Skip to main content

Hiding Data and Structure in Workflow Provenance

  • Conference paper
Databases in Networked Information Systems (DNIS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7108))

Included in the following conference series:

Abstract

In this paper we discuss the use of views to address the problem of providing useful answers to provenance queries while ensuring that privacy concerns are met. In particular, we propose a hierarchical workflow model, based on context-free graph grammars, in which fine-grained dependencies between the inputs and outputs of a module are explicitly specified. Using this model, we examine how privacy concerns surrounding data, module function, and workflow structure can be addressed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Backstrom, L., Dwork, C., Kleinberg, J.M.: Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: WWW, pp. 181–190 (2007)

    Google Scholar 

  2. Bao, Z., Davidson, S., Milo, T.: A Fine-Grained Workflow Model with Provenance-Aware Security Views. In: Proceedings of TaPP (2011)

    Google Scholar 

  3. Beeri, C., Eyal, A., Kamenkovich, S., Milo, T.: Querying business processes. In: Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 343–354 (2006)

    Google Scholar 

  4. Biton, O., Boulakia, S.C., Davidson, S.B., Hara, C.S.: Querying and Managing Provenance through User Views in Scientific Workflows. In: ICDE, pp. 1072–1081 (2008)

    Google Scholar 

  5. Bose, R., Foster, I., Moreau, L.: Report on the International Provenance and Annotation Workshop. SIGMOD Rec. 35(3) (2006)

    Google Scholar 

  6. Bose, R., Frew, J.: Lineage retrieval for scientific data processing: a survey. ACM Comp. Surveys 37(1), 1–28 (2005)

    Article  Google Scholar 

  7. Bowers, S., Ludäscher, B.: Actor-oriented design of scientific workflows. In: Int. Conf. on Concept. Modeling, pp. 369–384 (2005)

    Google Scholar 

  8. Campan, A., Truta, T.M.: A clustering approach for data and structural anonymity in social networks. In: PinKDD (2008)

    Google Scholar 

  9. Davidson, S.B., Boulakia, S.C., Eyal, A., Ludäscher, B., McPhillips, T.M., Bowers, S., Anand, M.K., Freire, J.: Provenance in scientific workflow systems. IEEE Data Eng. Bull. 30(4), 44–50 (2007)

    Google Scholar 

  10. Davidson, S.B., Khanna, S., Milo, T., Panigrahi, D., Roy, S.: Provenance views for module privacy. In: Proceedings of the 30th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 175–186 (2011)

    Google Scholar 

  11. Davidson, S.B., Khanna, S., Panigrahi, D., Roy, S.: Preserving module privacy in workflow provenance (2010) (manuscript), http://arxiv.org/abs/1005.5543

  12. Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Freire, J., Silva, C.T., Callahan, S.P., Santos, E., Scheidegger, C.E., Vo, H.T.: Managing Rapidly-Evolving Scientific Workflows. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 10–18. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  14. Korolova, A., Motwani, R., Nabar, S.U., Xu, Y.: Link privacy in social networks. In: CIKM, pp. 289–298. ACM, New York (2008)

    Chapter  Google Scholar 

  15. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3 (2007)

    Article  Google Scholar 

  16. Machanavajjhala, A., Korolova, A., Sarma, A.D.: Personalized social recommendations: accurate or private. Proc. VLDB Endow. 4, 440–450 (2011)

    Article  Google Scholar 

  17. Moreau, L., Freire, J., Futrelle, J., McGrath, R.E., Myers, J., Paulson, P.: The Open Provenance Model: An overview. In: Freire, J., Koop, D., Moreau, L. (eds.) IPAW 2008. LNCS, vol. 5272, pp. 323–326. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  18. Moreau, L., Ludäscher, B. (eds.): Concurrency and Computation: Practice and Experience – Special Issue on the First Provenance Challenge. Wiley (2007), http://twiki.ipaw.info/bin/view/Challenge/

  19. Oinn, T., Addis, M., Ferris, J., Marvin, D., Senger, M., Greenwood, R., Carver, K., Pocock, M.G., Wipat, A., Li, P.: Taverna: a tool for the composition and enactment of bioinformatics workflows. Bioinformatics 20(1), 3045–3054 (2003)

    Google Scholar 

  20. Rastogi, V., Hay, M., Miklau, G., Suciu, D.: Relationship privacy: output perturbation for queries with joins. In: PODS, pp. 107–116 (2009)

    Google Scholar 

  21. Samarati, P., De Capitani di Vimercati, S., Paraboschi, S.: Access control: principles and solutions. Software—Practice and Experience 33(5), 397–421 (2003)

    Article  Google Scholar 

  22. Shawn Bowers, B.L., McPhillips, T.M.: Provenance in collection-oriented scientific workflows. Concurrency and Computation: Practice and Experience 20(5), 519–529 (2008)

    Article  Google Scholar 

  23. Simmhan, Y., Plale, B., Gannon, D.: A survey of data provenance in e-science. SIGMOD Rec. 34(3), 31–36 (2005)

    Article  Google Scholar 

  24. Sroka, J., Hidders, J., Missier, P., Goble, C.A.: A formal semantics for the Taverna 2 workflow model. J. Comput. Syst. Sci. 76(6), 490–508 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  25. Stoyanovich, J., Pe’er, I.: MutaGeneSys: estimating individual disease susceptibility based on genome-wide SNP array data. Bioinformatics 24(3), 440–442 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Davidson, S., Bao, Z., Roy, S. (2011). Hiding Data and Structure in Workflow Provenance. In: Kikuchi, S., Madaan, A., Sachdeva, S., Bhalla, S. (eds) Databases in Networked Information Systems. DNIS 2011. Lecture Notes in Computer Science, vol 7108. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25731-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25731-5_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25730-8

  • Online ISBN: 978-3-642-25731-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics