[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

OI Abiodun, M Alawida, AE Omolara… - Journal of King Saud …, 2022 - Elsevier
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …

The foundations for provenance on the web

L Moreau - Foundations and Trends® in Web Science, 2010 - nowpublishers.com
Provenance, ie, the origin or source of something, is becoming an important concern, since it
offers the means to verify data products, to infer their quality, to analyse the processes that …

Towards secure provenance-based access control in cloud environments

A Bates, B Mood, M Valafar, K Butler - … of the third ACM conference on …, 2013 - dl.acm.org
As organizations become increasingly reliant on cloud computing for servicing their data
storage requirements, the need to govern access control at finer granularities becomes …

Security and data accountability in distributed systems: A provenance survey

YS Tan, RKL Ko, G Holmes - 2013 IEEE 10th International …, 2013 - ieeexplore.ieee.org
While provenance research is common in distributed systems, many proposed solutions do
not address the security of systems and accountability of data stored in those systems. In this …

A language for provenance access control

T Cadenhead, V Khadilkar, M Kantarcioglu… - Proceedings of the first …, 2011 - dl.acm.org
Provenance is a directed acyclic graph that explains how a resource came to be in its
current form. Traditional access control does not support provenance graphs. We cannot …

Sparkac: Fine-grained access control in spark for secure data sharing and analytics

T Xue, Y Wen, B Luo, G Li, Y Li, B Zhang… - … on Dependable and …, 2022 - ieeexplore.ieee.org
With the development of computing and communication technologies, an extremely large
amount of data has been collected, stored, utilized, and shared, while new security and …

Sciblock: A blockchain-based tamper-proof non-repudiable storage for scientific workflow provenance

D Fernando, S Kulshrestha, JD Herath… - 2019 IEEE 5th …, 2019 - ieeexplore.ieee.org
Modern scientific workflow systems lack strong support for protecting the scientific data and
their provenance from being forged or altered. As a result, scientists may be misled into …

[KNIHA][B] Big data analytics with applications in insider threat detection

B Thuraisingham, P Parveen, MM Masud, L Khan - 2017 - taylorfrancis.com
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is
more intelligent, learning and adapting to new computer defenses on the fly. Using the same …

Towards provenance-based anomaly detection in MapReduce

C Liao, A Squicciarini - … Symposium on Cluster, Cloud and Grid …, 2015 - ieeexplore.ieee.org
MapReduce enables parallel and distributed processing of vast amount of data on a cluster
of machines. However, such computing paradigm is subject to threats posed by malicious …

Plus: A provenance manager for integrated information

A Chapman, BT Blaustein, L Seligman… - … on Information Reuse …, 2011 - ieeexplore.ieee.org
It can be difficult to fully understand the result of integrating information from diverse sources.
When all the information comes from a single organization, there is a collective knowledge …