D. Ellard, J. Ledlie, P. Malkani, and M. Seltzer. Proc. of the 2nd USENIX Conference on File and Storage Technologies (FAST), page 203--216. Berkeley, CA, USA, USENIX Assoc., (2003)
N. Agrawal, W. Bolosky, J. Douceur, and J. Lorch. Proc. of the 5th USENIX conference on File and Storage Technologies (FAST), Berkeley, CA, USA, USENIX Assoc., (2007)
J. Douceur, and W. Bolosky. Proc. of the ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS), page 59--70. ACM Press, (1999)
Z. Peterson, R. Burns, G. Ateniese, and S. Bono. Proc. of the 5th USENIX conference on File and Storage Technologies (FAST '07), page 93--106. Berkeley, CA, USA, USENIX Assoc., (2007)
J. Holt. Proc. of the Australasian workshops on Grid computing and e-research, page 203--211. Darlinghurst, Australia, Australian Computer Society, Inc., (2006)
R. Snodgrass, S. Yao, and C. Collberg. Proc. of the 30th International Conference on Very Large Data Bases (VLDB), page 504--515. VLDB Endowment, (2004)
R. Hasan, R. Sion, and M. Winslett. Proc. of the ACM workshop on Storage security and survivability (StorageSS), page 13--18. New York, NY, USA, ACM, (2007)
M. Szomszor, and L. Moreau. Proc. of the International Conference on Ontologies, Databases and Applications of SEmantics (ODBASE), volume 2888 of Lecture Notes in Computer Science, page 603--620. Catania, Sicily, Italy, (November 2003)
P. Buneman, S. Khanna, and W. Tan. Proc. of the 20th Conference on Foundations of Software Technology and Theoretical Computer Science (FST TCS), page 87--93. London, UK, Springer-Verlag, (2000)
J. Frew, and R. Bose. Proc. of the 13th International Conference on Scientific and Statistical Database Management (SSDBM), page 180. Washington, DC, USA, IEEE Computer Society, (2001)
J. Myers, and et al. Proc. of the 2nd International Workshop on Challenges of Large Applications in Distributed Environments (CLADE), page 24. Washington, DC, USA, IEEE Computer Society, (2004)
J. Zhao, C. Goble, R. Stevens, and S. Bechhofer. Proc. of the 1st International IFIP Conference on Semantics of a Networked World (ICSNW), page 158-176. (2004)
I. Foster, J. Vockler, M. Wilde, and Y. Zhao. Proc. of the 14th International Conference on Scientific and Statistical Database Management (SSDBM), page 37--46. Washington, DC, USA, IEEE Computer Society, (2002)
P. Buneman, A. Chapman, and J. Cheney. Proc. of the ACM International Conference on Management of Data (SIGMOD), page 539--550. New York, NY, USA, ACM Press, (2006)
P. Groth, S. Miles, and S. Munroe. International Provenance and Annotation Workshop, volume 4145 of Lecture Notes in Computer Science, page 278-286. Springer, (2006)
I. Khan, R. Schroeter, and J. Hunter. International Provenance and Annotation Workshop, volume 4145 of Lecture Notes in Computer Science, page 212-221. Springer, (2006)
P. Buneman, A. Chapman, J. Cheney, and S. Vansummeren. International Provenance and Annotation Workshop, volume 4145 of Lecture Notes in Computer Science, page 162-170. Springer, (2006)
N. Vijayakumar, and B. Plale. International Provenance and Annotation Workshop, volume 4145 of Lecture Notes in Computer Science, page 46-54. Springer, (2006)
D. Bourilkov, V. Khandelwal, A. Kulkarni, and S. Totala. International Provenance and Annotation Workshop, volume 4145 of Lecture Notes in Computer Science, page 19-27. Springer, (2006)
R. Barga, and L. Digiampietri. Proc. of the International Provenance and Annotation Workshop, volume 4145 of Lecture Notes in Computer Science, page 1--9. Springer, (2006)
D. Halevy, and A. Shamir. Proc. of the 22nd Annual International Cryptology Conference on Advances in Cryptology (CRYPTO), page 47--60. London, UK, Springer-Verlag, (2002)
R. Hasan, R. Sion, and M. Winslett. Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST), (2009)As increasing amounts of valuable information are produced and persist
digitally, the ability to determine the origin of data becomes
important. In science, medicine, commerce, and government, data
provenance tracking is essential for rights protection, regulatory
compliance, management of intelligence and medical data, and
authentication of information as it flows through workplace tasks.
While significant research has been conducted in this area, the
associated security and privacy issues have not been explored, leaving
provenance information vulnerable to illicit alteration as it passes
through untrusted environments.
In this talk, we show how to provide strong integrity and
confidentiality assurances for data provenance information in an
untrusted distributed environment. We describe our provenance-aware
system prototype that implements provenance tracking of data writes at
the application layer, which makes it extremely easy to deploy. We
present empirical results that show that, for typical real-life
workloads, the run-time overhead of our approach to recording
provenance with confidentiality and integrity guarantees ranges from
1% - 13%..
R. Hasan, Z. Anwar, W. Yurcik, L. Brumbaugh, and R. Campbell. ITCC '05: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, page 205--213. Washington, DC, USA, IEEE Computer Society, (2005)
J. Tucek, P. Stanton, E. Haubert, R. Hasan, L. Brumbaugh, and W. Yurcik. MSST '05: Proceedings of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies, page 329--340. Washington, DC, USA, IEEE Computer Society, (2005)
R. Hasan, S. Myagmar, A. Lee, and W. Yurcik. StorageSS '05: Proceedings of the 2005 ACM workshop on Storage security and survivability, page 94--102. New York, NY, USA, ACM, (2005)
R. Hasan, W. Yurcik, and S. Myagmar. StorageSS '05: Proceedings of the 2005 ACM workshop on Storage security and survivability, page 1--8. New York, NY, USA, ACM, (2005)
R. Hasan, and W. Yurcik. StorageSS '06: Proceedings of the second ACM workshop on Storage security and survivability, page 1--8. New York, NY, USA, ACM, (2006)
R. Hasan, R. Sion, and M. Winslett. StorageSS '07: Proceedings of the 2007 ACM workshop on Storage security and survivability, page 13--18. New York, NY, USA, ACM, (2007)
R. Hasan, M. Winslett, R. Conlan, B. Slesinsky, and N. Ramani. ACSAC '08: Proceedings of the 2008 Annual Computer Security Applications Conference, page 173--182. Washington, DC, USA, IEEE Computer Society, (2008)