Securing provenance

  • Authors:
  • Uri Braun;Avraham Shinnar;Margo Seltzer

  • Affiliations:
  • Harvard School of Engineering and Applied Sciences;Harvard School of Engineering and Applied Sciences;Harvard School of Engineering and Applied Sciences

  • Venue:
  • HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of these applications call for security, but existing security models are not up to the task. Provenance is a causality graph with annotations. The causality graph connects the various participating objects describing the process that produced an object's present state. Each node represents an object and each edge represents a relationship between two objects. This graph is an immutable directed acyclic graph (DAG). Existing security models do not apply to DAGs nor do they easily extend to DAGs. Any model to control access to the structure of the graph must integrate with existing security models for the objects. We need to develop an access control model tailored to provenance and study how it interacts with existing access control models. This paper frames the problem and identifies issues requiring further research.