Flexible Provenance Tracing

Author(s):  
Liwei Wang ◽  
Henning Koehler ◽  
Ke Deng ◽  
Xiaofang Zhou ◽  
Shazia Sadiq

The description of the origins of a piece of data and the transformations by which it arrived in a database is termed the data provenance. The importance of data provenance has already been widely recognized in database community. The two major approaches to representing provenance information use annotations and inversion. While annotation is metadata pre-computed to include the derivation history of a data product, the inversion method finds the source data based on the situation that some derivation process can be inverted. Annotations are flexible to represent diverse provenance metadata but the complete provenance data may outsize data itself. Inversion method is concise by using a single inverse query or function but the provenance needs to be computed on-the-fly. This paper proposes a new provenance representation which is a hybrid of annotation and inversion methods in order to achieve combined advantage. This representation is adaptive to the storage constraint and the response time requirement of provenance inversion on-the-fly.

Author(s):  
Liwei Wang ◽  
Henning Koehler ◽  
Ke Deng ◽  
Xiaofang Zhou ◽  
Shazia Sadiq

The description of the origins of a piece of data and the transformations by which it arrived in a database is termed the data provenance. The importance of data provenance has already been widely recognized in database community. The two major approaches to representing provenance information use annotations and inversion. While annotation is metadata pre-computed to include the derivation history of a data product, the inversion method finds the source data based on the situation that some derivation process can be inverted. Annotations are flexible to represent diverse provenance metadata but the complete provenance data may outsize data itself. Inversion method is concise by using a single inverse query or function but the provenance needs to be computed on-the-fly. This paper proposes a new provenance representation which is a hybrid of annotation and inversion methods in order to achieve combined advantage. This representation is adaptive to the storage constraint and the response time requirement of provenance inversion on-the-fly.


Author(s):  
Anton Michlmayr ◽  
Florian Rosenberg ◽  
Philipp Leitner ◽  
Schahram Dustdar

In general, provenance describes the origin and well-documented history of a given object. This notion has been applied in information systems, mainly to provide data provenance of scientific workflows. Similar to this, provenance in Service-oriented Computing has also focused on data provenance. However, the authors argue that in service-centric systems the origin and history of services is equally important. This paper presents an approach that addresses service provenance. The authors show how service provenance information can be collected and retrieved, and how security mechanisms guarantee integrity and access to this information, while also providing user-specific views on provenance. Finally, the paper gives a performance evaluation of the authors’ approach, which has been integrated into the VRESCo Web service runtime environment.


2010 ◽  
Vol 7 (2) ◽  
pp. 65-86 ◽  
Author(s):  
Anton Michlmayr ◽  
Florian Rosenberg ◽  
Philipp Leitner ◽  
Schahram Dustdar

In general, provenance describes the origin and well-documented history of a given object. This notion has been applied in information systems, mainly to provide data provenance of scientific workflows. Similar to this, provenance in Service-oriented Computing has also focused on data provenance. However, the authors argue that in service-centric systems the origin and history of services is equally important. This paper presents an approach that addresses service provenance. The authors show how service provenance information can be collected and retrieved, and how security mechanisms guarantee integrity and access to this information, while also providing user-specific views on provenance. Finally, the paper gives a performance evaluation of the authors’ approach, which has been integrated into the VRESCo Web service runtime environment.


2017 ◽  
Vol 2017 ◽  
pp. 1-11
Author(s):  
Jisheng Pei ◽  
Xiaojun Ye

Extracting useful knowledge from data provenance information has been challenging because provenance information is often overwhelmingly enormous for users to understand. Recently, it has been proposed that we may summarize data provenance items by grouping semantically related provenance annotations so as to achieve concise provenance representation. Users may provide their intended use of the provenance data in terms of provisioning, and the quality of provenance summarization could be optimized for smaller size and closer distance between the provisioning results derived from the summarization and those from the original provenance. However, apart from the intended provisioning use, we notice that more dedicated and diverse user requirements can be expressed and considered in the summarization process by assigning importance weights to provenance elements. Moreover, we introduce information balance index (IBI), an entropy based measurement, to dynamically evaluate the amount of information retained by the summary to check how it suits user requirements. An alternative provenance summarization algorithm that supports manipulation of information balance is presented. Case studies and experiments show that, in summarization process, information balance can be effectively steered towards user-defined goals and requirement-driven variants of the provenance summarizations can be achieved to support a series of interesting scenarios.


