On provenance and privacy

Susan B. Davidson, Sanjeev Khanna, Sudeepa Roy, Julia Stoyanovich, Val Tannen, Yi Chen

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Provenance in scientific workflows is a double-edged sword. On the one hand, recording information about the module executions used to produce a data item, as well as the parameter settings and intermediate data items passed between module executions, enables transparency and repro-ducibility of results. On the other hand, a scientific workflow often contains private or confidential data and uses proprietary modules. Hence, providing exact answers to provenance queries over all executions of the workflow may reveal private information. In this paper we discuss privacy concerns in scientific workflows - data, module, and structural privacy - and frame several natural questions: (i) Can we formally analyze data, module, and structural privacy, giving provable privacy guarantees for an unlimited/bounded number of provenance queries? (ii) How can we answer search and structural queries over repositories of workflow specifications and their executions, providing as much information as possible to the user while still guaranteeing privacy? We then highlight some recent work in this area and point to several directions for future work.

    Original languageEnglish (US)
    Title of host publicationDatabase Theory - ICDT 2011
    Subtitle of host publication14th International Conference on Database Theory, Proceedings
    Pages3-10
    Number of pages8
    DOIs
    StatePublished - Mar 11 2011
    Event14th International Conference on Database Theory, ICDT'11 - Uppsala, Sweden
    Duration: Mar 21 2011Mar 23 2011

    Publication series

    NameACM International Conference Proceeding Series

    Other

    Other14th International Conference on Database Theory, ICDT'11
    CountrySweden
    CityUppsala
    Period3/21/113/23/11

    Keywords

    • Privacy
    • Provenance
    • Scientific workflows

    ASJC Scopus subject areas

    • Software
    • Human-Computer Interaction
    • Computer Vision and Pattern Recognition
    • Computer Networks and Communications

    Fingerprint Dive into the research topics of 'On provenance and privacy'. Together they form a unique fingerprint.

  • Cite this

    Davidson, S. B., Khanna, S., Roy, S., Stoyanovich, J., Tannen, V., & Chen, Y. (2011). On provenance and privacy. In Database Theory - ICDT 2011: 14th International Conference on Database Theory, Proceedings (pp. 3-10). (ACM International Conference Proceeding Series). https://doi.org/10.1145/1938551.1938554