Advertisement

Provenance-Aware NoSQL Databases

  • Anu Mary ChackoEmail author
  • Munavar Fairooz
  • S. D. Madhu Kumar
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 625)

Abstract

NoSQL stores are very widely used for BigData Analytics. These stores are built with inherent scalability and fault tolerance. But there are not much mechanism to provide security guarantees like integrity and auditability. Provenance is a metadata which captures the details of how the data reached its current state. By way of capturing provenance it is possible to enhance the functionality of NoSQL stores to verify the integrity of results. This paper presents an approach to capture provenance of NoSQL databases using logs generated by the database. A proof of concept was implemented in MongoDB and examples are used to illustrate the use of ‘Why provenance’ and ‘How-provenance’ captured.

Keywords

Data provenance NoSQL databases MongoDB MapReduce How-provenance Why-provenance 

References

  1. 1.
    McDaniel, P.: Data provenance and security. J. IEEE Secur. Priv. 9(2), 83–85 (2011)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Foster, I.,Vöckler, J., Wilde M., Zhao, Y.: Chimera: a virtual data system for representing, querying, and automating data derivation. In: Proceedings of the 14th Conference on Scientific and Statistical Database Management (2002)Google Scholar
  3. 3.
    Ikeda, R., Salihoglu, S., Widom, J.: Provenance- based refresh in data-oriented workflows. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management (2011)Google Scholar
  4. 4.
    Moreau, L., Groth, P., Miles, S., Vazquez, J., Ibbotson, J., Jiang, S., Munroe, S., Rana, O., Schreiber, A., Tan, V., Varga, L.: The provenance of electronic data. Commun. ACM 51(4), 52–58 (2008)CrossRefGoogle Scholar
  5. 5.
    Muniswamy-Reddy, K., Holland, D., Braun, U., Seltzer, M.: Provenance-aware storage systems. In: Proceedings of the 2006 USENIX Annual Technical Conference, Boston, June 2006Google Scholar
  6. 6.
    Glavic, B., Dittrich, K.R.: Data provenance: a categorization of existing approaches. In: Proceedings of the 12th GI Conference on Datenbanksysteme in Buisness, Technologie and Web (BTW) (2007)Google Scholar
  7. 7.
    Cheney, J., Chiticariu, L., Tan, W.-C.: Provenance in databases: why, where and how. Found. Trends Databases 1(4), 379–474 (2009)CrossRefGoogle Scholar
  8. 8.
    Galvic, B.: Perm: efficient provenance support for relational databases. Ph.D. thesis, University of Zurich (2010)Google Scholar
  9. 9.
    Kulkarni, D.: A provenance model for key-value systems. In: TaPP 2013 Proceedings of the 5th USENIX Workshop on the Theory and Practice of Provenance (2013)Google Scholar
  10. 10.
    Park, H., Ikeda, R., Widom, J.: RAMP: a system for capturing and tracing provenance in MapReduce workflows. In: International Conference on Very Large Data Bases, pp. 1351–1354 (2011)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2016

Authors and Affiliations

  • Anu Mary Chacko
    • 1
    Email author
  • Munavar Fairooz
    • 1
  • S. D. Madhu Kumar
    • 1
  1. 1.National Institute of Technology CalicutKozhikodeIndia

Personalised recommendations