Title :
Provenance Tracking with Bit Vectors
Author :
Gadang, Siddharta S. ; Panda, Brajendra ; Hoag, Joseph E.
Author_Institution :
Univ. of Arkansas, Fayetteville, AK
Abstract :
Data provenance (information about the origin of data items and the transformations that they have gone through) can be a useful security tool, particularly for forensic investigation. Provenance information can also be used to enforce information assurance concepts like integrity and authenticity. The current techniques for finding data source and lineage information are annotations and query inversion. Annotations lack scalability and require additional space for storing and querying provenance information, while query inversion incurs more time and processing overhead. In this paper, we offer fast and scalable models for computing source information, each of which are based on associating bit vectors with data sources.
Keywords :
data integrity; query processing; security of data; annotations; bit vectors; data authenticity; data integrity; data provenance; data source; information assurance; lineage information; provenance tracking; query inversion; security tool; Data acquisition; Data mining; Data security; Database systems; Forensics; History; Information retrieval; Information security; Joining processes; Scalability; Bit Vectors; Data Lineage; Data Provenance; Data Source;
Conference_Titel :
Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference on
Conference_Location :
Naples
Print_ISBN :
978-0-7695-3324-7
DOI :
10.1109/IAS.2008.47