Abstract
Recent work has begun exploring the characterization and utilization of provenance in systems based on the Service Oriented Architecture (such as Web Services and Grid based environments). One of the salient issues related to provenance use within any given system is its security. Provenance presents some unique security requirements of its own, which are additionally dependent on the architectural and environmental context that a provenance system operates in. We discuss the security considerations pertaining to a Service Oriented Architecture based provenance system. Concurrently, we outline possible approaches to address them.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Dallas, Texas (2000)
Alvarez, S., Vazquez-Salceda, J., Kifor, T., Varga, L.Z., Willmott, S.: Applying provenance in distributed organ transplant management. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 28–36. Springer, Heidelberg (2006)
Branco, M., Moreau, L.: Enabling provenance on large scale e-science applications. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 55–63. Springer, Heidelberg (2006)
Braun, U., Shinnar, A.: A security model for provenance. Technical report, Harvard University (2002)
Burbeck, S.: The tao of e-business services. Technical report, IBM Software Group (October 2000)
Clifton, C., Marks, D.: Security and privacy implications of data mining. In: Proceedings of the ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (1996)
Foster, I., Voeckler, J., Wilde, M., Zhao, Y.: Chimera: A virtual data system for representing, querying and automating data derivation. In: Proc. of the 14th Conf. on Scientific and Statistical Database Management (July 2002)
Greenwood, M., Goble, C., Stevens, R., Zhao, J., Addis, M., Marvin, D., Moreau, L., Oinn, T.: Provenance of e-science experiments - experience from bioinformatics. In: Cox, S.J. (ed.) Proc. UK e-Science All Hands Meeting 2003, September 2003, pp. 223–226 (2003)
Groth, P., Luck, M., Moreau, L.: Formalising a protocol for recording provenance in grids. In: Proc. of the UK OST e-Science second All Hands Meeting 2004 (AHM 2004), Nottingham, UK (September 2004)
Groth, P., Luck, M., Moreau, L.: A protocol for recording provenance in service-oriented grids. In: Higashino, T. (ed.) OPODIS 2004. LNCS, vol. 3544, pp. 124–139. Springer, Heidelberg (2005)
Groth, P., Miles, S., Munroe, S.: Principles of high quality documentation for provenance: A philosophical discussion. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 278–286. Springer, Heidelberg (2006)
Groth, P., Miles, S., Tan, V., Jiang, S., Munroe, S., Tsasakou, S., Moreau, L.: Architecture for provenance systems. Technical report, University of Southampton (February 2006)
Khan, I., Schroeter, R., Hunter, J.: Implementation of a secure annotation service. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 212–221. Springer, Heidelberg (2006)
Kifor, T., Laszlo, V., Alvarez, S., Vazquez-Salceda, J., Willmott, S.: Privacy issues of provenance in electronic healthcare record systems. In: Proc. 1st Workshop on Privacy and Security in Agent-based Collaborative Environments (PSACE 2006), 5th International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2006), Japan (May 2006)
Lunt, T.F., Fernandez, E.D.: Database security. SIGMOD RECORD 19(4), 90–97 (1990)
Adam, N.R., Wortmann, J.C.: Security-control methods for statistical databases: A comparative study. ACM Computing Surveys 21(4), 515–556 (1989)
Szomszor, M., Moreau, L.: Recording and reasoning over data provenance in web and grid services. In: Meersman, R., Tari, Z., Schmidt, D.C. (eds.) CoopIS 2003, DOA 2003, and ODBASE 2003. LNCS, vol. 2888, pp. 603–620. Springer, Heidelberg (2003)
Wiseman, S.R.: On the problem of security in database. In: Spooner, D.L., Landwehr (eds.) Database Security III, North Holland, pp. 301–311. Elsevier Science Publishers, Amsterdam (1990)
Wong, H.C., Sycara, K.: Adding security and trust to multi-agent systems. In: Falcone, R., Castelfranchi, C., Tan, Y.H., Firozabadi, B. (eds.) Workshop on Deception, Fraud and Trust in Agent Societies: Proceedings of the 3rd International Conference on Autonomous Agents, Seattle, Washington. ACM Press, New York (1999)
Zhao, J., Goble, C., Greenwood, M., Wroe, C., Stevens, R.: Annotating, linking and browsing provenance logs for e-science. In: Proc. of the Workshop on Semantic Web Technologies for Searching and Retrieving Scientific Data (October 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tan, V. et al. (2006). Security Issues in a SOA-Based Provenance System. In: Moreau, L., Foster, I. (eds) Provenance and Annotation of Data. IPAW 2006. Lecture Notes in Computer Science, vol 4145. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11890850_21
Download citation
DOI: https://doi.org/10.1007/11890850_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-46302-3
Online ISBN: 978-3-540-46303-0
eBook Packages: Computer ScienceComputer Science (R0)