Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes
Autor: | Sabah Suhail, Khizar Hameed, Adeel Anjum, Abid Khan, Idrees Ahmed, Farhana Jabeen, Faheem Zafar, Hayat Mohammad Khan |
---|---|
Rok vydání: | 2017 |
Předmět: |
Provenance
Computer Networks and Communications Computer science business.industry 020206 networking & telecommunications Cloud computing 02 engineering and technology Asset (computer security) Computer security computer.software_genre Data science Computer Science Applications Hardware and Architecture Taxonomy (general) 0202 electrical engineering electronic engineering information engineering 020201 artificial intelligence & image processing State (computer science) business Quality assurance computer Wireless sensor network |
Zdroj: | Journal of Network and Computer Applications. 94:50-68 |
ISSN: | 1084-8045 |
Popis: | Data is a valuable asset for the success of business and organizations these days, as it is effectively utilized for decision making, risk assessment, prioritizing the goals and performance evaluation. Extreme reliance on data demands quality assurance and trust on processes. Data Provenance is information that can be used to reason about the current state of a data object. Provenance can be broadly described as the information that explains where a piece of data object came from, how it was derived or created, who was involved in said creation, manipulations involved, processes applied, etc. It consists of information that had an effect on the data, evolving to its present state. Provenance has been used widely for the authenticity of data and processes. Despite having such a wide range of uses and applications, provenance poses vexing privacy and integrity challenges. Provenance data itself is, therefore, critical and it must be secured. Over the years, a number of secure provenance schemes have been proposed. This paper aims to enhance the understanding of secure provenance schemes and its associated security issues. In this paper, we have discussed why secure provenance is needed, what are its essential characteristics, and what objectives it serves? We describe the lifecycle of secure provenance and highlighted how trust is achieved in different domains by its application. Firstly, a detailed taxonomy of existing secure provenance schemes is presented. Then, a comparative analysis of existing secure provenance schemes, which highlights their strengths and weaknesses is also provided. Furthermore; we highlight future trends, which should be focused upon by the research community. |
Databáze: | OpenAIRE |
Externí odkaz: |