Advertisement

Making an Application Provenance-Aware through UML – A General Scheme

  • P. Badharudheen
  • Anu Mary Chacko
  • S. D. Madhu Kumar
Part of the Communications in Computer and Information Science book series (CCIS, volume 420)

Abstract

An application is said to be provenance-aware when it monitors and captures the information regrading the activities of each and every process in that application. The provenance of a data item includes information about the processes and source data items that lead to its creation and current representation. This type of information or the metadata about the activities of each and every object in the application is very much important for the security purpose. The provenance information ensures the integrity of the data items and the objects involved in the application. Our approach enables an application to track the activities of each and every object involved in the application and captures the state changes of the objects into a permanent store. This information can later be queried by a Data Analyst whenever an attack by an intruder occurs into the application database. Majority of the provenance systems designed are domain specific. The methods available already for capturing the provenance are highly application specific. So there is a need to have a general methodology for capturing the provenance information automatically from the application while the application is under execution. In this paper, we present a general methodology for making an application provenance-aware by using the basic UML design diagrams of the application.

Keywords

Data Item Class Diagram Software Product Line Application Execution Provenance Information 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Vahdat, A., Anderson, T.: Transparent result caching. In: Proceedings of the Annual Conference on USENIX Annual Technical Conference, ATEC 1998, p. 3. USENIX Association, Berkeley (1998)Google Scholar
  2. 2.
    Zhao, J., Goble, C., Greenwood, M., Wroe, C., Stevens, R.: Annotating, linking, and browsing provenance logs for e-science. In: Proc. of the Workshop on Semantic Web Technologies for Searching and Retrieving Scientific Data, pp. 158–176 (2003)Google Scholar
  3. 3.
    Lanter, D.P.: Lineage in GIS: The Problem and a Solution. Technical paper. National Center for Geographic Information and Analysis (1990)Google Scholar
  4. 4.
    Foster, I., Vockler, J., Wilde, M., Zhao, Y.: Chimera: a virtual data system for representing, querying, and automating data derivation. In: Proceedings of the 14th International Conference on Scientific and Statistical Database Management, pp. 37–46 (2002)Google Scholar
  5. 5.
    Buneman, P., Khanna, S., Tan, W.-C.: Why and Where: A Characterization of Data Provenance. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol. 1973, p. 316. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  6. 6.
    Chiticariu, L., Tan, W.-C., Vijayvargiya, G.: DBNotes: a post-it system for relational databases based on provenance. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, SIGMOD 2005, pp. 942–944. ACM, New York (2005)Google Scholar
  7. 7.
    Miles, S., Groth, P., Munroe, S., Moreau, L.: Prime: A Methodology for Developing Provenance-aware Applications. ACM Trans. Softw. Eng. Methodol. 20(3), 8:1–8:42 (2011)Google Scholar
  8. 8.
    Badharudheen, P., Chacko, A.M., Madhukumar, S.D.: A Scheme for Generating Provenance-aware Applications Through UML. International Journal of Management and Information Technology 6(3) (2013)Google Scholar
  9. 9.
    Lanceloti, L.A., Maldonado, J.C., Gimenes, I.M.S., Oliveira Jr., E.A.: Smartyparser: a xmi parser for uml-based software product line variability models. In: Proceedings of the Seventh International Workshop on Variability Modelling of Software-intensive Systems, VaMoS 2013, pp. 10:1–10:5. ACM, New York (2013)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • P. Badharudheen
    • 1
  • Anu Mary Chacko
    • 2
  • S. D. Madhu Kumar
    • 2
  1. 1.Dept. of ITMES College of Engg.KuttippuramIndia
  2. 2.Dept. of CSENIT CalicutIndia

Personalised recommendations