Before the invention of the various technologies, managing various activities and actions over the internet was achieved through a centralized server to guarantee valid data. With the expanding measure of accessible storage space and the quickening of data stream incited by the internet, a developing enthusiasm for data about the creation procedure and sources of information has developed. While this wide scope of use territories would profit by provenance data, the kind of provenance information, manipulation and querying facilities required vary from application to application. In this way, to discover the distinctions and similitudes between the different application and information model provenance needs and present a general plan for the arrangement of provenance. By characterizing this plan and applying it to existing work we plan to uncover open inquiries in the region of information provenance In this paper we survey the blockchain and provenance of the data in rice supplychain. We implement our proposed approach using smart contract which is to be deploy on ethereum blockchain network in rice supplychain to show the security and provenance of the data . We can track the progress of rice batch after each stage in blockchain and also discussed the need of provenance of assets in supplychain as it increase the trust of the customer


2013 ◽  
Vol 6 (3) ◽  
pp. 867-872 ◽  
Author(s):  
Anu Mary Chacko ◽  
Anu Mary Chacko ◽  
Dr. Madhukumar S D

The metadata that captures information about the origin of data is referred to as data provenance or data lineage. The provenance of a data item captures information about the processes and source data items that lead to its creation and its current representation. A provenance-aware application captures and stores adequate documentation about process executions to answer queries regarding provenance. Provenance information is very useful when we need to know the inter dependency of data to find error propagation or information flow. Provenance collected also helps to understand what went different in two identical workflows with same inputs but producing different outputs. Currently, most of the provenance systems designed is domain specific. Through this paper, we propose a general methodology for making an application provenance-aware from the basic UML design diagrams. As a starting point we have analyzed UML Class diagrams to generate information to make application provenance aware.  


Geophysics ◽  
2021 ◽  
pp. 1-89
Author(s):  
Han Li ◽  
Xu Chang ◽  
Jinlai Hao ◽  
Yibo Wang

Research on the nondouble-couple (NDC) components in an earthquake is important for characterizing true source processes. The moment-tensor (MT) source model is commonly used to study NDC earthquakes. However, MT inversions are still challenging when earthquakes have small magnitudes, especially microearthquakes. The general dislocation (GD) model specifies the focal mechanism as a shear-tensile slip on a fault plane; thus, GD inversion is better constrained than MT inversion. We focus on GD model-based waveform forward modeling and its application to microseismic source inversions. We expand the generalized reflection-transmission matrix method to synthesize waveforms based on the GD model and fully describe a GD source with five parameters: the scalar seismic moment (which defines the magnitude) and the strike, dip, rake, and slope angles (which define the fault geometry). We compare the GD, MT, and double-couple (DC) models and introduce the differences in their characterization and wave synthesis theories. We propose a GD model-based microseismic focal mechanism inversion method that requires calculating only four angles under hybrid constraints. Two sets of solutions correspond to the same seismograms in a GD model-based inversion. These two solutions have the same scalar seismic moment and slope angle but different strike, dip, and rake angles, and we present formulae for the mapping from one solution to the other. Synthetic and field surface microseismic datasets are used to test the proposed GD model-based modeling and inversion methods. According to our study, the GD model is effective in microseismic focal mechanism inversion. By developing specific wave synthesis and inversion methods for the GD model, we offer a novel perspective to study this model and the NDC mechanisms for hydraulic fracturing-induced microearthquakes.


Geophysics ◽  
1990 ◽  
Vol 55 (7) ◽  
pp. 914-919 ◽  
Author(s):  
J. Dellinger ◽  
J. Etgen

Until recently, the term “elastic” usually implied two‐dimensional (2-D) and isotropic. In this limited context, the divergence and curl operators have found wide use as wave separation operators. For example, Mora (1987) used them in his inversion method to allow separate correlation of P and S arrivals, although the separation is buried in the math and not obvious. Clayton (1981) used them explicitly in several modeling and inversion methods. Devaney and Oristaglio (1986) used closely related operators to separate P and S arrivals in elastic VSP data.


Sensors ◽  
2020 ◽  
Vol 21 (1) ◽  
pp. 28
Author(s):  
Rameez Asif ◽  
Kinan Ghanem ◽  
James Irvine

A detailed review on the technological aspects of Blockchain and Physical Unclonable Functions (PUFs) is presented in this article. It stipulates an emerging concept of Blockchain that integrates hardware security primitives via PUFs to solve bandwidth, integration, scalability, latency, and energy requirements for the Internet-of-Energy (IoE) systems. This hybrid approach, hereinafter termed as PUFChain, provides device and data provenance which records data origins, history of data generation and processing, and clone-proof device identification and authentication, thus possible to track the sources and reasons of any cyber attack. In addition to this, we review the key areas of design, development, and implementation, which will give us the insight on seamless integration with legacy IoE systems, reliability, cyber resilience, and future research challenges.


Sign in / Sign up

Export Citation Format

Share Document