Title
Securing Provenance Of Distributed Processes In An Untrusted Environment
Abstract
Recently, there is much concern about the provenance of distributed processes, that is about the documentation of the origin and the processes to produce an object in a distributed system. The provenance has many applications in the forms of medical records, documentation of processes in the computer systems, recording the origin of data in the cloud, and also documentation of human-executed processes. The provenance of distributed processes can be modeled by a directed acyclic graph (DAG) where each node represents an entity, and an edge represents the origin and causal relationship between entities. Without sufficient security mechanisms, the provenance graph suffers from integrity and confidentiality problems, for example changes or deletions of the correct nodes, additions of fake nodes and edges, and unauthorized accesses to the sensitive nodes and edges. In this paper, we propose an integrity mechanism for provenance graph using the digital signature involving three parties: the process executors who are responsible in the nodes' creation, a provenance owner that records the nodes to the provenance store, and a trusted party that we call the Trusted Counter Server (TCS) that records the number of nodes stored by the provenance owner. We show that the mechanism can detect the integrity problem in the provenance graph, namely unauthorized and malicious "authorized" updates even if all the parties, except the TCS, collude to update the provenance. In this scheme, the TCS only needs a very minimal storage (linear with the number of the provenance owners). To protect the confidentiality and for an efficient access control administration, we propose a method to encrypt the provenance graph that allows access by paths and compartments in the provenance graph. We argue that encryption is important as a mechanism to protect the provenance data stored in an untrusted environment. We analyze the security of the integrity mechanism, and perform experiments to measure the performance of both mechanisms.
Year
DOI
Venue
2012
10.1587/transinf.E95.D.1894
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
Keywords
Field
DocType
provenance security, access control model, database encryption
World Wide Web,Computer security,Computer science,Provenance,Software,Database encryption
Journal
Volume
Issue
ISSN
E95D
7
1745-1361
Citations 
PageRank 
References 
2
0.37
17
Authors
3
Name
Order
Citations
PageRank
Amril Syalim1181.78
Takashi Nishide235727.86
Kouichi Sakurai31514213.71