• DocumentCode
    1996826
  • Title

    An access control model for protecting provenance graphs

  • Author

    Liang Chen ; Edwards, Peter ; Nelson, John D. ; Norman, Timothy J.

  • Author_Institution
    dot.rural Digital Econ. Hub, Univ. of Aberdeen, Aberdeen, UK
  • fYear
    2015
  • fDate
    21-23 July 2015
  • Firstpage
    125
  • Lastpage
    132
  • Abstract
    Securing provenance has recently become an important research topic, resulting in a number of models for protecting access to provenance. Existing work has focused on graph transformation mechanisms that supply a user with a provenance view that satisfies both access control policies and validity constraints of provenance. However, it is not always possible to satisfy both of them simultaneously, because these two conditions are often inconsistent which require sophisticated conflict resolution strategies to be put in place. In this paper we develop a new access control model tailored for provenance. In particular, we explicitly take into account validity constraints of provenance when specifying certain parts of provenance to which access is restricted. Hence, a provenance view that is granted to a user by our authorisation mechanism would automatically satisfy the validity constraints. Moreover, we propose algorithms that allow provenance owners to deploy fine-grained access control for their provenance data.
  • Keywords
    authorisation; graph theory; access control model; access control policy; authorisation mechanism; fine-grained access control; graph transformation mechanism; provenance graph; provenance security; Authorization; Computers; Data models; Object recognition; Transforms;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Privacy, Security and Trust (PST), 2015 13th Annual Conference on
  • Conference_Location
    Izmir
  • Type

    conf

  • DOI
    10.1109/PST.2015.7232963
  • Filename
    7232963