Abstract
With thriving of data sharing, demands of data provenance publishing become increasingly urgent. Data provenance describes about how data is generated and evolves with time. Data provenance has many applications, in-cluding evaluation of data quality, audit trail, replication recipes, data citation, etc. Some in-out mapping relations and related intermediate parameters in data provenance may be private. How to protect the privacy in the data provenance publishing attracts increasing attention from researchers in recent years. Existing solutions rely primarily on Γ-privacy model, hiding certain properties to solve the module’s privacy-preserving problem. However, the Γ-privacy model has the following disadvantages: (1) The attribute domains are limited. (2) It’s difficult to set consistent Γ value for the workflow. (3) The attribute selection strategy is unreasonable. Concerning these problems, a novel privacy-preserving provenance model is devised to balance the tradeoff between privacy-preserving and utility of data provenance. The devised model applies the generalization and introduces the generalized level. Furthermore, an effective privacy-preserving provenance publishing method based on generalization is proposed to achieve the privacy security in the data provenance publishing. Finally, theoretical analysis and experimental results testifies the effectiveness of our solution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ming, G.A.O., Che-Qing, J.I.N., et al.: A survey on management of data provenance. Chin. J. Comput. 33(3), 373–389 (2010)
Missier, P., Bryans, J., Gamble, C., et al.: Provenance Graph Abstraction by Node Grouping. Computing Science, Newcastle University, Newcastle upon Tyne (2013)
Mohy, N.N., Mokhtar, H.M.O., El-Sharkawi, M.E.: A comprehensive sanitization approach for workflow provenance graphs. In: EDBT/ICDT Workshops (2016)
Davidson, S.B., et al.: Privacy issues in scientific workflow provenance. In: Proceedings of the 1st International Workshop on Workflow Approaches to New Data-centric Science. ACM (2010)
Chebotko, A., Chang, S., Lu, S., Fotouhi, F., Yang, P.: Scientific workflow provenance querying with security views. In: WAIM, pp. 349–356 (2008)
Davidson, S.B., Khanna, S., Milo, T., et al.: Provenance views for module privacy. In: Proceedings of the Thirtieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 175–186. ACM (2011)
Davidson, S.B., Khanna, S., Panigrahi, D., et al.: Preserving module privacy in workflow provenance (2010)
Davidson, S.B., Khanna, S., Roy, S., et al.: Privacy issues in scientific workflow provenance. In: Proceedings of the 1st International Workshop on Workflow Approaches to New Data-centric Science, p. 3. ACM (2010)
Davidson, S.B., Khanna, S., Roy, S., et al.: On provenance and privacy. In: Proceedings of the 14th International Conference on Database Theory, pp. 3–10. ACM (2011)
Fung, B., Wang, K., Chen, R., et al.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. (CSUR) 42(4), 14 (2010)
Oinn, T., et al.: Taverna: a tool for the composition and enactment of bioinformatics workflows. Bioinformatics 20, 2004 (2004)
Simmhan, Y.L., Plale, B., Gannon, D.: A framework for collecting provenance in data-centric scientific workflows. In: Proceedings of the IEEE International Conference on Web Services, ICWS 2006, pp. 427–436. IEEE Computer Society, Washington, D.C. (2006). http://dx.doi.org/10.1109/ICWS
Shui-Geng, Z.H.O.U., Feng, L.I., et al.: Privacy preservation in data applications: a survey. Chin. J. Comput. 32(5), 847–861 (2009)
Ludäscher, B., et al.: Scientific workflow management and the kepler system: research articles. Concurr. Comput. Pract. Exper. 18(10), 1039–1065 (2006). https://doi.org/10.1002/cpe.v18:10
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Wu, J., Ni, W., Zhang, S. (2018). Generalization Based Privacy-Preserving Provenance Publishing. In: Meng, X., Li, R., Wang, K., Niu, B., Wang, X., Zhao, G. (eds) Web Information Systems and Applications. WISA 2018. Lecture Notes in Computer Science(), vol 11242. Springer, Cham. https://doi.org/10.1007/978-3-030-02934-0_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-02934-0_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02933-3
Online ISBN: 978-3-030-02934-0
eBook Packages: Computer ScienceComputer Science (R0)