Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data 2010
DOI: 10.1145/1807167.1807234
|View full text |Cite
|
Sign up to set email alerts
|

Efficient querying and maintenance of network provenance at internet-scale

Abstract: Network accountability, forensic analysis, and failure diagnosis are becoming increasingly important for network management and security. Such capabilities often utilize network provenance -the ability to issue queries over network meta-data. For example, network provenance may be used to trace the path a message traverses on the network as well as to determine how message data were derived and which parties were involved in its derivation. This paper presents the design and implementation of ExSPAN, a generic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
85
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 102 publications
(85 citation statements)
references
References 20 publications
0
85
0
Order By: Relevance
“…ExSPAN [68] allows the exploration of provenance in networked systems and extends traditional relational models for storing and querying provenance metadata, while SPADEv2 supports both graph and relational database storage and querying. PASS has explored the use of clouds [53,54].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…ExSPAN [68] allows the exploration of provenance in networked systems and extends traditional relational models for storing and querying provenance metadata, while SPADEv2 supports both graph and relational database storage and querying. PASS has explored the use of clouds [53,54].…”
Section: Related Workmentioning
confidence: 99%
“…IBM researchers have proposed a provenance index that improves the execution of forward and backward provenance queries [32]. A number of efforts, including SPADEv2, have recently considered how to compress provenance [68,39]. Query optimization techniques on compressed provenance data has also been examined [25].…”
Section: Related Workmentioning
confidence: 99%
“…The design and implementation of ExSPAN [10], that efficient network provenance is achieved by a generic framework in a distributed environment. To "explain" the existence of any network state it utilizes the database notion of data provenance, such that an adaptable operation is provided by a network provenance.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The ExSPAN prototype is developed using Rapid Net, is used in networking platform based on the emerging ns-3 toolkit. The main drawback is does not provide confidentiality and authenticity of provenance information [10].…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, they do not address the security of data provenance. In EXtenSible Provenance Aware Networked systems (ExSPAN) [22], Zhou et al extend [21] and propose ExSPAN which provides the support for queries and maintenance of the network provenance in a distributed environment. However, they leave the issue of protecting the confidentiality and authenticity of provenance information as open.…”
Section: General Data Provenance Schemesmentioning
confidence: 99%