Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Provenance
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Computer science=== Within [[computer science]], [[Information science|informatics]] uses the term "provenance"<ref>{{Cite book|last1=Tan|first1=Yu Shyang|last2=Ko|first2=Ryan K.L.|last3=Holmes|first3=Geoff|title=2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing |chapter=Security and Data Accountability in Distributed Systems: A Provenance Survey |date=November 2013|pages=1571β1578|language=en-US|publisher=IEEE|doi=10.1109/hpcc.and.euc.2013.221|isbn=9780769550886|s2cid=16890856}}</ref> to mean the [[Data lineage|lineage of data]], as per data provenance, with research in the last decade extending the conceptual model of causality and relation to include processes that act on data and agents that are responsible for those processes. See, for example, the proceedings of the International Provenance Annotation Workshop (IPAW)<ref>{{cite web|url=http://ipaw.info/|title=International Provenance and Annotation Workshop |website=International Provenance and Annotation Workshop |access-date=10 February 2019 }}</ref> and Theory and Practice of Provenance (TaPP).<ref>{{cite web|url=http://workshops.inf.ed.ac.uk/tapp2015/|title=TaPP 2015|website=workshops.inf.ed.ac.uk |access-date=10 February 2019 }}</ref> [[Semantic web]] standards bodies, including the [[World Wide Web Consortium]] in 2014, have ratified a standard data model for provenance representation known as PROV<ref>{{cite web|url=http://www.w3.org/TR/prov-overview/Overview.html|title=PROV-Overview|website=www.w3.org}}</ref> which draws from many of the better-known provenance representation systems that preceded it, such as the [[Proof Markup Language]] and the Open Provenance Model.<ref>{{cite web|url=https://openprovenance.org/|title=Provenance Web Services|website=openprovenance.org}}</ref> Interoperability is a design goal of most recent computer science provenance theories and models, for example the Open Provenance Model (OPM) 2008 generation workshop aimed at "establishing inter-operability of systems" through information exchange agreements.<ref>Moreau et al. (2008) The Open Provenance Model: An Overview, in J. Freire, D. Koop, and L. Moreau (Eds.): IPAW 2008, LNCS 5272, pp. 323β326, 2008. Springer. [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.148.7394&rep=rep1&type=pdf]</ref> Data models and serialisation formats for delivering provenance information typically reuse existing metadata models where possible to enable this. Both the OPM Vocabulary<ref>Zhao, J. (2010) "[http://purl.org/net/opmv/ns Open Provenance Model Vocabulary Specification]", accessed 2016-04-09.</ref> and the PROV Ontology<ref>Lebo et al. (eds.) "[https://www.w3.org/TR/prov-o/ PROV-O: The PROV Ontology]", accessed 2016-04-09.</ref> make extensive use of metadata models such as [[Dublin Core]] and [[Semantic Web]] technologies such as the [[Web Ontology Language]] (OWL). Current practice is to rely on the W3C PROV data model, OPM's successor.<ref>{{cite web|url=https://khalidbelhajjame.wordpress.com/2013/04/04/w3c-prov-implementations/|title=W3C PROV Implementations: Preliminary Analysis|first=Khalid |last=Belhajjame|date=4 April 2013|access-date=10 February 2019 }}</ref> There are several maintained and open-source provenance capture implementation at the operating system level such as CamFlow,<ref>[http://camflow.org/ CamFlow], a [[Linux security module]] by the University of Cambridge and Harvard University</ref><ref>{{cite book |last1=Pasquier |first1=Thomas |last2=Han |first2=Xueyuan |last3=Goldstein |first3=Mark |last4=Moyer |first4=Thomas |last5=Eyers |first5=David |last6=Seltzer |first6=Margo |last7=Bacon |first7=Jean |title=Proceedings of the 2017 Symposium on Cloud Computing |chapter=Practical whole-system provenance capture |series=SoCC '17 |date=2017|pages=405β418|doi=10.1145/3127479.3129249|chapter-url=https://dl.acm.org/citation.cfm?id=3129249&CFID=815806448&CFTOKEN=34069737 |publisher=ACM|isbn=9781450350280 |arxiv=1711.05296 |bibcode=2017arXiv171105296P |s2cid=4885447 }}</ref> Progger<ref name=":0">{{Cite book |last1=Li |first1=Xin |last2=Joshi |first2=Chaitanya|last3=Tan|first3=Alan Yu Shyang|last4=Ko|first4=Ryan Kok Leong|title=2015 IEEE Trustcom/BigDataSE/ISPA |chapter=Inferring User Actions from Provenance Logs |date=August 2015 |volume=1 |pages=742β749 |language=en-US|publisher=IEEE|doi=10.1109/trustcom.2015.442|isbn=9781467379526|hdl=10289/9505 |s2cid=1904317 |hdl-access=free}}</ref> for Linux and MS Windows, and SPADE for Linux, [[Microsoft Windows|MS Windows]], and [[MacOS]].<ref>{{cite web|url=https://github.com/ashish-gehani/SPADE |title=SPADE: Support for Provenance Auditing in Distributed Environments |first=Ashish |last=Gehani |date=8 February 2019 |via=GitHub |access-date=10 February 2019 }}</ref> Operating system level provenance have gained interest in the security community notably to develop novel intrusion detection techniques.<ref>{{cite journal |last1=Han |first1=Xueyuan |last2=Pasquier |first2=Thomas |last3=Bates |first3=Adam |last4=Mickens |first4=James |last5=Seltzer |first5=Margo |title=Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats |journal=Network and Distributed System Security Symposium |date=2020-02-26 |doi=10.14722/ndss.2020.24046|arxiv=2001.01525 |isbn=978-1-891562-61-7 |url=https://www.ndss-symposium.org/ndss-paper/unicorn-runtime-provenance-based-detector-for-advanced-persistent-threats/|doi-access=free }}</ref> Other implementations exist for specific programming and scripting languages, such as RDataTracker<ref>{{cite web|url=https://github.com/End-to-end-provenance/RDataTracker|title=An R library to collect provenance from R scripts.: End-to-end-provenance/RDataTracker|date=12 December 2018|via=GitHub}}</ref> for [[R (programming language)|R]], and NoWorkflow<ref>{{cite web|url=https://github.com/gems-uff/noworkflow|title=Supporting infrastructure to run scientific experiments without a scientific workflow management system.: gems-uff/noworkflow|date=19 December 2018|via=GitHub}}</ref> for [[Python (programming language)|Python]]. ====Whole-system provenance implementation for Linux==== * PASS<ref>{{cite journal|last1=Muniswamy-Reddy|first1=Kiran-Kumar|last2=Holland|first2=David|last3=Seltzer|first3=Margo|title=Provenance-Aware Storage Systems|journal=USENIX 2006 Annual Technical Conference Refereed Paper|date=2006|url=https://www.usenix.org/legacy/event/usenix06/tech/full_papers/muniswamy-reddy/muniswamy-reddy_html/}}</ref> β closed source β not maintained β kernel v2.6.X * Hi-Fi<ref>{{cite book|last1=Pohly|first1=Devin J.|last2=McLaughlin|first2=Stephen|last3=McDaniel|first3=Patrick|last4=Butler|first4=Kevin|title=Proceedings of the 28th Annual Computer Security Applications Conference |chapter=Hi-Fi |series=Acsac '12|date=2012|pages=259β268|doi=10.1145/2420950.2420989|chapter-url=https://dl.acm.org/citation.cfm?doid=2420950.2420989|publisher=ACM|isbn=9781450313124|s2cid=5622944}}</ref> β open source<ref>{{cite web|last1=Pohly|first1=Devin J.|title=Hi-Fi|website=[[GitHub]]|url=https://github.com/djpohly/linux|date=19 August 2013}}</ref> β not maintained β kernel v3.2.x * Flogger<ref>{{Cite book|last1=Ko|first1=Ryan K. L.|last2=Jagadpramana|first2=Peter|last3=Lee|first3=Bu Sung|title=2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications |chapter=Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments |date=November 2011|pages=765β771|language=en-US|publisher=IEEE|doi=10.1109/trustcom.2011.100|isbn=9781457721359|s2cid=15858535}}</ref> β closed source β not maintained β kernel v2.6.x * S2Logger<ref>{{Cite book|last1=Suen|first1=Chun Hui|last2=Ko|first2=Ryan K.L.