A roadmap for privacy-enhanced secure data provenance

被引:0
|
作者
Elisa Bertino
Gabriel Ghinita
Murat Kantarcioglu
Dang Nguyen
Jae Park
Ravi Sandhu
Salmin Sultana
Bhavani Thuraisingham
Shouhuai Xu
机构
[1] Purdue University,
[2] University of Texas at Dallas,undefined
[3] University of Massachusetts,undefined
[4] University of Texas,undefined
关键词
Data provenance; Security; Privacy; Trustworthy computing; Cryptography and access control; Risk management; Accountability and compliance;
D O I
暂无
中图分类号
学科分类号
摘要
The notion of data provenance was formally introduced a decade ago and has since been investigated, but mainly from a functional perspective, which follows the historical pattern of introducing new technologies with the expectation that security and privacy can be added later. Despite very recent interests from the cyber security community on some specific aspects of data provenance, there is no long-haul, overarching, systematic framework for the security and privacy of provenance. The importance of secure provenance R&D has been emphasized in the recent report on Federal game-changing R&D for cyber security especially with respect to the theme of Tailored Trustworthy Spaces. Secure data provenance can significantly enhance data trustworthiness, which is crucial to various decision-making processes. Moreover, data provenance can facilitate accountability and compliance (including compliance with privacy preferences and policies of relevant users), can be an important factor in access control and usage control decisions, and can be valuable in data forensics. Along with these potential benefits, data provenance also poses a number of security and privacy challenges. For example, sometimes provenance needs to be confidential so it is visible only to properly authorized users, and we also need to protect the identity of entities in the provenance from exposure. We thus need to achieve high assurance of provenance without comprising privacy of those in the chain that produced the data. Moreover, if we expect voluntary large-scale participation in provenance-aware applications, we must assure that the privacy of the individuals or organizations involved will be maintained. It is incumbent on the cyber security community to develop a technical and scientific framework to address the security and privacy challenges so that our society can gain maximum benefit from this technology. In this paper, we discuss a framework of theoretical foundations, models, mechanisms and architectures that allow applications to benefit from privacy-enhanced and secure use of provenance in a modular fashion. After introducing the main components of such a framework and the notion of provenance life cycle, we discuss in details research questions and issues concerning each such component and related approaches.
引用
收藏
页码:481 / 501
页数:20
相关论文
共 50 条
  • [41] Privacy-Enhanced Data Fusion for Federated Learning Empowered Internet of Things
    Lin, Qingxin
    Xu, Kuai
    Huang, Yikun
    Yu, Feng
    Wang, Xiaoding
    [J]. MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [42] Improving Customer Retention in E-Commerce through a Secure and Privacy-Enhanced Loyalty System
    Matthias Enzmann
    Markus Schneider
    [J]. Information Systems Frontiers, 2005, 7 : 359 - 370
  • [43] Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures
    Rostampour, Samad
    Bagheri, Nasour
    Ghavami, Behnam
    Bendavid, Ygal
    Kumari, Saru
    Martin, Honorio
    Camara, Carmen
    [J]. JOURNAL OF SUPERCOMPUTING, 2024, 80 (02): : 1668 - 1693
  • [44] Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures
    Samad Rostampour
    Nasour Bagheri
    Behnam Ghavami
    Ygal Bendavid
    Saru Kumari
    Honorio Martin
    Carmen Camara
    [J]. The Journal of Supercomputing, 2024, 80 : 1668 - 1693
  • [45] Improving customer retention in e-commerce through a secure and privacy-enhanced loyalty system
    Enzmann, M
    Schneider, M
    [J]. INFORMATION SYSTEMS FRONTIERS, 2005, 7 (4-5) : 359 - 370
  • [46] Privacy-Enhanced System Design Modeling Based on Privacy Features
    Ahmadian, Amir Shayan
    Strueber, Daniel
    Juerjens, Jan
    [J]. SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 1492 - 1499
  • [47] Privacy constraint processing in a privacy-enhanced database management system
    Thuraisingham, B
    [J]. DATA & KNOWLEDGE ENGINEERING, 2005, 55 (02) : 159 - 188
  • [48] Efficient data transmission on wireless communication through a privacy-enhanced blockchain process
    Aluvalu, Rajanikanth
    Kumaran, Senthil
    Thirumalaisamy, Manikandan
    Basheer, Shajahan
    Aldhahri, Eman Ali
    Selvarajan, Shitharth
    [J]. PEERJ COMPUTER SCIENCE, 2023, 9
  • [49] Privacy-Enhanced Android for Smart Cities Applications
    Lepinski, Matthew
    Levin, David
    McCarthy, Daniel
    Watro, Ronald
    Lack, Michael
    Hallenbeck, Daniel
    Slater, David
    [J]. SMART CITY 360, 2016, 166 : 66 - 77
  • [50] Role management in a privacy-enhanced collaborative environment
    Lorenz, Anja
    Borcea-Pfitzmann, Katrin
    [J]. INTERACTIVE TECHNOLOGY AND SMART EDUCATION, 2010, 7 (02) : 102 - 112