An Efficient Query Mechanism of Data Provenance Based on Dependency View

被引:0
|
作者
Gao, Xin [1 ]
Sun, Xuan [2 ]
机构
[1] Coordinat Ctr China, Natl Comp Network Emergency Response Tech Team, Beijing, Peoples R China
[2] Beijing Informat Sci & Technol Univ, Sch Informat Management, Beijing, Peoples R China
关键词
provenance; query; Big Data; dependency view;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data provenance is useful for data analysis, including auditing, debugging, evaluating the trust and quality, access control and so on. For the scale of data keep increasing, data provenance also become large and constantly growing, and it brings challenges to the efficiency of provenance tracking which is the important base of data analysis. This paper proposes a kind of dependency view based on OPM to extract a global data provenance description for data process instance with more correlation information among the elements of data provenance, and then provides an efficient query mechanism based on dependency view of data provenance to support provenance tracking by constructing a set of query operations for both forward and backward provenance tracking.
引用
收藏
页码:269 / 273
页数:5
相关论文
共 50 条
  • [31] Query expansion based on global dependency parsing analysis
    Xiang, Qinyuan
    Li, Weijiang
    Deng, Hui
    Wang, Feng
    [J]. INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1515 - 1521
  • [32] Efficient Query Bundling Mechanism in a DHT Network
    Mizutani, Kimihiro
    Mano, Toru
    Akashi, Osamu
    Fukuda, Kensuke
    [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 2695 - 2700
  • [33] Efficient Detection of Data Dependency Violations
    Pena, Eduardo H. M.
    Lucas Filho, Edson R.
    de Almeida, Eduardo C.
    Naumann, Felix
    [J]. CIKM '20: PROCEEDINGS OF THE 29TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT, 2020, : 1235 - 1244
  • [34] A Model for Sharing of Confidential Provenance Information in a Query Based System
    Nagappan, Meiyappan
    Vouk, Mladen A.
    [J]. PROVENANCE AND ANNOTATION OF DATA AND PROCESSES, 2008, 5272 : 62 - 69
  • [35] Efficient Steganography Based on a Data Decomposition Mechanism
    Zhang, Xinpeng
    Wang, Shuozhong
    Zhang, Weiming
    [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 1185 - 1189
  • [36] Intelligent Query-Based Data Aggregation Model and Optimized Query Ordering for Efficient Wireless Sensor Network
    Sarode, Prachi
    Nandhini, R.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (04) : 1405 - 1425
  • [37] Intelligent Query-Based Data Aggregation Model and Optimized Query Ordering for Efficient Wireless Sensor Network
    Prachi Sarode
    R. Nandhini
    [J]. Wireless Personal Communications, 2018, 100 : 1405 - 1425
  • [38] Efficient Query-Based Data Collection for Mobile Wireless Monitoring Applications
    Cheng, Long
    Chen, Yimin
    Chen, Canfeng
    Ma, Jian
    Shu, Lei
    Vasilakos, Athanasios V.
    Xiong, Naixue
    [J]. COMPUTER JOURNAL, 2010, 53 (10): : 1643 - 1657
  • [39] Efficient Skyline query processing of massive data based on Map-Reduce
    Ding L.-L.
    Xin J.-C.
    Wang G.-R.
    Huang S.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2011, 34 (10): : 1785 - 1796
  • [40] An efficient data placement for query-set-based broadcasting in mobile environments
    Wu, Guang-Ming
    [J]. COMPUTER COMMUNICATIONS, 2007, 30 (05) : 1075 - 1081