• Title/Summary/Keyword: Data Provenance

Search Result 77, Processing Time 0.029 seconds

A Semiotics Framework for Analyzing Data Provenance Research

  • Ram, Sudha;Liu, Jun
    • Journal of Computing Science and Engineering
    • /
    • v.2 no.3
    • /
    • pp.221-248
    • /
    • 2008
  • Data provenance is the background knowledge that enables a piece of data to be interpreted and used correctly within context. The importance of tracking provenance is widely recognized, as witnessed by significant research in various areas including e-science, homeland security, and data warehousing and business intelligence. In order to further advance the research on data provenance, however, one must first understand the research that has been conducted to date and identify specific topics that merit further investigation. In this work, we develop a framework based on semiotics theory to assist in analyzing and comparing existing provenance research at the conceptual level. We provide a detailed review of data provenance research and compare and contrast the research based on d semiotics framework. We conclude with an identification of challenges that will drive future research in this field.

Toward Developing a Provenance Conceptual Model for Data-driven Electronic Records (데이터형 전자기록을 위한 출처 개념 모델 개발 방향)

  • Hyun, Moonsoo
    • The Korean Journal of Archival Studies
    • /
    • no.79
    • /
    • pp.305-341
    • /
    • 2024
  • This study explored the possibilities of a new approach to developing the provenance concept to electronic records in the data-driven digital environments by reviewing and adopting data provenance concepts and models. It then conducted basic literature review to develop a ground for a model representing the provenance of data-driven electronic records. In particular, it proposed to embrace to the concepts of retrospective and prospective provenance, and to develop a different model for representing provenance from records management metadata. If the model can be developed that can represent provenance independently while maintaining a dynamic relationship with records, it can be ensure the fluidity of records and even support to secure the record's attributes and play the roles of provenance. Eventually, it proposed the direction to develop the provenance model which can support the fixity of records, the reproducibility of activities, and the trustworthiness of representations. It is expected to be a fit provenance model in the data-driven digital environment.

A Study on Developing a Provenance Conceptual Model for Data-driven Electronic Records Based on Extending W3C PROV (PROV의 확장에 기초한 데이터형 전자기록의 출처 모델 연구)

  • Hyun, Moonsoo
    • The Korean Journal of Archival Studies
    • /
    • no.80
    • /
    • pp.5-41
    • /
    • 2024
  • This study was conducted to develop a provenance representation model for data-type electronic records. It supports the distinction between provenance and context for the creation and management of data-type electronic records. To express both, it aims to design an extensible provenance model. For this purpose, W3C PROV is utilized as a basic model, with P-Plan and ProvONE for designing prospective provenance area. Afterward, the provenance model was extended by mapping the record management requirements. The provenance model proposed in this study is designed to represent and connect both retrospective and prospective provenance of data-type electronic records. Based on this study, it is expected to discussing the concept of provenance in the records management and archival studies area and to extending the model in the future.

A Fast and Exact Verification of Inter-Domain Data Transfer based on PKI

  • Jung, Im-Y.;Eom, Hyeon-Sang;Yeom, Heon-Y.
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.3
    • /
    • pp.61-72
    • /
    • 2011
  • Trust for the data created, processed and transferred on e-Science environments can be estimated with provenance. The information to form provenance, which says how the data was created and reached its current state, increases as data evolves. It is a heavy burden to trace and verify the massive provenance in order to trust data. On the other hand, it is another issue how to trust the verification of data with provenance. This paper proposes a fast and exact verification of inter-domain data transfer and data origin for e-Science environment based on PKI. The verification, which is called two-way verification, cuts down the tracking overhead of the data along the causality presented on Open Provenance Model with the domain specialty of e-Science environment supported by Grid Security Infrastructure (GSI). The proposed scheme is easy-applicable without an extra infrastructure, scalable irrespective of the number of provenance records, transparent and secure with cryptography as well as low-overhead.

Provenance Compression Scheme Considering RDF Graph Patterns (RDF 그래프 패턴을 고려한 프로버넌스 압축 기법)

  • Bok, kyoungsoo;Han, Jieun;Noh, Yeonwoo;Yook, Misun;Lim, Jongtae;Lee, Seok-Hee;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.2
    • /
    • pp.374-386
    • /
    • 2016
  • Provenance means the meta data that represents the history or lineage of a data in collaboration storage environments. Therefore, as provenance has been accruing over time, it takes several ten times as large as the original data. The schemes for effciently compressing huge amounts of provenance are required. In this paper, we propose a provenance compression scheme considering the RDF graph patterns. The proposed scheme represents provenance based on a standard PROV model and encodes provenance in numeric data through the text encoding. We compress provenance and RDF data using the graph patterns. Unlike conventional provenance compression techniques, we compress provenance by considering RDF documents on the semantic web. In order to show the superiority of the proposed scheme, we compare it with the existing scheme in terms of compression ratio and the processing time.

