Abstract
Due to the dynamic nature, such as services composition and evaluation, it is critical for a Service-Oriented Architecture (SOA) system to consider its data provenance, which concerns security, reliability, and integrity of data as they are being routed in the system. In a traditional software system, one focuses on the software itself to determine the security, reliability, and integrity of the software. In an SOA system, however, one also needs to consider origins and routes of data and their impact, i.e., data provenance. This paper first analyzes the unique nature and characteristics of data provenance in an SOA system, particularly related to data security, reliability, and integrity. Then it proposes a new framework for data provenance analysis in an SOA system. Finally, this paper uses an example which illustrates these techniques.
Similar content being viewed by others
References
Altova, Altova XMLSpy® 2005. http://www.altova.com/products_ide.html
Bell D, LaPadula L (1976) Secure computer system: unified exposition and multics interpretation. Technical Report, MITRE Corporation
Bishop M (2002) Computer security: art and science
Bose R and Frew J (2005). Lineage retrieval for scientific data processing: a survey. ACM Comput Surv 37(1): 1–28
Bunemaaan P, Khanna S, Tan WC (2001) Why and where: a characterization of data provenance. In: ICDT
Chappell D (2004) Enterprise Service Bus. O’ Reilly Media, Sebastopal
Chen Y, Tsai WT (2007) Distributed software development in service-oriented paradigm. Manuscript, http://asusrl.eas.asu.edu/share/services/book/DSDinSOP.pdf
Chen L, Tan V, Xu F, Biller A (2005) A proof of concept: provenance in a service oriented architecture. In: Proceedings of the Fourth All Hands Meeting (AHM)
Clarke DG, Clark DM (1975) Lineage, in elements of spatial data quality. In: Guptill SC, Morrison JL (eds) Elsevier Science, Oxford pp 13–30
DCIO, DOD OASD NII (2004) Net-Centric Checklist”, version 2.1.2, March 31st, 2004
Dikmans L (2007) Testing BPEL in the real world. http://www.oracle.com/technology/oramag/oracle/07-nov/067bpel.html
Foster I, Vockler J, Wilde M, Zhao Y (2002) Chimera: a virtual data system for representing, querying, and automating data derivation. In: Proc. of scientific and statistical database management
GAO (2002) Assessing the reliability of computer-processed data. External Version 1
Goble C (2002) Position Statement: Musings on Provenance, Workflow and (Semantic Web) Annotations for Bioinformatics. In: Workshop on data derivation and provenance, Chicago
Goguen J, Meseguer J (1982) Security policies and security models. In: Proceedings of the symposium on security and privacy. IEEE Computer Society
Goguen J, Meseguer J (1984) Unwinding and Inference Control. In: Proceedings of 1984 IEEE symposium on security and privacy, Oakland, pp 75–86
Groth P, Luck M, Moreau L (2004) A protocol for recording provenance in service-oriented grids. In: Proc. of 8th international conference on principles of distributed systems (OPODOS’04)
Hwang KW (2006) Information services in service oriented architecture—challenges and opportunities. Keynote of SEKE’06. http://www.ksi.edu/seke/keynote/SEKE2006-KW.pdf
IBM (2007) IBM Systems z9 Enterprise class. Retrieved at http://www-03.ibm.com/systems/z/z9ec/
IBM (2007) Service data objects. Retrieved at http://www-128.ibm.com/developerworks/webservices/library/specification/ws-sdo/
Jordan D, Evdemon J (2007) Web Services Business Process Execution Language Version 2.0, OASIS, http://docs.oasis-open.org/wsbpel/2.0/wsbpel-v2.0.html
Kernochan W (2006) Mainframe security changes as Web services arrive. Retrieved at http://searchwebservices.techtarget.com/tip/0,289483,sid26_gci1202408,00.htm
Laskey KJ (2005) Metadata concepts to support a net-centric data environment. Technical Report, MITRE
Lanter DP (1991) Design of a lineage-based meta-data base for GIS. In: Cartography and geographic information systems, vol 18
