Challenges for Provenance in Cloud Computing

Many applications which require provenance are now moving to cloud infrastructures. However, it is not widely realised that clouds have their own need for provenance due to their dynamic nature and the burden this places on their administrators. We analyse the structure of cloud computing to identify the unique challenges facing provenance collection and the scenarios in which additional provenance data could be useful.

[1]  Imad M. Abbadi Middleware Services at Cloud Virtual Layer , 2011, 2011 IEEE 11th International Conference on Computer and Information Technology.

[2]  Margo I. Seltzer,et al.  Making a Cloud Provenance-Aware , 2009, Workshop on the Theory and Practice of Provenance.

[3]  Daniel Crawl,et al.  A Provenance-Based Fault Tolerance Mechanism for Scientific Workflows , 2008, IPAW.

[4]  Cristina Urdiales,et al.  Agent Technology and e-Health (Whitestein Series in Software Agent Technologies and Autonomic Computing) , 2008 .

[5]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[6]  Imad M. Abbadi Clouds' Infrastructure Taxonomy, Properties, and Management Services , 2011, ACC.

[7]  James Frew,et al.  Lineage retrieval for scientific data processing: a survey , 2005, CSUR.

[8]  Margo I. Seltzer,et al.  Provenance for the Cloud , 2010, FAST.

[9]  Imad M. Abbadi Operational trust in Clouds' environment , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[10]  James Cheney,et al.  First workshop on on Theory and practice of provenance , 2009 .

[11]  Jeffrey F. Naughton,et al.  Transparently Gathering Provenance with Provenance Aware Condor , 2009, Workshop on the Theory and Practice of Provenance.

[12]  Imad M. Abbadi,et al.  Toward Trustworthy Clouds' Internet Scale Critical Infrastructure , 2011, ISPEC.

[13]  PlaleBeth,et al.  A survey of data provenance in e-science , 2005 .

[14]  Geoffrey C. Fox,et al.  Examining the Challenges of Scientific Workflows , 2007, Computer.

[15]  Cristina Urdiales,et al.  Agent Technology and e-Health , 2008 .

[16]  Andrew P. Martin,et al.  Trusted Computing and Provenance: Better Together , 2010, TaPP.