scholarly journals Blockchain-based Data Provenance

Author(s):  
Filipe Lautert ◽  
Daniel Fernandes Gonçalves Pigatto ◽  
Luiz Celso Gomes-JR

Data provenance tracks the origin of information with the goal of improving trust among interested parties. One of the key aspects provided by data provenance is transparency, which allows stakeholders to follow all the changes applied to the information (e.g. a document). Blockchains, a recent technological development, allow transparency in a distributed application context without the need for a trusted centralized entity. The approach presented here aims to use blockchain as a secure, shared and auditable storage providing transparent data provenance. Our proposal builds upon the well established W3C Prov Model, which simplifies adoption of the framework. An application consisting of a client and a REST API service that is able to store provenance information using open standards in a blockchain has been developed. Here we report the results of several stress tests to validate the practicability of our approach.

Author(s):  
Anton Michlmayr ◽  
Florian Rosenberg ◽  
Philipp Leitner ◽  
Schahram Dustdar

In general, provenance describes the origin and well-documented history of a given object. This notion has been applied in information systems, mainly to provide data provenance of scientific workflows. Similar to this, provenance in Service-oriented Computing has also focused on data provenance. However, the authors argue that in service-centric systems the origin and history of services is equally important. This paper presents an approach that addresses service provenance. The authors show how service provenance information can be collected and retrieved, and how security mechanisms guarantee integrity and access to this information, while also providing user-specific views on provenance. Finally, the paper gives a performance evaluation of the authors’ approach, which has been integrated into the VRESCo Web service runtime environment.


Author(s):  
Camille Bourgaux ◽  
Ana Ozaki ◽  
Rafael Penaloza ◽  
Livia Predoiu

We address the problem of handling provenance information in ELHr ontologies. We consider a setting recently introduced for ontology-based data access, based on semirings and extending classical data provenance, in which ontology axioms are annotated with provenance tokens. A consequence inherits the provenance of the axioms involved in deriving it, yielding a provenance polynomial as an annotation. We analyse the semantics for the ELHr case and show that the presence of conjunctions poses various difficulties for handling provenance, some of which are mitigated by assuming multiplicative idempotency of the semiring. Under this assumption, we study three problems: ontology completion with provenance, computing the set of relevant axioms for a consequence, and query answering.


2010 ◽  
Vol 7 (2) ◽  
pp. 65-86 ◽  
Author(s):  
Anton Michlmayr ◽  
Florian Rosenberg ◽  
Philipp Leitner ◽  
Schahram Dustdar

In general, provenance describes the origin and well-documented history of a given object. This notion has been applied in information systems, mainly to provide data provenance of scientific workflows. Similar to this, provenance in Service-oriented Computing has also focused on data provenance. However, the authors argue that in service-centric systems the origin and history of services is equally important. This paper presents an approach that addresses service provenance. The authors show how service provenance information can be collected and retrieved, and how security mechanisms guarantee integrity and access to this information, while also providing user-specific views on provenance. Finally, the paper gives a performance evaluation of the authors’ approach, which has been integrated into the VRESCo Web service runtime environment.


Author(s):  
Andres-Leonardo Martinez-Ortiz

The open source perspective offers an interesting insight about cloud computing technologies: in one hand, cloud systems belong to the category of the Ultra-Large-Scale (ULS) systems, i.e. very complex systems where conventional approach for the technological development does not work. For such as systems, Free Libre Open Source Software (FLOSS) licensing attracts innovation from the developers’ communities, reduces the risks of technology adoption and fosters the interoperability between systems and the creation of open standards. In the other hand, the current systems are far from achieving interoperability; even the FLOSS´s principles remain pending for many components in the architecture of the main cloud solutions, and for these reasons many FLOSS evangelists do not recommend using them. As a balance between the obvious drawbacks and benefits, recently a new strategy has appeared: Free/Open Services. However, it seems difficult to find short term solutions. This chapter illustrates both ideas, highlighting the pros and cons of these technologies, including a reference of main “open cloud” groups and open source technologies for the cloud. The rest of the book will include additional and deeper descriptions of some of the most interesting open cloud technologies.


2018 ◽  
Vol 5 (4) ◽  
pp. 56-63
Author(s):  
A. V. Bоdуako

The logic of the paper is based on defining the key aspects of internal control notion as a phenomenon in modern management process. The article considers the issues of applying Article 19 “Internal control” of the Federal Act 402 taking into consideration the progress in microelectronics, information technology and telecommunications and their relation to control. It also discusses the important aspects of “The Conceptual Framework of Risk Management in Organizations” related to the issues of internal control as a wider notion of risk management. It is also noted that this document doesn’t cancel “The Conceptual Framework of Internal Control” but include it as an integrant part.The author draws the attention to the modern transformation of methodological views on internal control organization particularly to the shift of emphasis with regard to identification and elimination of risks. Nowadays it is believed that the management task is to make decisions about the level of uncertainty which the organization is prepared to accept seeking to increase value for stakeholders.The author concludes that the system of internal corporate control (SICC) is a multilevel process, the subjects of which are all company’s management bodies, departments, divisions and their employees whose activity is related to risks able to influence the company’s goals achievement including such an important goal as reliable presentation of company’s activity results in financial and other types of reporting.The article contains the proposals on the content of risk-oriented internal corporate control. Sustainability of an enterprise is based on getting right economic strategy which means that the goals should be set in a way that ensures the optimal balance between the technological development and growth (scaling) of the company, its profitability and risks along with thrift and efficient use of resources available. 


2020 ◽  
Vol 2020 ◽  
pp. 1-7
Author(s):  
Genling Huang ◽  
Jiqiang Wang

Collective behaviors such as synchronization, consensus, and flocking have been extensively investigated over the past decades. Many important results have been disseminated concerning the properties of complex networks. Recent technological development requires performance distribution, and this motivates the resolution to the issue of performance distributability. Albeit in a simple setup, this paper presents an attempt to attacking this problem. Important results are obtained for performance redistribution under both unitary and specified specifications. Constraints are also considered revealing the tight bounds on both nodes dynamics and graph elements for fulfilling the performance distribution and redistribution requirements. Examples are presented for verification of the claims.


Author(s):  
Liwei Wang ◽  
Henning Koehler ◽  
Ke Deng ◽  
Xiaofang Zhou ◽  
Shazia Sadiq

The description of the origins of a piece of data and the transformations by which it arrived in a database is termed the data provenance. The importance of data provenance has already been widely recognized in database community. The two major approaches to representing provenance information use annotations and inversion. While annotation is metadata pre-computed to include the derivation history of a data product, the inversion method finds the source data based on the situation that some derivation process can be inverted. Annotations are flexible to represent diverse provenance metadata but the complete provenance data may outsize data itself. Inversion method is concise by using a single inverse query or function but the provenance needs to be computed on-the-fly. This paper proposes a new provenance representation which is a hybrid of annotation and inversion methods in order to achieve combined advantage. This representation is adaptive to the storage constraint and the response time requirement of provenance inversion on-the-fly.


Information ◽  
2020 ◽  
Vol 11 (12) ◽  
pp. 564
Author(s):  
Bahtijar Vogel ◽  
Miranda Kajtazi ◽  
Joseph Bugeja ◽  
Rimpu Varshney

While security is often recognized as a top priority for organizations and a push for competitive advantage, repeatedly, Internet of Things (IoT) products have become a target of diverse security attacks. Thus, orchestrating smart services and devices in a more open, standardized and secure way in IoT environments is yet a desire as much as it is a challenge. In this paper, we propose a model for IoT practitioners and researchers, who can adopt a sound security thinking in parallel with open IoT technological developments. We present the state-of-the-art and an empirical study with IoT practitioners. These efforts have resulted in identifying a set of openness and security thinking criteria that are important to consider from an IoT ecosystem point of view. Openness in terms of open standards, data, APIs, processes, open source and open architectures (flexibility, customizability and extensibility aspects), by presenting security thinking tackled from a three-dimensional point of view (awareness, assessment and challenges) that highlight the need to develop an IoT security mindset. A novel model is conceptualized with those characteristics followed by several key aspects important to design and secure future IoT systems.


Sign in / Sign up

Export Citation Format

Share Document