Miles S, Groth P, Branco M, Moreau L (2005) The requirements of recording and using provenance in e-Science experiments. Technical Report, Electronics and Computer Science, University of Southampton
Muniswamy-Reddy KK (2006) Deciding how to store provenance. Techni Technical Report TR-03-06, Harvard University, vol 18
Parasoft, SOAP Test Data Sheet. http://www.parasoft.com/jsp/products/quick_facts.jsp?product=SOAP
Paul R (2005) DoD towards software services. In: Proc. of 10th IEEE international workshop on object-oriented real-time dependable systems (WORDS 05), pp 3–6
Paul R, Tsai WT, Bayne J (2005) The impact of SOA policy-based computing on C2 interoperation and computing. In: 10th international command and control research and technology symposium (ICCRTS), McLean, Virginia
Portougal V, Sundaram D (2005) Business processes: operational solutions for SAP implementation. IMR Press, Hershey
Rajbhandari S, Walker DW (2004) Support for provenance in a service-based computing grid. In: UK e-Science All Hands Meeting
O’Reilly T (2005) What is Web 2.0: design patterns and business models for the next generation of software. http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html?page=1
Ross S (1970). Applied probability models with optimizing applications. Holden-Day, San Francisco
Simmhan YL, Plale B and Gannon D (2005). A survey of data provenance in e-science. SIGMOD Rec 34(3): 31–36
Simmhan YL, Plale B, Gannon D, Marru S (2006) A framework for collecting provenance in data-centric scientific workflows. In: Intl WWW Conference, SPARWAR, SPARWAR/PEO C4 I& space SBIR panel review. Presentation slides
Tan V, Groth P, Miles S, Jiang S, Munroe S, Tsasakou S, Moreau L (2006) Security issues in a SOA-based provenance system. In: Proceedings of the international provenance and annotation workshop 2006 (IPAW 2006)
Tidwell D (2001) UDDI4J: matchmaking for Web services. http://www-106.ibm.com/developerworks/library/ws-uddi4j.html
Tsai WT (2004) Integrated ACDATE / scenario model: the meta model. Technical Report, Department of Computer Science, Arizona State University
Tsai WT (2005) Service-oriented system engineering: a new paradigm. In: IEEE international workshop on service-oriented system engineering (SOSE), Beijing, pp 3–8
Tsai WT, Bai X, Chen Y, Zhou X (2005) Web service group testing with windowing mechanisms. In: IEEE international workshop on service-oriented system engineering (SOSE), Beijing, pp 213–218
Tsai WT, Chen Y, Paul R, Huang H, Zhou X, Wei X (2005) Adaptive testing, Oracle generation, and test script ranking for Web services. In: 29th annual international computer software and applications conference (COMPSAC), Edinburgh, Scotland, pp 101–106
Tsai WT, Lee YH, Cao Z, Chen Y, Xiao B (2006) Real-time service-oriented architecture. Department of Computer Science and Engineering, Arizona State University, Tempe
Tsai WT, Liu X, Chen Y (2005) Distributed policy specification and enforcement in service-oriented business systems. In: IEEE international conference on e-Business engineering (ICEBE), Beijing, pp 10–17
Tsai WT, Paul RA, Xiao B, Cao Z, Chen Y (2005) PSML-S: a process specification and modeling language for service oriented computing. In: The 9th IASTED international conference on software engineering and applications (sEA), Phoenix, pp 160–167
Tsai WT, Song W, Paul R, Cao Z, Huang H (2004) Services- oriented dynamic reconfiguration framework for dependable distributed computing. COMPSAC, pp 554–559
Tsai WT, Zhang D, Chen Y, Huang H, Paul R, Liao N (2004) A software reliability model for Web services. In: the 8th IASTED international conference on software engineering and applications, Cambridge, pp 144–149
Vasquez I, Gomadam K, Patterson S (2005) Framework for representing provenance for Web services and processes. Technical Report, LSDIS Lab
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Tsai, W.T., Wei, X., Chen, Y. et al. Data provenance in SOA: security, reliability, and integrity. SOCA 1, 223–247 (2007). https://doi.org/10.1007/s11761-007-0018-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11761-007-0018-8