Advertisement

A Privacy-Aware Semantic Model for Provenance Management

  • Ozgu Can
  • Dilek Yilmazer
Part of the Communications in Computer and Information Science book series (CCIS, volume 478)

Abstract

The history of data has a crucial importance almost in every scientific application. In order to trust the correctness of data, the ability to determine the origin of data becomes an important issue. Provenance information summarizes the origin of items, the history of the ownership of items and the actions performed on them. Ensuring that data is kept safe from corruption or illegal accesses and detecting privacy breaches on data should be achieved by integrating provenance concepts with security concepts. Information such as an individual’s infectious disease history is highly sensitive and should not be revealed to an unauthorized user. This historical data needs privacy. We propose a privacy-aware provenance management model by creating policies and querying provenance data to detect policy violations. We illustrate our proposed model by integrating it with infectious disease and vaccination domains.

Keywords

Provenance Management Process Tracking Semantic Web Healthcare Information Systems 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Hasan, R., Sion, R., Winslett, M.: Introducing Secure Provenance: Problems and Challenges. In: Proc. of ACM Workshop on Storage Security and Survivability, pp. 13–18 (2007)Google Scholar
  2. 2.
    Cheney, J., Chiticariu, L., Tan, W.-C.: Provenance in Databases: Why, How, and Where. Foundations and Trends in Databases 1(4), 379–474 (2007)CrossRefGoogle Scholar
  3. 3.
    Braun, U., Shinnar, A.: A Security Model for Provenance. Technical Report, TR-04-06, Harvard University (2006)Google Scholar
  4. 4.
    Hasan, R., Sion, R., Winslett, M.: The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance. In: Proc. of the 7th USENIX Conf. on File and Storage Technologies, pp. 1–14 (2009)Google Scholar
  5. 5.
    Tan, W.-C.: Provenance in Databases: Past, Current, and Future. IEEE Data Eng. Bull. 30(4), 3–12 (2007)Google Scholar
  6. 6.
    Davidson, S.B., Freire, J.: Provenance and scientific workflows: challenges and opportunities. In: Proc. of the ACM SIGMOD Int. Conf. on Management of Data, pp. 1345–1350 (2008)Google Scholar
  7. 7.
    Sahoo, S.S., Sheth, A., Henson, C.: Semantic Provenance for eScience:Managing the Deluge of Scientific Data. IEEE Internet Computing 12(4), 46–54 (2008)CrossRefGoogle Scholar
  8. 8.
    Halpin, H.: Provenance: The Missing Component of the Semantic Web for Privacy and Trust. In: Workshop on Trust & Privacy on the Social and Semantic Web (2009)Google Scholar
  9. 9.
    Ni, Q., Xu, S., Bertino, E., Sandhu, R., Han, W.: An Access Control Language for a General Provenance Model. In: Jonker, W., Petković, M. (eds.) SDM 2009. LNCS, vol. 5776, pp. 68–88. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  10. 10.
    Ringelstein, C., Staab, S.: Papel: Provenance-Aware Policy Definition and Execution. IEEE Internet Computing 15(1), 49–58 (2011)CrossRefGoogle Scholar
  11. 11.
    Freitas, A., Knap, T., O’Riain, S., Curry, E.: W3P: Building an OPM based provenance model for the Web. Journal Future Generation Computer System 27(6), 766–774 (2011)CrossRefGoogle Scholar
  12. 12.
    Davidson, S.B.: On provenance and privacy. In: McGuinness, D.L., Michaelis, J.R., Moreau, L. (eds.) IPAW 2010. LNCS, vol. 6378, pp. 1–1. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  13. 13.
    Park, J., Nguyen, D., Sandhu, R.: A Provenance-based Access Control Model. In: 10th Annual Int. Conf. on Privacy, Security and Trust, pp. 137–144 (2012)Google Scholar
  14. 14.
    Kifor, T., Varga, L.Z., et al.: Privacy Issues of Provenance in Electronic Healthcare Record System. Journal of Autonomic and Trusted Computing (2007)Google Scholar
  15. 15.
    Álvarez, S., Vázquez-Salceda, J., Kifor, T., Varga, L.Z., Willmott, S.: Applying Provenance in Distributed Organ Transplant Management. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 28–36. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  16. 16.
    Moreau, L., Clifford, B., et al.: The Open Provenance Model Core Specification (v1.1). Future Generation Computer Systems 27(6), 743–756 (2011)CrossRefGoogle Scholar
  17. 17.
    Miles, S., Moreau, L., Futrelle, J.: OPM Profile for Dublin Core Terms, v0.3 (2009), http://twiki.ipaw.info/pub/OPM/ChangeProposalDublinCoreMapping/dcprofile.pdf
  18. 18.
    Goldfain, A., Smith, B., Cowell, L.G.: Dispositions and the Infectious Disease Ontology. In: Proc. of the FOIS 2010, pp. 400–413 (2010)Google Scholar
  19. 19.
    Can, O., Sezer, E., Bursa, O., Unalir, M.O.: Personalized Vaccination Using Ontology Based Profiling. In: Garoufallou, E., Greenberg, J. (eds.) MTSR 2013. CCIS, vol. 390, pp. 213–224. Springer, Heidelberg (2013)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Ozgu Can
    • 1
  • Dilek Yilmazer
    • 1
  1. 1.Department of Computer EngineeringEge UniversityBornova-IzmirTurkey

Personalised recommendations