Skip to main content

Study of Constructing Data Supply Chain Based on PROV

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9196))

Abstract

In the era of big data, the value of data can be better explored during data flowing and processing. If a data supply chain from the source to the destination is constructed across data platforms where data flows through, then it will help users analyze and use these data more safely and effectively. Due to the complexity and diversity of data platforms, there is no uniform data supply chain model specification. To solve the problem, we construct a distributed data supply chain model based on PROV, a data provenance specification presented by W3C to standardize information records of data activities in corresponding data platforms. On this basis, we design Data Supply Chain Service Module (DSCSM), so as to provide effective accessing methods for data traceability information on distributed platforms. Finally, we deploy the proposed model to real data platforms we built to verify the effectiveness and feasibility of solution.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Groth, P.: Transparency and reliability in the data supply chain. IEEE Internet Computing 17(2), 69–71 (2013)

    Article  Google Scholar 

  2. http://www.w3.org/TR/2013/NOTE-prov-overview-20130430/

  3. Altiparmak, F., Ferhatosmanoglu, H., Erdal, S., et al.: Information mining over heterogeneous and high-dimensional time-series data in clinical trials databases. IEEE Transactions on Information Technology in Biomedicine 10(2), 254–263 (2006)

    Google Scholar 

  4. Liu, B., Terlecky, P., Bar-Noy, A., et al.: Optimizing information credibility in social swarming applications. IEEE Transactions on Parallel and Distributed Systems 23(6), 1147–1158 (2012)

    Article  Google Scholar 

  5. Goryczka, S., Xiong, L., Fung, B.C.M.: m-Privacy for collaborative data publishing. In: 2011 7th International Conference onCollaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 1–10. IEEE (2011)

    Google Scholar 

  6. Shu, Y., Gu, Y.J., Chen, J.: Dynamic authentication with sensory information for the access control systems. IEEE Transactions on Parallel and Distributed Systems 25(2), 427–436 (2014)

    Article  Google Scholar 

  7. Buneman, P., Khanna, S., Tan, W.-C.: Why and where: a characterization of data provenance. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol. 1973, pp. 316–330. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  8. Green, T.J., Karvounarakis, G., Tannen, V.: Provenance semirings. In: Proceedings of the Twenty-sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 31–40. ACM (2007)

    Google Scholar 

  9. Ram, S., Liu, J.: A New Perspective on Semantics of Data Provenance. SWPM, 526 (2009)

    Google Scholar 

  10. Uckelmann, D.: Quantifying the value of RFID and the EPCglobal Architecture Framework in Logistics. Springer Science Business Media (2012)

    Google Scholar 

  11. Yu, G., Du, X.: Unstructured discovery service method based on extended ONS. In: 2011 International Conference on Internet Technology and Applications (iTAP), pp. 1–4. IEEE (2011)

    Google Scholar 

  12. Schuster, E.W, Allen, S.J., Brock, D.L.: Global RFID: the value of the EPC global network for supply chain management. Springer Science Business Media (2007)

    Google Scholar 

  13. Gilboa, G., Sochen, N., Zeevi, Y.Y.: Forward-and-backward diffusion processes for adaptive image enhancement and denoising. IEEE Transactions on Image Processing 11(7), 689–703 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiewei Lan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Lan, J., Liu, X., Luo, H., Li, P. (2015). Study of Constructing Data Supply Chain Based on PROV. In: Wang, Y., Xiong, H., Argamon, S., Li, X., Li, J. (eds) Big Data Computing and Communications. BigCom 2015. Lecture Notes in Computer Science(), vol 9196. Springer, Cham. https://doi.org/10.1007/978-3-319-22047-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22047-5_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22046-8

  • Online ISBN: 978-3-319-22047-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics