Your browser does not support JavaScript!

Data provenance in cloud

Data provenance in cloud

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Data Security in Cloud Computing — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

One of the barriers of cloud adoption is the security of data stored in the cloud. In this chapter, we introduce data provenance and briefly show how it is applicable for data security in the cloud. Building on this, we discuss the underlying question of how data provenance, required for empowering data security in the cloud, can be acquired. The strengths and weaknesses of two methodologies for provenance acquisition, active collection and reconstruction, are discussed. The goal is to provide an understanding on the current state-of-the-art for generating provenance, such that better methodologies and solutions can be developed.

Chapter Contents:

  • Abstract
  • 12.1 Data provenance and its application
  • 12.1.1 What is data provenance?
  • 12.1.2 Applying data provenance to data security
  • 12.2 Data provenance in cloud
  • 12.2.1 Scope of the discussion
  • 12.2.2 Log files is not provenance
  • 12.3 Acquiring data provenance from cloud
  • 12.3.1 Active provenance collection
  • Operating system observation
  • Application reporting
  • Multiple system coordination points observation
  • Overhead costs
  • 12.3.2 Reconstructing provenance
  • 12.4 Conclusion and future challenges
  • References

Inspec keywords: cloud computing; security of data

Other keywords: data security; data provenance; cloud adoption

Subjects: Data security; Internet software

Preview this chapter:
Zoom in

Data provenance in cloud, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse007e/PBSE007E_ch12-1.gif /docserver/preview/fulltext/books/sc/pbse007e/PBSE007E_ch12-2.gif

Related content

This is a required field
Please enter a valid email address