Skip to main content
Log in

Data provenance in SOA: security, reliability, and integrity

  • Original Research Paper
  • Published:
Service Oriented Computing and Applications Aims and scope Submit manuscript

Abstract

Due to the dynamic nature, such as services composition and evaluation, it is critical for a Service-Oriented Architecture (SOA) system to consider its data provenance, which concerns security, reliability, and integrity of data as they are being routed in the system. In a traditional software system, one focuses on the software itself to determine the security, reliability, and integrity of the software. In an SOA system, however, one also needs to consider origins and routes of data and their impact, i.e., data provenance. This paper first analyzes the unique nature and characteristics of data provenance in an SOA system, particularly related to data security, reliability, and integrity. Then it proposes a new framework for data provenance analysis in an SOA system. Finally, this paper uses an example which illustrates these techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Altova, Altova XMLSpy® 2005. http://www.altova.com/products_ide.html

  2. Bell D, LaPadula L (1976) Secure computer system: unified exposition and multics interpretation. Technical Report, MITRE Corporation

  3. Bishop M (2002) Computer security: art and science

  4. Bose R and Frew J (2005). Lineage retrieval for scientific data processing: a survey. ACM Comput Surv 37(1): 1–28

    Article  Google Scholar 

  5. Bunemaaan P, Khanna S, Tan WC (2001) Why and where: a characterization of data provenance. In: ICDT

  6. Chappell D (2004) Enterprise Service Bus. O’ Reilly Media, Sebastopal

  7. Chen Y, Tsai WT (2007) Distributed software development in service-oriented paradigm. Manuscript, http://asusrl.eas.asu.edu/share/services/book/DSDinSOP.pdf

  8. Chen L, Tan V, Xu F, Biller A (2005) A proof of concept: provenance in a service oriented architecture. In: Proceedings of the Fourth All Hands Meeting (AHM)

  9. Clarke DG, Clark DM (1975) Lineage, in elements of spatial data quality. In: Guptill SC, Morrison JL (eds) Elsevier Science, Oxford pp 13–30

  10. DCIO, DOD OASD NII (2004) Net-Centric Checklist”, version 2.1.2, March 31st, 2004

  11. Dikmans L (2007) Testing BPEL in the real world. http://www.oracle.com/technology/oramag/oracle/07-nov/067bpel.html

  12. Foster I, Vockler J, Wilde M, Zhao Y (2002) Chimera: a virtual data system for representing, querying, and automating data derivation. In: Proc. of scientific and statistical database management

  13. GAO (2002) Assessing the reliability of computer-processed data. External Version 1

  14. Goble C (2002) Position Statement: Musings on Provenance, Workflow and (Semantic Web) Annotations for Bioinformatics. In: Workshop on data derivation and provenance, Chicago

  15. Goguen J, Meseguer J (1982) Security policies and security models. In: Proceedings of the symposium on security and privacy. IEEE Computer Society

  16. Goguen J, Meseguer J (1984) Unwinding and Inference Control. In: Proceedings of 1984 IEEE symposium on security and privacy, Oakland, pp 75–86

  17. Groth P, Luck M, Moreau L (2004) A protocol for recording provenance in service-oriented grids. In: Proc. of 8th international conference on principles of distributed systems (OPODOS’04)

  18. Hwang KW (2006) Information services in service oriented architecture—challenges and opportunities. Keynote of SEKE’06. http://www.ksi.edu/seke/keynote/SEKE2006-KW.pdf

  19. IBM (2007) IBM Systems z9 Enterprise class. Retrieved at http://www-03.ibm.com/systems/z/z9ec/

  20. IBM (2007) Service data objects. Retrieved at http://www-128.ibm.com/developerworks/webservices/library/specification/ws-sdo/

  21. Jordan D, Evdemon J (2007) Web Services Business Process Execution Language Version 2.0, OASIS, http://docs.oasis-open.org/wsbpel/2.0/wsbpel-v2.0.html

  22. Kernochan W (2006) Mainframe security changes as Web services arrive. Retrieved at http://searchwebservices.techtarget.com/tip/0,289483,sid26_gci1202408,00.htm

  23. Laskey KJ (2005) Metadata concepts to support a net-centric data environment. Technical Report, MITRE

  24. Lanter DP (1991) Design of a lineage-based meta-data base for GIS. In: Cartography and geographic information systems, vol 18

