2015
DOI: 10.1007/978-3-319-18491-3_8
|View full text |Cite
|
Sign up to set email alerts
|

Obscuring Provenance Confidential Information via Graph Transformation

Abstract: Abstract. Provenance is a record that describes the people, institutions, entities, and activities involved in producing, influencing, or delivering a piece of data or a thing. In particular, the provenance of information is crucial in deciding whether information is to be trusted. PROV is a recent W3C specification for sharing provenance over the Web. However, provenance records may expose confidential information, such as identity of agents or specific attributes of entities or activities. It is therefore es… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 22 publications
(24 reference statements)
0
5
0
Order By: Relevance
“…Mohy et al [41] propose a workflow provenance sanitization approach, called ProvS, which combines both anonymization and grouping. Hussein et al [35] propose PROV-GTS, a provenance graph transformation system that avoids false dependencies and independencies. As opposed to these works, which attempt to generate provenance graphs that preserve the privacy of the provenance aspects that are to be hidden while seeking to provide high utility, we focus on the verification of the correctness of the workflow output in statistical studies, which, to the best of our knowledge, has not been studied before.…”
Section: Related Workmentioning
confidence: 99%
“…Mohy et al [41] propose a workflow provenance sanitization approach, called ProvS, which combines both anonymization and grouping. Hussein et al [35] propose PROV-GTS, a provenance graph transformation system that avoids false dependencies and independencies. As opposed to these works, which attempt to generate provenance graphs that preserve the privacy of the provenance aspects that are to be hidden while seeking to provide high utility, we focus on the verification of the correctness of the workflow output in statistical studies, which, to the best of our knowledge, has not been studied before.…”
Section: Related Workmentioning
confidence: 99%
“…The primary aim of the W3C standardized provenance is to enable the extensive publication and exchange of provenance over the web [18]. The provenance data model is subject to a set of constraints and inference rules [19], which are useful in validating the provenance information [20] and are essential for preserving graphs integrity when converting provenance graphs [21], [22]. To establish trust of data, these properties must be maintained when capturing provenance information and constructing provenance graphs [23].…”
Section: Conceptual View Of Data Provenancementioning
confidence: 99%
“…Concerning the last point, a provenance graph with a "hole" (omission), due to access control, might appear to defeat the use of provenance as an audit tool. A solution often proposed in the literature is the abstraction of a provenance graph [44,30] that both hides sensitive information and conserves the semantic information necessary for provenance analyses.…”
Section: Confidentiality: Controlling Access To Provenance Datamentioning
confidence: 99%