Synonyms
Confidentiality; Integrity; Lineage; Origin
Definition
Data provenance is information about the origins of data and its movement between databases and processes. It can be used to understand and debug the process by which data was obtained and transformed, to ensure reproducibility of results, and to establish trust. Provenance therefore has implications for both the security and privacy of the associated data. As metadata, there are also security and privacy concerns associated with provenance itself, including the integrity, confidentiality, and availability of provenance information.
Historical Background
Tracking the provenance of data within a system includes (i) capturing metadata associated with raw data that is input to the system and (ii) details of computations that transform the raw data to create new information, e.g., the sequence of steps or processes, parameter settings (in a program), and inputs and outputs of each step. Queries over provenance typically answer...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading*
Bao Z, Davidson SB, Milo T. Labeling workflow views with fine-grained dependencies. Proc VLDB Endow. 2012;5(11):1208–19.
Blaustein B, Chapman A, Seligman L, Allen MD, Rosenthal A. Surrogate parenthood: protected and informative graphs. Proc VLDB Endow. 2011;4(8):518–25.
Braun U, Shinnar A, Seltzer M. Securing provenance. In: Proceedings of the 3rd USENIX Workshop on Hot Topics in Security; 2008. p. 4:1–5.
Chebotko A, Chang S, Lu S, Fotouhi F, Yang P. Scientific workflow provenance querying with security views. In: Proceedings of the 9th International Conference on Web-Age Information Management; 2008. p. 349–56.
Cheney J. A formal framework for provenance security. In: Proceedings of the 2011 IEEE 24th Computer Security Foundations Symposium; 2011. p. 281–93.
Davidson SB, Khanna S, Milo T, Panigrahi D, Roy S. Provenance views for module privacy. In: Proceedings of the 30th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems; 2011. p. 175–86.
Davidson SB, Khanna S, Roy S, Stoyanovich J, Tannen V, Chen Y. On provenance and privacy. In: Proceedings of the 14th International Conference on Database Theory; 2011. p. 3–10.
Dey SC, Zinn D, Ludäscher B. PROPUB: Towards a declarative approach for publishing customized, policy-aware provenance. In: Proceedings of the 23rd International Conference on Scientific and Statistical Database Management; 2011. p. 225–43.
Dwork C. Differential privacy: a survey of results. In: Proceedings of the 5th Annual Conference on Theory and Applications of Models of Computation; 2008. p. 1–9.
Hasan R, Sion R, Winslett M. Introducing secure provenance: problems and challenges. In: Proceedings of the 2007 ACM Workshop on Storage Security and Survivability; 2007. p. 13–8.
Hasan R, Sion R, Winslett M. Preventing history forgery with secure provenance. Trans Storage 2009;5(4):12:1–43.
Lu R, Lin X, Liang X, Shen XS. Secure provenance: the essential of bread and butter of data forensics in cloud computing. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security; 2010. p. 282–92.
Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M. L-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data 2007;1(1):3.
Missier P, Bryans J, Gamble C, Curcin V, Dánger R. ProvAbs: model, policy, and tooling for abstracting PROV graphs. In: IPAW; 2014. p. 3–15.
Zhang J, Chapman A, LeFevre K. Do you know where your data’s been? – tamper-evident database provenance. In: SDM; 2009. p. 17–32.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media, LLC, part of Springer Nature
About this entry
Cite this entry
Davidson, S.B., Roy, S. (2018). Provenance: Privacy and Security. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_80748
Download citation
DOI: https://doi.org/10.1007/978-1-4614-8265-9_80748
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-8266-6
Online ISBN: 978-1-4614-8265-9
eBook Packages: Computer ScienceReference Module Computer Science and Engineering