Securing provenance of distributed processes in an untrusted environment

Amril Syalim, Takashi Nishide, Kouichi Sakurai

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

Recently, there is much concern about the provenance of distributed processes, that is about the documentation of the origin and the processes to produce an object in a distributed system. The provenance has many applications in the forms of medical records, documentation of processes in the computer systems, recording the origin of data in the cloud, and also documentation of human-executed processes. The provenance of distributed processes can be modeled by a directed acyclic graph (DAG) where each node represents an entity, and an edge represents the origin and causal relationship between entities. Without sufficient security mechanisms, the provenance graph suffers from integrity and confidentiality problems, for example changes or deletions of the correct nodes, additions of fake nodes and edges, and unauthorized accesses to the sensitive nodes and edges. In this paper, we propose an integrity mechanism for provenance graph using the digital signature involving three parties: the process executors who are responsible in the nodes' creation, a provenance owner that records the nodes to the provenance store, and a trusted party that we call the Trusted Counter Server (TCS) that records the number of nodes stored by the provenance owner. We show that the mechanism can detect the integrity problem in the provenance graph, namely unauthorized and malicious "authorized" updates even if all the parties, except the TCS, collude to update the provenance. In this scheme, the TCS only needs a very minimal storage (linear with the number of the provenance owners). To protect the confidentiality and for an efficient access control administration, we propose a method to encrypt the provenance graph that allows access by paths and compartments in the provenance graph. We argue that encryption is important as a mechanism to protect the provenance data stored in an untrusted environment. We analyze the security of the integrity mechanism, and perform experiments to measure the performance of both mechanisms.

Original languageEnglish
Pages (from-to)1894-1907
Number of pages14
JournalIEICE Transactions on Information and Systems
VolumeE95-D
Issue number7
DOIs
Publication statusPublished - Jul 2012

Keywords

  • Access control model
  • Database encryption
  • Provenance security

Fingerprint

Dive into the research topics of 'Securing provenance of distributed processes in an untrusted environment'. Together they form a unique fingerprint.

Cite this