Computer Science – Databases
Scientific paper
2010-05-30
Computer Science
Databases
Scientific paper
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate data items passed between module executions. However, authors/owners of workflows may wish to keep some of this information confidential. In particular, a module may be proprietary, and users should not be able to infer its behavior by seeing mappings between all data inputs and outputs. The problem we address in this paper is the following: Given a workflow, abstractly modeled by a relation R, a privacy requirement \Gamma and costs associated with data. The owner of the workflow decides which data (attributes) to hide, and provides the user with a view R' which is the projection of R over attributes which have not been hidden. The goal is to minimize the cost of hidden data while guaranteeing that individual modules are \Gamma -private. We call this the "secureview" problem. We formally define the problem, study its complexity, and offer algorithmic solutions.
Davidson Susan B.
Khanna Sanjeev
Milo Tova
Panigrahi Debmalya
Roy Sudeepa
No associations
LandOfFree
Provenance Views for Module Privacy does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Provenance Views for Module Privacy, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Provenance Views for Module Privacy will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-162088