The University of Southampton
University of Southampton Institutional Repository

An access control model for protecting provenance graphs

An access control model for protecting provenance graphs
An access control model for protecting provenance graphs

Securing provenance has recently become an important research topic, resulting in a number of models for protecting access to provenance. Existing work has focused on graph transformation mechanisms that supply a user with a provenance view that satisfies both access control policies and validity constraints of provenance. However, it is not always possible to satisfy both of them simultaneously, because these two conditions are often inconsistent which require sophisticated conflict resolution strategies to be put in place. In this paper we develop a new access control model tailored for provenance. In particular, we explicitly take into account validity constraints of provenance when specifying certain parts of provenance to which access is restricted. Hence, a provenance view that is granted to a user by our authorisation mechanism would automatically satisfy the validity constraints. Moreover, we propose algorithms that allow provenance owners to deploy fine-grained access control for their provenance data.

125-132
Institute of Electrical and Electronics Engineers Inc.
Chen, Liang
15459db0-4299-44b7-beaf-fb646add66ac
Edwards, Peter
5ee73a94-75a0-426f-ab1b-ce918b06a1ea
Nelson, John D.
51728d65-24d6-426f-ab58-4edbbaf5d6b1
Norman, Timothy J.
663e522f-807c-4569-9201-dc141c8eb50d
Hisil, Huseyin
Ghorbani, Ali
Garcia-Alfaro, Joaquin
Koltuksuz, Ahmet
Torra, Vincenc
Zhang, Jie
Sensoy, Murat
Zincir, Ibrahim
Miri, Ali
Chen, Liang
15459db0-4299-44b7-beaf-fb646add66ac
Edwards, Peter
5ee73a94-75a0-426f-ab1b-ce918b06a1ea
Nelson, John D.
51728d65-24d6-426f-ab58-4edbbaf5d6b1
Norman, Timothy J.
663e522f-807c-4569-9201-dc141c8eb50d
Hisil, Huseyin
Ghorbani, Ali
Garcia-Alfaro, Joaquin
Koltuksuz, Ahmet
Torra, Vincenc
Zhang, Jie
Sensoy, Murat
Zincir, Ibrahim
Miri, Ali

Chen, Liang, Edwards, Peter, Nelson, John D. and Norman, Timothy J. (2015) An access control model for protecting provenance graphs. Hisil, Huseyin, Ghorbani, Ali, Garcia-Alfaro, Joaquin, Koltuksuz, Ahmet, Torra, Vincenc, Zhang, Jie, Sensoy, Murat, Zincir, Ibrahim and Miri, Ali (eds.) In 2015 13th Annual Conference on Privacy, Security and Trust, PST 2015. Institute of Electrical and Electronics Engineers Inc. pp. 125-132 . (doi:10.1109/PST.2015.7232963).

Record type: Conference or Workshop Item (Paper)

Abstract

Securing provenance has recently become an important research topic, resulting in a number of models for protecting access to provenance. Existing work has focused on graph transformation mechanisms that supply a user with a provenance view that satisfies both access control policies and validity constraints of provenance. However, it is not always possible to satisfy both of them simultaneously, because these two conditions are often inconsistent which require sophisticated conflict resolution strategies to be put in place. In this paper we develop a new access control model tailored for provenance. In particular, we explicitly take into account validity constraints of provenance when specifying certain parts of provenance to which access is restricted. Hence, a provenance view that is granted to a user by our authorisation mechanism would automatically satisfy the validity constraints. Moreover, we propose algorithms that allow provenance owners to deploy fine-grained access control for their provenance data.

Full text not available from this repository.

More information

Published date: 31 August 2015
Additional Information: Funding Information: This research is supported by the award made by the RCUK Digital Economy and Energy programmes to the TRUMP UK-India project (award reference: EP/J00068X/1) and the RCUK Digital Economy programme to the dot.rural Digital Economy Hub (award reference: EP/G066051/1). Publisher Copyright: © 2015 IEEE. Copyright: Copyright 2016 Elsevier B.V., All rights reserved.
Venue - Dates: 13th Annual Conference on Privacy, Security and Trust, PST 2015, , Izmir, Turkey, 2015-07-20 - 2015-07-22

Identifiers

Local EPrints ID: 450240
URI: http://eprints.soton.ac.uk/id/eprint/450240
PURE UUID: fb4dae4b-f662-49cf-b30b-2d22fbefe0a3
ORCID for Timothy J. Norman: ORCID iD orcid.org/0000-0002-6387-4034

Catalogue record

Date deposited: 16 Jul 2021 16:36
Last modified: 17 Jul 2021 01:51

Export record

Altmetrics

Contributors

Author: Liang Chen
Author: Peter Edwards
Author: John D. Nelson
Editor: Huseyin Hisil
Editor: Ali Ghorbani
Editor: Joaquin Garcia-Alfaro
Editor: Ahmet Koltuksuz
Editor: Vincenc Torra
Editor: Jie Zhang
Editor: Murat Sensoy
Editor: Ibrahim Zincir
Editor: Ali Miri

University divisions

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×