{"title":"Provenance Tracking with Bit Vectors","authors":"Siddharta S. Gadang, B. Panda, J. Hoag","doi":"10.1109/IAS.2008.47","DOIUrl":null,"url":null,"abstract":"Data provenance (information about the origin of data items and the transformations that they have gone through) can be a useful security tool, particularly for forensic investigation. Provenance information can also be used to enforce information assurance concepts like integrity and authenticity. The current techniques for finding data source and lineage information are annotations and query inversion. Annotations lack scalability and require additional space for storing and querying provenance information, while query inversion incurs more time and processing overhead. In this paper, we offer fast and scalable models for computing source information, each of which are based on associating bit vectors with data sources.","PeriodicalId":103328,"journal":{"name":"2008 The Fourth International Conference on Information Assurance and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 The Fourth International Conference on Information Assurance and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAS.2008.47","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Data provenance (information about the origin of data items and the transformations that they have gone through) can be a useful security tool, particularly for forensic investigation. Provenance information can also be used to enforce information assurance concepts like integrity and authenticity. The current techniques for finding data source and lineage information are annotations and query inversion. Annotations lack scalability and require additional space for storing and querying provenance information, while query inversion incurs more time and processing overhead. In this paper, we offer fast and scalable models for computing source information, each of which are based on associating bit vectors with data sources.