|last3=Tan|first3=Yu Shyang|last4=Jagadpramana|first4=Peter|last5=Lee|first5=Bu Sung|title=2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications |chapter=S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance |date=July 2013|pages=594β602|language=en-US|publisher=IEEE|doi=10.1109/trustcom.2013.73|isbn=9780769550220|s2cid=504801}}</ref> β closed source β not maintained β kernel v2.6.x * LPM<ref>{{cite journal|last1=Bates|first1=Adam|last2=Tian|first2=Dave|last3=Butler|first3=Kevin R. B.|last4=Moyer|first4=Thomas|title=Trustworthy Whole-system Provenance for the Linux Kernel|journal=Proceedings of the 24th USENIX Conference on Security Symposium|series=SEC'15|date=2015|pages=319β334|url=https://dl.acm.org/citation.cfm?id=2831164|publisher=USENIX Association|isbn=9781931971232}}</ref> β open source<ref>{{cite web|title=uf_sensei / redhat-linux-provenance-release β Bitbucket|url=https://bitbucket.org/uf_sensei/redhat-linux-provenance-release|website=bitbucket.org|language=en}}</ref> β not maintained β kernel v2.6.x * Progger<ref>{{Cite book|last1=Ko|first1=Ryan K.L.|last2=Will|first2=Mark A.|title=2014 IEEE 7th International Conference on Cloud Computing |chapter=Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking |date=June 2014|pages=881β889|language=en-US|publisher=IEEE|doi=10.1109/cloud.2014.121|isbn=9781479950638|hdl=10289/9018|s2cid=17536574|hdl-access=free}}</ref><ref name=":0" /><ref>{{Cite book|last1=Taha|first1=Mohammad M. Bany|last2=Chaisiri|first2=Sivadon|last3=Ko|first3=Ryan K. L.|title=2015 IEEE Trustcom/BigDataSE/ISPA |chapter=Trusted Tamper-Evident Data Provenance |date=August 2015|pages=646β653|language=en-US|publisher=IEEE|doi=10.1109/trustcom.2015.430|isbn=9781467379526|s2cid=10720318}}</ref><ref>{{Cite book|last1=Garae|first1=Jeffery|last2=Ko|first2=Ryan K.L.|last3=Chaisiri|first3=Sivadon|title=2016 IEEE Trustcom/BigDataSE/ISPA |chapter=UVisP: User-centric Visualization of Data Provenance with Gestalt Principles |date=August 2016|pages=1923β1930|language=en-US|publisher=IEEE|doi=10.1109/trustcom.2016.0294|isbn=9781509032051|hdl=10289/10996|s2cid=11231512|hdl-access=free}}</ref> β open source<ref>{{Cite web|url=https://github.com/CROWLaboratory/Progger|title=CROWLaboratory/Progger|website=GitHub|language=en|access-date=2018-08-04}}</ref> β not maintained β kernel v2.6.x and kernel v.4.14.x * CamFlow<ref>{{cite journal|last1=Pasquier|first1=Thomas|last2=Singh|first2=Jatinder|last3=Eyers|first3=David|last4=Bacon|first4=Jean|title=Camflow: Managed Data-Sharing for Cloud Services|journal=IEEE Transactions on Cloud Computing|date=2015|volume=5|issue=3|pages=472β484|doi=10.1109/TCC.2015.2489211|arxiv=1506.04391|bibcode=2015arXiv150604391P|s2cid=11537746}}</ref><ref>{{cite book|last1=Pasquier|first1=Thomas|last2=Han|first2=Xueyuan|last3=Goldstein|first3=Mark|last4=Moyer|first4=Thomas|last5=Eyers|first5=David|last6=Seltzer|first6=Margo|last7=Bacon|first7=Jean|title=Proceedings of the 2017 Symposium on Cloud Computing |chapter=Practical whole-system provenance capture |series=SoCC '17|date=2017|pages=405β418|doi=10.1145/3127479.3129249|chapter-url=https://dl.acm.org/citation.cfm?id=3129249&CFID=829730322&CFTOKEN=15897970|publisher=ACM|isbn=9781450350280|arxiv=1711.05296|bibcode=2017arXiv171105296P|s2cid=4885447}}</ref><ref>{{cite journal |last1=Pasquier |first1=Thomas |last2=Han |first2=Xueyuan |last3=Moyer |first3=Thomas |last4=Bates |first4=Adam |last5=Hermant |first5=Olivier |last6=Eyers |first6=David |last7=Bacon |first7=Jean |last8=Seltzer |first8=Margo |title=Runtime Analysis of Whole-System Provenance |journal=25th ACM Conference on Computer and Communications Security |date=14 October 2018 |arxiv=1808.06049 |bibcode=2018arXiv180806049P }}</ref> β open source<ref>{{cite web|title=CamFlow: Practical Linux Provenance|url=http://camflow.org/|website=camflow.org}}</ref> β maintained β kernel v6.0.X
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)