Lightweight Intuitive Provenance (LiP) in a distributed computing environment

ABSTRACT Distributed computing infrastructure such as cloud computing has become an essential part of computing landscape over the past years. The phenomenon is rapidly gaining an overwhelming application in several organizations due partly to its robustness and ease of use. To secure data integrity in cloud computing environment, data provenance was introduced. Current data provenance information systems mainly deal with the problems and challenges of data provenances capture, query and storage as well as their security. In this paper, we considered how to manage the volume of provenance by introducing a Lightweight Intuitive Provenance in a cloud computing environment. We introduce the arithmetic coding method to enhance the provenance compression model through a space usage model. To speed up the searching time of the provenance in our system, a time efficiency model is applied. Experimental results show that our approach is a feasible mechanism for provenance storage resource management in cloud computing environment.

[1]  Margo I. Seltzer,et al.  Provenance-Aware Storage Systems , 2006, USENIX ATC, General Track.

[2]  Xiaohua Jia,et al.  TSAS: Third-Party Storage Auditing Service , 2014 .

[3]  Yan Zhang,et al.  Classified scheduling algorithm of big data under cloud computing , 2017 .

[4]  C. SIAMJ. LOW REDUNDANCY IN STATIC DICTIONARIES WITH CONSTANT QUERY TIME , 2001 .

[5]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[6]  Paul T. Groth,et al.  PReServ: Provenance Recording for Services , 2005 .

[7]  Brajendra Panda,et al.  Provenance Tracking with Bit Vectors , 2008, 2008 The Fourth International Conference on Information Assurance and Security.

[8]  Robert Stevens,et al.  Knowledge Discovery for Biology with Taverna , 2006 .

[9]  Carole A. Goble,et al.  Data Lineage Model for Taverna Workflows with Lightweight Annotation Requirements , 2008, IPAW.

[10]  Jing Zhang,et al.  Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance , 2009, Secure Data Management.

[11]  Fouzia Benchikha,et al.  Integrating Ontological Data Sources Using Viewpoints-Based Approach , 2016, J. Comput. Inf. Technol..

[12]  Elisa Bertino,et al.  Demonstrating a lightweight data provenance for sensor networks , 2012, CCS '12.

[13]  Yang Yang,et al.  Efficient resource management techniques in cloud computing environment: a review and discussion , 2018 .

[14]  Yuqing Zhang,et al.  Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2013, IEEE Transactions on Parallel and Distributed Systems.

[15]  Margo I. Seltzer,et al.  Issues in Automatic Provenance Collection , 2006, IPAW.

[16]  Jia Zhu,et al.  Research on data mining of electric power system based on Hadoop cloud computing platform , 2017 .

[17]  Elisa Bertino,et al.  Sensor Network Provenance Compression Using Dynamic Bayesian Networks , 2017, ACM Trans. Sens. Networks.

[18]  Willem Jonker,et al.  Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings , 2010, Secure Data Management.

[19]  Wei Wu,et al.  A practical device authentication scheme using SRAM PUFs , 2012, Journal of Cryptographic Engineering.

[20]  Chen Chen,et al.  Distributed Provenance Compression , 2017, SIGMOD Conference.

[21]  Margo I. Seltzer,et al.  Provenance for the Cloud , 2010, FAST.

[22]  Elisa Bertino,et al.  A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.

[23]  James Cheney,et al.  Provenance management in curated databases , 2006, SIGMOD Conference.

[24]  Jemal H. Abawajy,et al.  Information Provenance for Open Distributed Collaborative System , 2009, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks.

[25]  Ian H. Witten,et al.  Modeling for text compression , 1989, CSUR.

[26]  Christopher Krügel,et al.  A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.

[27]  Yixin Chen,et al.  A comparison of a graph database and a relational database: a data provenance perspective , 2010, ACM SE '10.

[28]  Kan Liu,et al.  Improving reliability of cloud computing services for next generation mobile communication networks , 2018 .

[29]  Jemal H. Abawajy,et al.  A framework for scalable distributed provenance storage system , 2013, Comput. Stand. Interfaces.

[30]  Kevin R. B. Butler,et al.  Poster : Secure Provenance for Cloud Storage , 2011 .

[31]  Sherif Sakr An Experimental Investigation of XML Compression Tools , 2008, ArXiv.

[32]  John E. Davis,et al.  Sloan Digital Sky Survey: Early Data Release , 2002 .

[33]  Hai Jin,et al.  VRAS: A Lightweight Local Resource Allocation System for Virtual Machine Monitor , 2013, Wirel. Pers. Commun..

[34]  Erez Zadok,et al.  Story Book: An Efficient Extensible Provenance Framework , 2009, Workshop on the Theory and Practice of Provenance.

[35]  Hai Jin,et al.  VNIX: Managing Virtual Machines on Clusters , 2008, 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology.

[36]  Heon Young Yeom,et al.  Provenance security guarantee from origin up to now in the e-Science environment , 2011, J. Syst. Archit..

[37]  Roberto Grossi,et al.  High-order entropy-compressed text indexes , 2003, SODA '03.

[38]  Elisa Bertino,et al.  Dictionary Based Secure Provenance Compression for Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.

[39]  Roger S. Barga,et al.  Automatic capture and efficient storage of e‐Science experiment provenance , 2008, Concurr. Comput. Pract. Exp..

[40]  Jeffrey Scott Vitter,et al.  Learning in parallel , 1988, COLT '88.

[41]  Noga Alon,et al.  Scalable Secure Storage when Half the System Is Faulty , 2000, ICALP.

[42]  Juliana Freire,et al.  Provenance and scientific workflows: challenges and opportunities , 2008, SIGMOD Conference.

[43]  Fengqiong Zhang,et al.  Research on reliability analysis of computer network based on intelligent cloud computing method , 2017 .

[44]  Dr Tirumala Rao,et al.  Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2017 .

[45]  Jennifer Widom,et al.  Trio: A System for Integrated Management of Data, Accuracy, and Lineage , 2004, CIDR.

[46]  Mladen A. Vouk,et al.  Cloud computing — Issues, research and implementations , 2008, ITI 2008 - 30th International Conference on Information Technology Interfaces.

[47]  Goetz Graefe,et al.  Data compression and database performance , 1991, [Proceedings] 1991 Symposium on Applied Computing.

[48]  Marianne Winslett,et al.  Introducing secure provenance: problems and challenges , 2007, StorageSS '07.

[49]  Yogesh L. Simmhan,et al.  Query capabilities of the Karma provenance framework , 2008, Concurr. Comput. Pract. Exp..

[50]  Margo I. Seltzer,et al.  BURRITO: Wrapping Your Lab Notebook in Computational Infrastructure , 2012, TaPP.

[51]  Adriane Chapman,et al.  Efficient provenance storage , 2008, SIGMOD Conference.

[52]  Ya-Ching Lee,et al.  Adoption Intention of Cloud Computing at the Firm Level , 2019, J. Comput. Inf. Syst..

[53]  Andy Hopper,et al.  OPUS: A Lightweight System for Observational Provenance in User Space , 2013, TaPP.