Abstract
The history of data has a crucial importance almost in every scientific application. In order to trust the correctness of data, the ability to determine the origin of data becomes an important issue. Provenance information summarizes the origin of items, the history of the ownership of items and the actions performed on them. Ensuring that data is kept safe from corruption or illegal accesses and detecting privacy breaches on data should be achieved by integrating provenance concepts with security concepts. Information such as an individual’s infectious disease history is highly sensitive and should not be revealed to an unauthorized user. This historical data needs privacy. We propose a privacy-aware provenance management model by creating policies and querying provenance data to detect policy violations. We illustrate our proposed model by integrating it with infectious disease and vaccination domains.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hasan, R., Sion, R., Winslett, M.: Introducing Secure Provenance: Problems and Challenges. In: Proc. of ACM Workshop on Storage Security and Survivability, pp. 13–18 (2007)
Cheney, J., Chiticariu, L., Tan, W.-C.: Provenance in Databases: Why, How, and Where. Foundations and Trends in Databases 1(4), 379–474 (2007)
Braun, U., Shinnar, A.: A Security Model for Provenance. Technical Report, TR-04-06, Harvard University (2006)
Hasan, R., Sion, R., Winslett, M.: The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance. In: Proc. of the 7th USENIX Conf. on File and Storage Technologies, pp. 1–14 (2009)
Tan, W.-C.: Provenance in Databases: Past, Current, and Future. IEEE Data Eng. Bull. 30(4), 3–12 (2007)
Davidson, S.B., Freire, J.: Provenance and scientific workflows: challenges and opportunities. In: Proc. of the ACM SIGMOD Int. Conf. on Management of Data, pp. 1345–1350 (2008)
Sahoo, S.S., Sheth, A., Henson, C.: Semantic Provenance for eScience:Managing the Deluge of Scientific Data. IEEE Internet Computing 12(4), 46–54 (2008)
Halpin, H.: Provenance: The Missing Component of the Semantic Web for Privacy and Trust. In: Workshop on Trust & Privacy on the Social and Semantic Web (2009)
Ni, Q., Xu, S., Bertino, E., Sandhu, R., Han, W.: An Access Control Language for a General Provenance Model. In: Jonker, W., Petković, M. (eds.) SDM 2009. LNCS, vol. 5776, pp. 68–88. Springer, Heidelberg (2009)
Ringelstein, C., Staab, S.: Papel: Provenance-Aware Policy Definition and Execution. IEEE Internet Computing 15(1), 49–58 (2011)
Freitas, A., Knap, T., O’Riain, S., Curry, E.: W3P: Building an OPM based provenance model for the Web. Journal Future Generation Computer System 27(6), 766–774 (2011)
Davidson, S.B.: On provenance and privacy. In: McGuinness, D.L., Michaelis, J.R., Moreau, L. (eds.) IPAW 2010. LNCS, vol. 6378, pp. 1–1. Springer, Heidelberg (2010)
Park, J., Nguyen, D., Sandhu, R.: A Provenance-based Access Control Model. In: 10th Annual Int. Conf. on Privacy, Security and Trust, pp. 137–144 (2012)
Kifor, T., Varga, L.Z., et al.: Privacy Issues of Provenance in Electronic Healthcare Record System. Journal of Autonomic and Trusted Computing (2007)
Álvarez, S., Vázquez-Salceda, J., Kifor, T., Varga, L.Z., Willmott, S.: Applying Provenance in Distributed Organ Transplant Management. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 28–36. Springer, Heidelberg (2006)
Moreau, L., Clifford, B., et al.: The Open Provenance Model Core Specification (v1.1). Future Generation Computer Systems 27(6), 743–756 (2011)
Miles, S., Moreau, L., Futrelle, J.: OPM Profile for Dublin Core Terms, v0.3 (2009), http://twiki.ipaw.info/pub/OPM/ChangeProposalDublinCoreMapping/dcprofile.pdf
Goldfain, A., Smith, B., Cowell, L.G.: Dispositions and the Infectious Disease Ontology. In: Proc. of the FOIS 2010, pp. 400–413 (2010)
Can, O., Sezer, E., Bursa, O., Unalir, M.O.: Personalized Vaccination Using Ontology Based Profiling. In: Garoufallou, E., Greenberg, J. (eds.) MTSR 2013. CCIS, vol. 390, pp. 213–224. Springer, Heidelberg (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Can, O., Yilmazer, D. (2014). A Privacy-Aware Semantic Model for Provenance Management. In: Closs, S., Studer, R., Garoufallou, E., Sicilia, MA. (eds) Metadata and Semantics Research. MTSR 2014. Communications in Computer and Information Science, vol 478. Springer, Cham. https://doi.org/10.1007/978-3-319-13674-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-13674-5_16
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13673-8
Online ISBN: 978-3-319-13674-5
eBook Packages: Computer ScienceComputer Science (R0)