Hiding Data and Structure in Workflow Provenance

被引:0
|
作者
Davidson, Susan [1 ]
Bao, Zhuowei [1 ]
Roy, Sudeepa [1 ]
机构
[1] Univ Penn, Dept Comp & Informat Sci, Philadelphia, PA 19104 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we discuss the use of views to address the problem of providing useful answers to provenance queries while ensuring that privacy concerns are met. In particular, we propose a hierarchical workflow model, based on context-free graph grammars, in which fine-grained dependencies between the inputs and outputs of a module are explicitly specified. Using this model, we examine how privacy concerns surrounding data, module function, and workflow structure can be addressed.
引用
收藏
页码:41 / 48
页数:8
相关论文
共 50 条
  • [41] Exploring Scientific Workflow Provenance Using Hybrid Queries over Nested Data and Lineage Graphs
    Anand, Manish Kumar
    Bowers, Shawn
    McPhillips, Timothy
    Ludaescher, Bertram
    SCIENTIFIC AND STATISTICAL DATABASE MANAGEMENT, PROCEEDINGS, 2009, 5566 : 237 - +
  • [42] Prediction of workflow execution time using provenance traces: practical applications in medical data processing
    Hiden, Hugo
    Woodman, Simon
    Watson, Paul
    PROCEEDINGS OF THE 2016 IEEE 12TH INTERNATIONAL CONFERENCE ON E-SCIENCE (E-SCIENCE), 2016, : 21 - 30
  • [43] Project histories:: Managing data provenance across collection-oriented scientific workflow runs
    Bowers, Shawn
    McPhillips, Timothy
    Wu, Martin
    Ludaescher, Bertram
    DATA INTEGRATION IN THE LIFE SCIENCES, PROCEEDINGS, 2007, 4544 : 122 - +
  • [44] Characterizing workflow-based activity on a production e-infrastructure using provenance data
    Madougou, Souley
    Shahand, Shayan
    Santcroos, Mark
    van Schaik, Barbera
    Benabdelkader, Ammar
    van Kampen, Antoine
    Olabarriaga, Silvia
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (08): : 1931 - 1942
  • [45] Secure provenance using an authenticated data structure approach
    Jamil, Fuzel
    Khan, Abid
    Anjum, Adeel
    Ahmed, Mansoor
    Jabeen, Farhana
    Javaid, Nadeem
    COMPUTERS & SECURITY, 2018, 73 : 34 - 56
  • [46] Climate Analytics Workflow Recommendation as a Service - Provenance-driven Automatic Workflow Mashup
    Zhang, Jia
    Wang, Wei
    Wei, Xing
    Lee, Chris
    Lee, Seungwon
    Pan, Lei
    Lee, Tsengdar J.
    2015 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS), 2015, : 89 - 97
  • [47] Approaches for Exploring and Querying Scientific Workflow Provenance Graphs
    Anand, Manish Kumar
    Bowers, Shawn
    Altintas, Ilkay
    Ludaescher, Bertram
    PROVENANCE AND ANNOTATION OF DATA AND PROCESSES, 2010, 6378 : 17 - +
  • [48] Generating Sound Workflow Views for Correct Provenance Analysis
    Liu, Ziyang
    Davidson, Susan B.
    Chen, Yi
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 2011, 36 (01):
  • [49] Provenance collection support in the Kepler Scientific Workflow System
    Altintas, Ilkay
    Barney, Oscar
    Jaeger-Frank, Efrat
    PROVENANCE AND ANNOTATION OF DATA, 2006, 4145 : 118 - 132
  • [50] On the Anonymization of Workflow Provenance without Compromising the Transparency of Lineage
    Belhajjame, Khalid
    ACM JOURNAL OF DATA AND INFORMATION QUALITY, 2022, 14 (01):