From Big Data to Knowledge: Issues of Provenance, Trust, and Scientific Computing Integrity

This paper addresses the nature of data and knowledge, the relation between them, the variety of views as a characteristic of Big Data regarding that data may come from many different sources/views from different viewpoints, and the associated essential issues of data provenance, knowledge provenance, scientific computing integrity, and trust in the data science process. Towards the direction of data-intensive science and engineering, it is of paramount importance to ensure Scientific Computing Integrity (SCI). A failure of SCI may be caused by malicious attacks, natural environmental changes, faults of scientists, operations mistakes, faults of supporting systems, faults of processes, and errors in the data or theories on which a research relies. The complexity of scientific workflows and large provenance graphs as well as various causes for SCI failures make ensuring SCI extremely difficult. Provenance and trust play critical role in evaluating SCI. This paper reports our progress in building a model for provenance-based trust reasoning about SCI.

[1]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[2]  Paul T. Groth,et al.  An Architecture for Provenance Systems , 2006 .

[3]  Joseph Y. Halpern,et al.  A Guide to Completeness and Complexity for Modal Logics of Knowledge and Belief , 1992, Artif. Intell..

[4]  Calton Pu,et al.  Resilient trust management for Web service integration , 2005, IEEE International Conference on Web Services (ICWS'05).

[5]  Matthias Steup,et al.  The Analysis of Knowledge , 2001 .

[6]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[7]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[8]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[9]  John McCarthy,et al.  Notes on Formalizing Context , 1993, IJCAI.

[10]  James A. Hendler,et al.  A Framework for Web Science , 2006, Found. Trends Web Sci..

[11]  Matthew Richardson,et al.  Trust Management for the Semantic Web , 2003, SEMWEB.

[12]  L. Mui,et al.  A computational model of trust and reputation , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[13]  Athman Bouguettaya,et al.  Reputation Bootstrapping for Trust Establishment among Web Services , 2009, IEEE Internet Computing.

[14]  E. Michael Maximilien,et al.  Toward autonomic web services trust and selection , 2004, ICSOC '04.

[15]  Csr Young,et al.  How to Do Things With Words , 2009 .

[16]  Munindar P. Singh,et al.  Evidence-based trust: A mathematical model geared for multiagent systems , 2010, TAAS.

[17]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[18]  Sanjeev Khanna,et al.  Data Provenance: Some Basic Issues , 2000, FSTTCS.

[19]  Jennifer E. Rowley,et al.  The wisdom hierarchy: representations of the DIKW hierarchy , 2007, J. Inf. Sci..

[20]  Jia Guo,et al.  Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.

[21]  Robert Demolombe To trust information sources: a proposal for a modal logical framework , 2001 .

[22]  David M. Nicol,et al.  A Formal-Semantics-Based Calculus of Trust , 2010, IEEE Internet Computing.

[23]  Ravishankar K. Iyer,et al.  Analysis of security data from a large computing organization , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).

[24]  Georg Lausen,et al.  Propagation Models for Trust and Distrust in Social Networks , 2005, Inf. Syst. Frontiers.

[25]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[26]  Jingwei Huang,et al.  Knowledge Provenance: An Approach to Modeling and Maintaining The Evolution and Validity of Knowledge , 2008 .

[27]  Chrysanthos Dellarocas,et al.  The Digitization of Word-of-Mouth: Promise and Challenges of Online Feedback Mechanisms , 2003, Manag. Sci..

[28]  Audun Jøsang,et al.  Exploring Different Types of Trust Propagation , 2006, iTrust.

[29]  R. Ackoff From Data to Wisdom , 2014 .

[30]  Jaroslaw Krygier,et al.  A trust-based situation awareness system for military applications of the internet of things , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).

[31]  Ueli Maurer,et al.  Modelling a Public-Key Infrastructure , 1996, ESORICS.

[32]  Prasanna Balaprakash,et al.  Machine Learning and Understanding for Intelligent Extreme Scale Scientifc Computing and Discovery , 2015 .

[33]  Yogesh L. Simmhan,et al.  A survey of data provenance in e-science , 2005, SGMD.

[34]  Anthony Mills,et al.  Data, Information, Knowledge, and Wisdom , 2011 .

[35]  Yolanda Gil,et al.  A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..

[36]  Thomas E. Potok,et al.  ASCR Cybersecurity for Scientific Computing Integrity - Research Pathways and Ideas Workshop , 2015 .

[37]  Virgil D. Gligor,et al.  Towards a Theory of Trust in Networks of Humans and Computers , 2011, Security Protocols Workshop.

[38]  M. S. Fox *,et al.  Knowledge provenance in enterprise information , 2005 .

[39]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[40]  V. Vianu,et al.  Edinburgh Why and Where: A Characterization of Data Provenance , 2017 .

[41]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[42]  David M. Nicol,et al.  Trust mechanisms for cloud computing , 2013, Journal of Cloud Computing: Advances, Systems and Applications.

[43]  Juliana Freire,et al.  Provenance and scientific workflows: challenges and opportunities , 2008, SIGMOD Conference.

[44]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[45]  Sean Piesert,et al.  ASCR Cybersecurity for Scientific Computing Integrity , 2015 .

[46]  Geoff Brumfiel Physicists declare victory in Higgs hunt , 2012, Nature.

[47]  James F. Allen Time and time again: The many ways to represent time , 1991, Int. J. Intell. Syst..

[48]  R. Reiter,et al.  Temporal reasoning in the situation calculus , 1994 .

[49]  Marianne Winslett,et al.  Negotiating Trust on the Web , 2002, IEEE Internet Comput..

[50]  Lavanya Ramakrishnan,et al.  The future of scientific workflows , 2018, Int. J. High Perform. Comput. Appl..

[51]  David M. Nicol,et al.  A calculus of trust and its application to PKI and identity management , 2009, IDtrust '09.

[52]  James A. Hendler,et al.  Trust Networks on the Semantic Web , 2003, WWW.

[53]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[54]  Yogesh L. Simmhan,et al.  The Open Provenance Model core specification (v1.1) , 2011, Future Gener. Comput. Syst..

[55]  Munindar P. Singh,et al.  A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.

[56]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[57]  Ronald Fagin,et al.  Reasoning about knowledge , 1995 .

[58]  David M. Nicol,et al.  Evidence-based trust reasoning , 2014, HotSoS '14.

[59]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[60]  W. van der Hoek,et al.  Epistemic logic for AI and computer science , 1995, Cambridge tracts in theoretical computer science.

[61]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[62]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[63]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[64]  J. M. Larrazabal,et al.  Reasoning about change , 1991 .

[65]  Mark S. Fox,et al.  Uncertainty in Knowledge Provenance , 2004, ESWS.

[66]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[67]  Michael Gruninger,et al.  Methodology for the Design and Evaluation of Ontologies , 1995, IJCAI 1995.

[68]  Jordi Sabater-Mir,et al.  Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.