On data provenance in group-centric secure collaboration

In this paper, we explore data provenance in a group-centric secure collaboration environment. In collaborations, participating organizations are likely to want certain trustworthiness on the data that are shared from other organizations and some assurance on how the shared data are used by users regardless of their organizations. By utilizing data provenance in group collaboration environment, we can provide the participating organizations with various provenance information that can establish trustworthiness and assurance on the shared data. To achieve this, we first identify what kind of operation information can be and should be captured as provenance data and how this information can be expressed in a formal representation which can be queried via the provenance system for certain utilities. We show the identified provenance data for a group collaboration application can provide some unique provenance utilities such as ability to trace the origins or usages of a shared data object even if it was created in a different organization. We utilize Open Provenance Model (OPM) [13] to capture various group collaboration operations identified in [12] and introduce a provenance system for a group collaboration environment that utilizes Resource Description Framework (RDF) data representations [10] and GLEEN-enabled SPARQL query language [7].

[1]  Thomas Heinis,et al.  Efficient lineage tracking for scientific workflows , 2008, SIGMOD Conference.

[2]  J. Carroll,et al.  Jena: implementing the semantic web recommendations , 2004, WWW Alt. '04.

[3]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[4]  Adriane Chapman,et al.  Efficient provenance storage , 2008, SIGMOD Conference.

[5]  Shouhuai Xu,et al.  An Access Control Language for a General Provenance Model , 2009, Secure Data Management.

[6]  Craig E. Wills,et al.  Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters , 2004 .

[7]  Ravi S. Sandhu,et al.  Towards a framework for group-centric secure collaboration , 2009, 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[8]  James Cheney,et al.  Provenance management in curated databases , 2006, SIGMOD Conference.

[9]  K. N. Dollman,et al.  - 1 , 1743 .

[10]  Bhavani M. Thuraisingham,et al.  A language for provenance access control , 2011, CODASPY '11.

[11]  Dan Suciu,et al.  Regular Paths in SparQL: Querying the NCI Thesaurus , 2008, AMIA.

[12]  Ravi S. Sandhu,et al.  Foundations for group-centric secure information sharing models , 2009, SACMAT '09.

[13]  Jaehong Park,et al.  The UCONABC usage control model , 2004, TSEC.

[14]  SandhuRavi,et al.  The UCONABC usage control model , 2004 .

[15]  Jeremy J. Carroll,et al.  Resource description framework (rdf) concepts and abstract syntax , 2003 .

[16]  Jennifer Widom,et al.  Databases with uncertainty and lineage , 2008, The VLDB Journal.