A Security Framework for Scientific Workflow Provenance Access Control Policies

被引:4
|
作者
Bhuyan, Fahima Amin [1 ]
Lu, Shiyong [1 ]
Reynolds, Robert [1 ]
Zhang, Jia [2 ]
Ahmed, Ishtiaq [1 ]
机构
[1] Wayne State Univ, Dept Comp Sci, Detroit, MI 48202 USA
[2] Carnegie Melon Univ Silicon Valley, Dept Comp Sci, Mountain View, CA 94035 USA
基金
美国国家科学基金会;
关键词
Provenance; access control policy; policy quality; security view of provenance;
D O I
10.1109/TSC.2019.2921586
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of collaborative scientific workflow is coined to address the increasing need for collaborative data analytics. In collaborative environments, access control policies are necessary for controlling the sharing of workflows, data products, and provenance information among collaborating parties. In particular, the protection of workflow provenance is critical because it often encodes the detailed protocol of a scientific experiment and carries the intellectual property of the respective stakeholders. In addition, since scientific workflows often evolve quickly, the corresponding access control policies for workflow provenance have to evolve as well. It is important to ensure that the evolution of workflow provenance access control policies maintain certain properties, in order to guarantee the correctness and performance of the corresponding policy enforcement. In this paper, we 1) propose a role-based access control model for scientific workflow provenance; 2) define three quality requirements for scientific workflow provenance access control policies - consistency, completeness, and conciseness; 3) develop a mechanism mapping from specifications of workflows to their counterparts in a provenance that preserves such quality properties, and 4) conduct a case study on a scientific workflow for autism behavioral data analysis that demonstrates the feasibility of our proposed analysis algorithms.
引用
收藏
页码:97 / 109
页数:13
相关论文
共 50 条
  • [1] Quality Analysis for Scientific Workflow Provenance Access Control Policies
    Bhuyan, Fahima Amin
    Lu, Shiyong
    Reynolds, Robert
    Ahmed, Ishtiaq
    Zhang, Jia
    2018 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (IEEE SCC 2018), 2018, : 261 - 264
  • [2] ProFact: A Provenance-Based Analytics Framework for Access Control Policies
    Abu Jabal, Amani
    Davari, Maryam
    Bertino, Elisa
    Makaya, Christian
    Calo, Seraphin
    Verma, Dinesh
    Williams, Christopher
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (06) : 1914 - 1928
  • [3] MDAOrBAC: An MDA Security Framework Based OrBAC Access Control Policies
    Kaddani, Aziz
    Baina, Amine
    Echabbi, Loubna
    PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2, 2016, 381 : 437 - 445
  • [4] A survey of provenance in scientific workflow
    Lin, Songhai
    Xiao, Hong
    Jiang, Wenchao
    Li, Dafeng
    Liang, Jiaben
    Li, Zelin
    JOURNAL OF HIGH SPEED NETWORKS, 2023, 29 (02) : 129 - 145
  • [5] A scientific workflow framework integrated with object deputy model for data provenance
    Wang, Liwei
    Peng, Zhiyong
    Luo, Min
    Ji, Wenhao
    Huang, Zeqian
    ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2006, 4016 : 569 - 580
  • [6] A Provenance-Aware Access Control Framework with Typed Provenance
    Sun, Lianshan
    Park, Jaehong
    Dang Nguyen
    Sandhu, Ravi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (04) : 411 - 423
  • [7] Trustworthy Provenance Framework for Document Workflow Provenance
    Rupasinghe, P. L.
    Weerasena, H. H.
    Murray, I.
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [8] A MAS security framework implementing reputation based policies and owners access control
    Vitabile, S.
    Milici, G.
    Scolaro, S.
    Sorbello, F.
    Pilato, G.
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 746 - +
  • [9] Data provenance in a scientific workflow service framework integrated with object deputy database
    International School of Software, Wuhan University, Wuhan 430072, China
    不详
    不详
    Jisuanji Xuebao, 2008, 5 (721-732):
  • [10] LabelFlow: Exploiting Workflow Provenance to Surface Scientific Data Provenance
    Alper, Pinar
    Belhajjame, Khalid
    Goble, Carole A.
    Karagoz, Pinar
    PROVENANCE AND ANNOTATION OF DATA AND PROCESSES (IPAW 2014), 2015, 8628 : 84 - 96