TY - GEN
T1 - Provenance views for module privacy
AU - Davidson, Susan B.
AU - Khanna, Sanjeev
AU - Milo, Tova
AU - Panigrahi, Debmalya
AU - Roy, Sudeepa
PY - 2011
Y1 - 2011
N2 - Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate data items passed between module executions. However, authors/owners of workflows may wish to keep some of this information confidential. In particular, a module may be proprietary, and users should not be able to infer its behavior by seeing mappings between all data inputs and outputs. The problem we address in this paper is the following: Given a workflow, abstractly modeled by a relation R, a privacy requirement Γ and costs associated with data. The owner of the workflow decides which data (attributes) to hide, and provides the user with a view R' which is the projection of R over attributes which have not been hidden. The goal is to minimize the cost of hidden data while guaranteeing that individual modules are Γ-private. We call this the Secure-View problem. We formally define the problem, study its complexity, and offer algorithmic solutions.
AB - Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate data items passed between module executions. However, authors/owners of workflows may wish to keep some of this information confidential. In particular, a module may be proprietary, and users should not be able to infer its behavior by seeing mappings between all data inputs and outputs. The problem we address in this paper is the following: Given a workflow, abstractly modeled by a relation R, a privacy requirement Γ and costs associated with data. The owner of the workflow decides which data (attributes) to hide, and provides the user with a view R' which is the projection of R over attributes which have not been hidden. The goal is to minimize the cost of hidden data while guaranteeing that individual modules are Γ-private. We call this the Secure-View problem. We formally define the problem, study its complexity, and offer algorithmic solutions.
KW - Approximation
KW - Privacy
KW - Provenance
KW - Workflows
UR - http://www.scopus.com/inward/record.url?scp=79960191413&partnerID=8YFLogxK
U2 - 10.1145/1989284.1989305
DO - 10.1145/1989284.1989305
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:79960191413
SN - 9781450306607
T3 - Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
SP - 175
EP - 186
BT - PODS'11 - Proceedings of the 30th Symposium on Principles of Database Systems
Y2 - 13 May 2011 through 15 May 2011
ER -