[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

OI Abiodun, M Alawida, AE Omolara… - Journal of King Saud …, 2022 - Elsevier
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …

Tactical provenance analysis for endpoint detection and response systems

WU Hassan, A Bates, D Marino - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Endpoint Detection and Response (EDR) tools provide visibility into sophisticated intrusions
by matching system events against known adversarial behaviors. However, current solutions …

A survey on provenance: What for? What form? What from?

M Herschel, R Diestelkämper, H Ben Lahmar - The VLDB Journal, 2017 - Springer
Provenance refers to any information describing the production process of an end product,
which can be anything from a piece of digital data to a physical object. While this survey …

Flowtags: Enforcing network-wide policies in the presence of dynamic middlebox actions

SK Fayazbakhsh, V Sekar, M Yu… - Proceedings of the second …, 2013 - dl.acm.org
Past studies show that middleboxes are a critical piece of network infrastructure for providing
security and performance guarantees. Unfortunately, the dynamic and traffic-dependent …

TrustCloud: A framework for accountability and trust in cloud computing

RKL Ko, P Jagadpramana, M Mowbray… - 2011 IEEE World …, 2011 - ieeexplore.ieee.org
The key barrier to widespread uptake of cloud computing is the lack of trust in clouds by
potential customers. While preventive controls for security and privacy are actively …

Trustworthy {Whole-System} provenance for the linux kernel

A Bates, DJ Tian, KRB Butler, T Moyer - 24th USENIX Security …, 2015 - usenix.org
In a provenance-aware system, mechanisms gather and report metadata that describes the
history of each object being processed on the system, allowing users to understand how …

SPADE: Support for provenance auditing in distributed environments

A Gehani, D Tariq - ACM/IFIP/USENIX International Conference on …, 2012 - Springer
SPADE is an open source software infrastructure for data provenance collection and
management. The underlying data model used throughout the system is graph-based …

Scaling hardware accelerated network monitoring to concurrent and dynamic queries with {* Flow}

J Sonchack, O Michel, AJ Aviv, E Keller… - 2018 USENIX Annual …, 2018 - usenix.org
Measurement plays a key role in network operation and management. An important but
unaddressed practical requirement in high speed networks is supporting concurrent …

[HTML][HTML] Titian: Data provenance support in spark

M Interlandi, K Shah, SD Tetali, MA Gulzar… - Proceedings of the …, 2015 - ncbi.nlm.nih.gov
Debugging data processing logic in Data-Intensive Scalable Computing (DISC) systems is a
difficult and time consuming effort. Today's DISC systems offer very little tooling for …

Provenance for aggregate queries

Y Amsterdamer, D Deutch, V Tannen - Proceedings of the thirtieth ACM …, 2011 - dl.acm.org
We study in this paper provenance information for queries with aggregation. Provenance
information was studied in the context of various query languages that do not allow for …