  25. Miles S, Groth P, Branco M, Moreau L (2005) The requirements of recording and using provenance in e-Science experiments. Technical Report, Electronics and Computer Science, University of Southampton

  26. Muniswamy-Reddy KK (2006) Deciding how to store provenance. Techni Technical Report TR-03-06, Harvard University, vol 18

  27. Parasoft, SOAP Test Data Sheet. http://www.parasoft.com/jsp/products/quick_facts.jsp?product=SOAP

  28. Paul R (2005) DoD towards software services. In: Proc. of 10th IEEE international workshop on object-oriented real-time dependable systems (WORDS 05), pp 3–6

  29. Paul R, Tsai WT, Bayne J (2005) The impact of SOA policy-based computing on C2 interoperation and computing. In: 10th international command and control research and technology symposium (ICCRTS), McLean, Virginia

  30. Portougal V, Sundaram D (2005) Business processes: operational solutions for SAP implementation. IMR Press, Hershey

  31. Rajbhandari S, Walker DW (2004) Support for provenance in a service-based computing grid. In: UK e-Science All Hands Meeting

  32. O’Reilly T (2005) What is Web 2.0: design patterns and business models for the next generation of software. http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html?page=1

  33. Ross S (1970). Applied probability models with optimizing applications. Holden-Day, San Francisco

    Google Scholar 

  34. Simmhan YL, Plale B and Gannon D (2005). A survey of data provenance in e-science. SIGMOD Rec 34(3): 31–36

    Article  Google Scholar 

  35. Simmhan YL, Plale B, Gannon D, Marru S (2006) A framework for collecting provenance in data-centric scientific workflows. In: Intl WWW Conference, SPARWAR, SPARWAR/PEO C4 I& space SBIR panel review. Presentation slides

  36. Tan V, Groth P, Miles S, Jiang S, Munroe S, Tsasakou S, Moreau L (2006) Security issues in a SOA-based provenance system. In: Proceedings of the international provenance and annotation workshop 2006 (IPAW 2006)

  37. Tidwell D (2001) UDDI4J: matchmaking for Web services. http://www-106.ibm.com/developerworks/library/ws-uddi4j.html

  38. Tsai WT (2004) Integrated ACDATE / scenario model: the meta model. Technical Report, Department of Computer Science, Arizona State University

  39. Tsai WT (2005) Service-oriented system engineering: a new paradigm. In: IEEE international workshop on service-oriented system engineering (SOSE), Beijing, pp 3–8

  40. Tsai WT, Bai X, Chen Y, Zhou X (2005) Web service group testing with windowing mechanisms. In: IEEE international workshop on service-oriented system engineering (SOSE), Beijing, pp 213–218

  41. Tsai WT, Chen Y, Paul R, Huang H, Zhou X, Wei X (2005) Adaptive testing, Oracle generation, and test script ranking for Web services. In: 29th annual international computer software and applications conference (COMPSAC), Edinburgh, Scotland, pp 101–106

  42. Tsai WT, Lee YH, Cao Z, Chen Y, Xiao B (2006) Real-time service-oriented architecture. Department of Computer Science and Engineering, Arizona State University, Tempe

  43. Tsai WT, Liu X, Chen Y (2005) Distributed policy specification and enforcement in service-oriented business systems. In: IEEE international conference on e-Business engineering (ICEBE), Beijing, pp 10–17

  44. Tsai WT, Paul RA, Xiao B, Cao Z, Chen Y (2005) PSML-S: a process specification and modeling language for service oriented computing. In: The 9th IASTED international conference on software engineering and applications (sEA), Phoenix, pp 160–167

  45. Tsai WT, Song W, Paul R, Cao Z, Huang H (2004) Services- oriented dynamic reconfiguration framework for dependable distributed computing. COMPSAC, pp 554–559

  46. Tsai WT, Zhang D, Chen Y, Huang H, Paul R, Liao N (2004) A software reliability model for Web services. In: the 8th IASTED international conference on software engineering and applications, Cambridge, pp 144–149

  47. Vasquez I, Gomadam K, Patterson S (2005) Framework for representing provenance for Web services and processes. Technical Report, LSDIS Lab

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yinong Chen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tsai, W.T., Wei, X., Chen, Y. et al. Data provenance in SOA: security, reliability, and integrity. SOCA 1, 223–247 (2007). https://doi.org/10.1007/s11761-007-0018-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11761-007-0018-8

Keywords

Navigation