Abstract | ||
---|---|---|
While provenance research is common in distributed systems, many proposed solutions do not address the security of systems and accountability of data stored in those systems. In this paper, we survey provenance solutions which were proposed to address the problems of system security and data accountability in distributed systems. From our survey, we derive a set of minimum requirements that are necessary for a provenance system to be effective in addressing the two problems. Finally, we identify several gaps in the surveyed solutions and present them as challenges that future provenance researchers should tackle. We argue that these gaps have to be addressed before a complete and fool-proof provenance solution can be arrived at in the future. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1109/HPCC.and.EUC.2013.221 | 2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC) |
Keywords | Field | DocType |
Provenance, Security, Data Accountability, Distributed Systems, Cloud Computing | Computer security,Computer science,Accountability,Provenance,Cloud computing security,Distributed database,Distributed computing | Conference |
Citations | PageRank | References |
14 | 0.66 | 32 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Yu Shyang Tan | 1 | 70 | 4.58 |
Ryan K. L. Ko | 2 | 515 | 31.73 |
Geoffrey Holmes | 3 | 10365 | 473.46 |