A roadmap for privacy-enhanced secure data provenance

被引:0
|
作者
Elisa Bertino
Gabriel Ghinita
Murat Kantarcioglu
Dang Nguyen
Jae Park
Ravi Sandhu
Salmin Sultana
Bhavani Thuraisingham
Shouhuai Xu
机构
[1] Purdue University,
[2] University of Texas at Dallas,undefined
[3] University of Massachusetts,undefined
[4] University of Texas,undefined
关键词
Data provenance; Security; Privacy; Trustworthy computing; Cryptography and access control; Risk management; Accountability and compliance;
D O I
暂无
中图分类号
学科分类号
摘要
The notion of data provenance was formally introduced a decade ago and has since been investigated, but mainly from a functional perspective, which follows the historical pattern of introducing new technologies with the expectation that security and privacy can be added later. Despite very recent interests from the cyber security community on some specific aspects of data provenance, there is no long-haul, overarching, systematic framework for the security and privacy of provenance. The importance of secure provenance R&D has been emphasized in the recent report on Federal game-changing R&D for cyber security especially with respect to the theme of Tailored Trustworthy Spaces. Secure data provenance can significantly enhance data trustworthiness, which is crucial to various decision-making processes. Moreover, data provenance can facilitate accountability and compliance (including compliance with privacy preferences and policies of relevant users), can be an important factor in access control and usage control decisions, and can be valuable in data forensics. Along with these potential benefits, data provenance also poses a number of security and privacy challenges. For example, sometimes provenance needs to be confidential so it is visible only to properly authorized users, and we also need to protect the identity of entities in the provenance from exposure. We thus need to achieve high assurance of provenance without comprising privacy of those in the chain that produced the data. Moreover, if we expect voluntary large-scale participation in provenance-aware applications, we must assure that the privacy of the individuals or organizations involved will be maintained. It is incumbent on the cyber security community to develop a technical and scientific framework to address the security and privacy challenges so that our society can gain maximum benefit from this technology. In this paper, we discuss a framework of theoretical foundations, models, mechanisms and architectures that allow applications to benefit from privacy-enhanced and secure use of provenance in a modular fashion. After introducing the main components of such a framework and the notion of provenance life cycle, we discuss in details research questions and issues concerning each such component and related approaches.
引用
收藏
页码:481 / 501
页数:20
相关论文
共 50 条
  • [1] A roadmap for privacy-enhanced secure data provenance
    Bertino, Elisa
    Ghinita, Gabriel
    Kantarcioglu, Murat
    Dang Nguyen
    Park, Jae
    Sandhu, Ravi
    Sultana, Salmin
    Thuraisingham, Bhavani
    Xu, Shouhuai
    [J]. JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2014, 43 (03) : 481 - 501
  • [2] Privacy-Enhanced Secure Data Transaction System for Smart Grid
    Go, Woong
    Kwak, Jin
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (03): : 37 - 44
  • [3] Lightweight privacy-enhanced secure data sharing scheme for smart grid
    Yang, Zheng
    Zhu, Hua
    Yin, Chunlin
    Xie, Zhidong
    Chen, Wei
    Chen, Cheng
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (03) : 1335 - 1343
  • [4] Privacy-Enhanced Data Deduplication Computational Intelligence Technique for Secure Healthcare Applications
    Kim, Jinsu
    Ryu, Sungwook
    Park, Namje
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (02): : 4169 - 4184
  • [5] Privacy-enhanced data deduplication computational intelligence technique for secure healthcare applications
    Kim, Jinsu
    Ryu, Sungwook
    Park, Namje
    [J]. Computers, Materials and Continua, 2022, 70 (02): : 4169 - 4184
  • [6] A query privacy-enhanced and secure search scheme over encrypted data in cloud computing
    Yin, Hui
    Qin, Zheng
    Ou, Lu
    Li, Keqin
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 90 : 14 - 27
  • [7] Privacy-enhanced Perceptual Hashing of Audio Data
    Knospe, Heiko
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 549 - 554
  • [8] Privacy-enhanced OptiSwap
    Avizheh, Sepideh
    Haffey, Preston
    Safavi-Naini, Reihaneh
    [J]. PROCEEDINGS OF THE 2021 CLOUD COMPUTING SECURITY WORKSHOP, CCSW 2021, 2021, : 39 - 57
  • [9] A risk-driven approach to designing privacy-enhanced secure applications
    Van Herreweghen, E
    [J]. INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY, 2004, 148 : 265 - 280
  • [10] Privacy-Enhanced Personalization
    Kobsa, Alfred
    [J]. NEW DIRECTIONS IN INTELLIGENT INTERACTIVE MULTIMEDIA, 2008, 142 : 31 - 31