Data provenance allows us to explore the lineage and derivation history of data objects. As data and its provenance flow between people and tasks in potentially untrusted environments, it becomes essential to provide integrity and confidentiality assurances for provenance. Any solution also needs to be efficient, modular, and easy to deploy. In this poster and demonstration proposal, we discuss deployment issues of secure provenance in existing provenance systems. We present the design and implementation of SPROV 2.0 ‐ a highly configurable and modular library for secure provenance. SPROV 2.0 is designed in a platform-independent manner, and can be easily configured using plugins to utilize different cryptographic techniques and storage methods. We also show how SPROV 2.0 can be added to existing provenance frameworks.
[1]
Marianne Winslett,et al.
The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance
,
2009,
FAST.
[2]
Margo I. Seltzer,et al.
Securing Provenance
,
2008,
HotSec.
[3]
Marianne Winslett,et al.
Preventing history forgery with secure provenance
,
2009,
TOS.
[4]
Yogesh L. Simmhan,et al.
A survey of data provenance in e-science
,
2005,
SGMD.
[5]
Margo I. Seltzer,et al.
Provenance-Aware Storage Systems
,
2006,
USENIX ATC, General Track.
[6]
Yogesh L. Simmhan,et al.
Karma2: Provenance Management for Data-Driven Workflows
,
2008,
Int. J. Web Serv. Res..