A Roadmap for Privacy-Enhanced Secure Data Provenance
Abstract
The notion of data provenance was formally introduced a decade ago and has since been investigated, but mainly from a functional perspective, which follows the histor- ical pattern of introducing new technologies with the expectation that security and privacy can be added later. Despite very recent interests from the cyber security community on some specific aspects of data provenance, there is no long-haul, overarching, systematic frame- work for the security and privacy of provenance. The importance of secure provenance R&D
Keywords
Data provenance · Security · Privacy · Trustworthy computing · Cryptography and access control · Risk management · Accountability and compliance
Date of this Version
5-2014
DOI
10.1007/s10844-014-0322-7