breaches on data should be achieved by integrating provenance concepts with security concepts. Information such as an individual’s infectious disease history is highly sensitive and should not be revealed to an unauthorized user. This historical data needs privacy. We propose a privacy-aware provenance management model by creating policies and querying provenance data to detect policy violations. We illustrate our proposed model by integrating it with infectious disease and vaccination domains.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hasan, R., Sion, R., Winslett, M.: Introducing Secure Provenance: Problems and Challenges. In: Proc. of ACM Workshop on Storage Security and Survivability, pp. 13–18 (2007)

    Google Scholar 

  2. Cheney, J., Chiticariu, L., Tan, W.-C.: Provenance in Databases: Why, How, and Where. Foundations and Trends in Databases 1(4), 379–474 (2007)

    Article  Google Scholar 

  3. Braun, U., Shinnar, A.: A Security Model for Provenance. Technical Report, TR-04-06, Harvard University (2006)

    Google Scholar 

  4. Hasan, R., Sion, R., Winslett, M.: The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance. In: Proc. of the 7th USENIX Conf. on File and Storage Technologies, pp. 1–14 (2009)

    Google Scholar 

  5. Tan, W.-C.: Provenance in Databases: Past, Current, and Future. IEEE Data Eng. Bull. 30(4), 3–12 (2007)

    Google Scholar 

  6. Davidson, S.B., Freire, J.: Provenance and scientific workflows: challenges and opportunities. In: Proc. of the ACM SIGMOD Int. Conf. on Management of Data, pp. 1345–1350 (2008)

    Google Scholar 

  7. Sahoo, S.S., Sheth, A., Henson, C.: Semantic Provenance for eScience:Managing the Deluge of Scientific Data. IEEE Internet Computing 12(4), 46–54 (2008)

    Article  Google Scholar 

  8. Halpin, H.: Provenance: The Missing Component of the Semantic Web for Privacy and Trust. In: Workshop on Trust & Privacy on the Social and Semantic Web (2009)

    Google Scholar 

  9. Ni, Q., Xu, S., Bertino, E., Sandhu, R., Han, W.: An Access Control Language for a General Provenance Model. In: Jonker, W., Petković, M. (eds.) SDM 2009. LNCS, vol. 5776, pp. 68–88. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  10. Ringelstein, C., Staab, S.: Papel: Provenance-Aware Policy Definition and Execution. IEEE Internet Computing 15(1), 49–58 (2011)

    Article  Google Scholar 

  11. Freitas, A., Knap, T., O’Riain, S., Curry, E.: W3P: Building an OPM based provenance model for the Web. Journal Future Generation Computer System 27(6), 766–774 (2011)

    Article  Google Scholar 

  12. Davidson, S.B.: On provenance and privacy. In: McGuinness, D.L., Michaelis, J.R., Moreau, L. (eds.) IPAW 2010. LNCS, vol. 6378, pp. 1–1. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  13. Park, J., Nguyen, D., Sandhu, R.: A Provenance-based Access Control Model. In: 10th Annual Int. Conf. on Privacy, Security and Trust, pp. 137–144 (2012)

    Google Scholar 

  14. Kifor, T., Varga, L.Z., et al.: Privacy Issues of Provenance in Electronic Healthcare Record System. Journal of Autonomic and Trusted Computing (2007)

    Google Scholar 

  15. Álvarez, S., Vázquez-Salceda, J., Kifor, T., Varga, L.Z., Willmott, S.: Applying Provenance in Distributed Organ Transplant Management. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 28–36. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  16. Moreau, L., Clifford, B., et al.: The Open Provenance Model Core Specification (v1.1). Future Generation Computer Systems 27(6), 743–756 (2011)

    Article  Google Scholar 

  17. Miles, S., Moreau, L., Futrelle, J.: OPM Profile for Dublin Core Terms, v0.3 (2009), http://twiki.ipaw.info/pub/OPM/ChangeProposalDublinCoreMapping/dcprofile.pdf

  18. Goldfain, A., Smith, B., Cowell, L.G.: Dispositions and the Infectious Disease Ontology. In: Proc. of the FOIS 2010, pp. 400–413 (2010)

    Google Scholar 

  19. Can, O., Sezer, E., Bursa, O., Unalir, M.O.: Personalized Vaccination Using Ontology Based Profiling. In: Garoufallou, E., Greenberg, J. (eds.) MTSR 2013. CCIS, vol. 390, pp. 213–224. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Can, O., Yilmazer, D. (2014). A Privacy-Aware Semantic Model for Provenance Management. In: Closs, S., Studer, R., Garoufallou, E., Sicilia, MA. (eds) Metadata and Semantics Research. MTSR 2014. Communications in Computer and Information Science, vol 478. Springer, Cham. https://doi.org/10.1007/978-3-319-13674-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13674-5_16

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13673-8

  • Online ISBN: 978-3-319-13674-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics