Provenance Management for Evolving RDF Datasets

Author(s):  
Argyro Avgoustaki ◽  
Giorgos Flouris ◽  
Irini Fundulaki ◽  
Dimitris Plexousakis
Author(s):  
Navya Gouru ◽  
NagaLakshmi Vadlamani

The redesign of cloud storage with the amalgamation of cooperative cloud and an immutable and unhackable distributed database blockchain thrives towards a strong CIA triad and secured data provenance. The conspiracy ideology associated with the traditional cloud has economized with cooperative cloud storage like Storj and Sia, decentralized storage, which allows renting the unused hard drive space and getting monetary compensation in an exchange with cryptocurrency. In this article, the authors explain how confidentiality, integrity and availability can be progressed with cooperative cloud storage along with tamper-proof data provenance management with ethereum smart contracts using zero-knowledge proof (ZKP). A contemporary architecture is proposed with regards to storing data on the cooperative cloud and collecting and verifying the provenance data from the cloud and publishing the provenance data into blockchain network as transactions.


2016 ◽  
Vol 55 (36) ◽  
pp. 9676-9686 ◽  
Author(s):  
Elçin Içten ◽  
Girish Joglekar ◽  
Chelsey Wallace ◽  
Kristen Loehr ◽  
Jennifer Sacksteder ◽  
...  

2011 ◽  
Vol 24 (13) ◽  
pp. 1513-1530 ◽  
Author(s):  
Anderson Marinho ◽  
Leonardo Murta ◽  
Cláudia Werner ◽  
Vanessa Braganholo ◽  
Sérgio Manuel Serra da Cruz ◽  
...  

2019 ◽  
Vol 46 (2) ◽  
pp. 147-160
Author(s):  
Ozgu Can ◽  
Dilek Yilmazer

Provenance determines the origin of the data by tracing and recording the actions that are performed on the data. Therefore, provenance is used in many fields to ensure the reliability and quality of data. In this work, provenance information is used to meet the security needs in information systems. For this purpose, a domain-independent provenance model is proposed. The proposed provenance model is based on the Open Provenance Model and Semantic Web technologies. The goal of the proposed provenance model is to integrate the provenance and security concepts in order to detect privacy violations by querying the provenance data. In order to evaluate the proposed provenance model, we illustrated our domain-independent model by integrating it with an infectious disease domain and implemented the Healthcare Provenance Information System.


Sign in / Sign up

Export Citation Format

Share Document