A Roadmap for Privacy-Enhanced Secure Data Provenance

Abstract

The notion of data provenance was formally introduced a decade ago and has since been investigated, but mainly from a functional perspective, which follows the histor- ical pattern of introducing new technologies with the expectation that security and privacy can be added later. Despite very recent interests from the cyber security community on some specific aspects of data provenance, there is no long-haul, overarching, systematic frame- work for the security and privacy of provenance. The importance of secure provenance R&D

Keywords

Data provenance · Security · Privacy · Trustworthy computing · Cryptography and access control · Risk management · Accountability and compliance

Date of this Version

5-2014

DOI

10.1007/s10844-014-0322-7

Share

COinS