Comparative Study of Evaluating the Trustworthiness of Data Based on Data Provenance

  • Gurjar, Kuldeep;Moon, Yang-Sae
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.234-248
    • /
    • 2016
  • Due to the proliferation of data being exchanged and the increase of dependency on this data for critical decision-making, it has become imperative to ensure the trustworthiness of the data at the receiving end in order to obtain reliable results. Data provenance, the derivation history of data, is a useful tool for evaluating the trustworthiness of data. Various frameworks have been proposed to evaluate the trustworthiness of data based on data provenance. In this paper, we briefly review a history of these frameworks for evaluating the trustworthiness of data and present an overview of some prominent state-of-the-art evaluation frameworks. Moreover, we provide a comparative analysis of two key frameworks by evaluating various aspects in an executional environment. Our analysis points to various open research issues and provides an understanding of the functionalities of the frameworks that are used to evaluate the trustworthiness of data.

Trust Evaluation Scheme of Web Data Based on Provenance in Social Semantic Web Environments (소셜 시맨틱 웹 환경에서 프로버넌스 기반의 웹 데이터 신뢰도 평가 기법)

  • Yoon, Sangwon;Choi, Kitae;Park, Jaeyeol;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • Journal of KIISE
    • /
    • v.43 no.1
    • /
    • pp.106-118
    • /
    • 2016
  • Recently, as the generation and sharing of web data have increased, the importance of a social semantic web that combines the semantic web and the social web has also been increasing. In this paper, we propose a trust evaluation scheme based on provenance by extending the PROV model in the social semantic web environment. The proposed scheme manages the provenance of web data and adds the necessary elements for trust evaluation in the PROV model of W3C. The extended PROV model supports data management and provenance tracing. The proposed trust evaluation scheme considers various parameters such as user trust, original data trust, and user evaluation. The evaluated trust is managed as provenance. When processing a query, the proposed scheme generates a result by considering the trust. Therefore, the proposed scheme can manage the provenance of web data and compute data trust correctly by using such various parameters. The evaluated trust becomes a criterion to determine whether the query result can be trusted or not. In order to show the validity of the proposed scheme, we verify its performance using SPARQL queries.

A Survey on system-based provenance graph and analysis trends (시스템 기반 프로비넌스 그래프와 분석 기술 동향)

  • Park Chanil
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.87-99
    • /
    • 2022
  • Cyber attacks have become more difficult to detect and track as sophisticated and advanced APT attacks increase. System providence graphs provide analysts of cyber security with techniques to determine the origin of attacks. Various system provenance graph techniques have been studied to reveal the origin of penetration against cyber attacks. In this study, we investigated various system provenance graph techniques and described about data collection and analysis techniques. In addition, based on the results of our survey, we presented some future research directions.

Scientific Analysis and Provenance Study of Bronze Artifacts Excavated from Dongchon Site in Sunchang, Jeollabuk-do, Korea (전북 순창 동촌유적 출토 청동기의 원료 산지연구)

  • Bae, Go Woon;Chung, Kwang Yong
    • Journal of Conservation Science
    • /
    • v.32 no.2
    • /
    • pp.101-108
    • /
    • 2016
  • Lead isotope ratio of bronze artifacts excavated from Dongchon Site in Sunchang have determined by TIMS. As results of comparison lead isotope ratio of bronze objects with the provenance data of galenas of Korea, China, and Japan, the provenance of three material of bronze objects were turned out to originate from the southern and northern part of China. On the other hands, data were plotted either in zone 3 of the South Korean galena map. The results of these scientific analysis of bronze objects can be used as basic data in comparison researches on manufacturing technology, provenance of bronze objects to be found in the future.

Trust Assurance of Data in Cloud Computing Environment (클라우드 컴퓨팅 환경의 데이터 신뢰 확보)

  • Jung, Im-Y.;Jo, In-Soon;Yu, Young-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9B
    • /
    • pp.1066-1072
    • /
    • 2011
  • Cloud Computing Environment provides users with a blue print of IT Utopia with virtualization; unbounded computing power and data storage free from the cost and the responsibility of maintenance for the IT resources. But, there are several issues to be addressed for the Cloud Computing Environment to be realized as the blue print because users cannot control the IT resources provided by the Cloud Computing Environment but can only use them. One of the issues is how to secure and to trust data in the Cloud Computing Environment. In this paper, an efficient and practical trust assurance of data with provenance in Cloud Computing Environment.