Data Trustworthiness - Approaches and Research Challenges

With the increased need of data sharing among multiple organizations, such as government organizations, financial corporations, medical hospitals and academic institutions, it is critical to assess and assure data trustworthiness so that effective decisions can be made based on data. In this paper, we first discuss motivations and relevant techniques for data trustworthiness. We then present an architectural framework for a comprehensive system for trustworthiness assurance and discuss relevant recent work. We highlight open research issues and research directions throughout the paper.

[1]  Y WangRichard,et al.  Anchoring data quality dimensions in ontological foundations , 1996 .

[2]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[3]  K. J. Bma Integrity considerations for secure computer systems , 1977 .

[4]  Elisa Bertino,et al.  Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.

[5]  Raph Levien,et al.  Attack-Resistant Trust Metrics , 2009, Computing with Social Trust.

[6]  Elisa Bertino,et al.  Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems , 2006, TSEC.

[7]  Elisa Bertino,et al.  A hybrid private record linkage scheme: Separating differentially private synopses from matching records , 2015, 2015 IEEE 31st International Conference on Data Engineering.

[8]  Diane M. Strong,et al.  Information quality benchmarks: product and service performance , 2002, CACM.

[9]  Joseph Moses Juran Juran on leadership for quality : an executive handbook , 1989 .

[10]  Elisa Bertino,et al.  Secure data provenance compression using arithmetic coding in wireless sensor networks , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).

[11]  Graeme Shanks,et al.  A Semiotic Information Quality Framework , 2004 .

[12]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[13]  Elisa Bertino,et al.  A Hybrid Approach to Private Record Linkage , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[14]  Elisa Bertino,et al.  Provenance-based trustworthiness assessment in sensor networks , 2010, DMSN '10.

[15]  Elisa Bertino,et al.  Privacy preserving schema and data matching , 2007, SIGMOD '07.

[16]  Elisa Bertino,et al.  Dictionary Based Secure Provenance Compression for Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.

[17]  Elisa Bertino,et al.  A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks , 2013, SenSys '13.

[18]  Elisa Bertino,et al.  A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[19]  Richard Y. Wang,et al.  Anchoring data quality dimensions in ontological foundations , 1996, CACM.

[20]  Carlo Batini,et al.  Data Quality: Concepts, Methodologies and Techniques , 2006, Data-Centric Systems and Applications.

[21]  Sushil Jajodia,et al.  Secure Data Aggregation in Wireless Sensor Networks , 2008 .