[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

OI Abiodun, M Alawida, AE Omolara… - Journal of King Saud …, 2022 - Elsevier
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …

Big data challenge: a data management perspective

J Chen, Y Chen, X Du, C Li, J Lu, S Zhao… - Frontiers of computer …, 2013 - Springer
There is a trend that, virtually everyone, ranging from big Web companies to traditional
enterprisers to physical science researchers to social scientists, is either already …

Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability

X Liang, S Shetty, D Tosh, C Kamhoua… - 2017 17th IEEE/ACM …, 2017 - ieeexplore.ieee.org
Cloud data provenance is metadata that records the history of the creation and operations
performed on a cloud data object. Secure data provenance is crucial for data accountability …

A survey on provenance: What for? What form? What from?

M Herschel, R Diestelkämper, H Ben Lahmar - The VLDB Journal, 2017 - Springer
Provenance refers to any information describing the production process of an end product,
which can be anything from a piece of digital data to a physical object. While this survey …

Information security in big data: privacy and data mining

L Xu, C Jiang, J Wang, J Yuan, Y Ren - Ieee Access, 2014 - ieeexplore.ieee.org
The growing popularity and development of data mining technologies bring serious threat to
the security of individual,'s sensitive information. An emerging research topic in data mining …

[PDF][PDF] Spark: Cluster computing with working sets

M Zaharia, M Chowdhury, MJ Franklin… - 2nd USENIX workshop …, 2010 - usenix.org
MapReduce and its variants have been highly successful in implementing large-scale data-
intensive applications on commodity clusters. However, most of these systems are built …

A methodology for adaptable and robust ecosystem services assessment

F Villa, KJ Bagstad, B Voigt, GW Johnson, R Portela… - PloS one, 2014 - journals.plos.org
Ecosystem Services (ES) are an established conceptual framework for attributing value to
the benefits that nature provides to humans. As the promise of robust ES-driven …

Cloud computing and grid computing 360-degree compared

I Foster, Y Zhao, I Raicu, S Lu - 2008 grid computing …, 2008 - ieeexplore.ieee.org
Cloud computing has become another buzzword after Web 2.0. However, there are dozens
of different definitions for cloud computing and there seems to be no consensus on what a …

Provenance in databases: Why, how, and where

J Cheney, L Chiticariu, WC Tan - Foundations and Trends® …, 2009 - nowpublishers.com
Different notions of provenance for database queries have been proposed and studied in
the past few years. In this article, we detail three main notions of database provenance …

A survey on secure data analytics in edge computing

D Liu, Z Yan, W Ding… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is gaining increasing popularity. Overwhelming volumes of data are
generated by IoT devices. Those data after analytics provide significant information that …