R. Hasan, W. Yurcik, and S. Myagmar. StorageSS '05: Proceedings of the 2005 ACM workshop on Storage security and survivability, page 1--8. New York, NY, USA, ACM, (2005)
R. Hasan, R. Sion, and M. Winslett. Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST), (2009)As increasing amounts of valuable information are produced and persist
digitally, the ability to determine the origin of data becomes
important. In science, medicine, commerce, and government, data
provenance tracking is essential for rights protection, regulatory
compliance, management of intelligence and medical data, and
authentication of information as it flows through workplace tasks.
While significant research has been conducted in this area, the
associated security and privacy issues have not been explored, leaving
provenance information vulnerable to illicit alteration as it passes
through untrusted environments.
In this talk, we show how to provide strong integrity and
confidentiality assurances for data provenance information in an
untrusted distributed environment. We describe our provenance-aware
system prototype that implements provenance tracking of data writes at
the application layer, which makes it extremely easy to deploy. We
present empirical results that show that, for typical real-life
workloads, the run-time overhead of our approach to recording
provenance with confidentiality and integrity guarantees ranges from
1% - 13%..
R. Hasan, Z. Anwar, W. Yurcik, L. Brumbaugh, and R. Campbell. ITCC '05: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, page 205--213. Washington, DC, USA, IEEE Computer Society, (2005)
M. Szomszor, and L. Moreau. Proc. of the International Conference on Ontologies, Databases and Applications of SEmantics (ODBASE), volume 2888 of Lecture Notes in Computer Science, page 603--620. Catania, Sicily, Italy, (November 2003)
J. Holt. Proc. of the Australasian workshops on Grid computing and e-research, page 203--211. Darlinghurst, Australia, Australian Computer Society, Inc., (2006)
R. Hasan, S. Myagmar, A. Lee, and W. Yurcik. StorageSS '05: Proceedings of the 2005 ACM workshop on Storage security and survivability, page 94--102. New York, NY, USA, ACM, (2005)
R. Barga, and L. Digiampietri. Proc. of the International Provenance and Annotation Workshop, volume 4145 of Lecture Notes in Computer Science, page 1--9. Springer, (2006)
P. Buneman, A. Chapman, J. Cheney, and S. Vansummeren. International Provenance and Annotation Workshop, volume 4145 of Lecture Notes in Computer Science, page 162-170. Springer, (2006)