ABSTRACT

We believe that a very important challenge for provenance is building a scalable and secured framework for provenance. In fact, we found some existing works in the literature relating to the scalability and security of provenance (Braun et al. 2008; Groth et al. 2006; Hasan et al. 2007; Tan et al. 2006). Furthermore, recording complete provenance would result in extremely large amounts of documentation, which presents problems for recording, querying, managing, and storing

provenance information. Also, despite the importance of security issues in provenance, it has not been fully explored in the research community (Hasan et al. 2007), especially with respect to access control (Ni et al. 2009). The research community has raised many concerns about securing provenance information (Blaustein et al. 2008; Braun et al. 2008; Ni et al. 2009). In Braun et al. (2008), it is suggested that provenance needs its own security model and that existing access control models do not operate over provenance, which takes the form of a directed graph. It was then suggested in Ni et al. (2009) that a generalized access control language model for protecting provenance is needed. Some approaches also recognize that a system that handles both the security and provenance together is needed (Blaustein et al. 2008; Braun et al. 2008; Seltzer et al. 2005; Tan et al. 2006), while other works suggest that scalable access control mechanisms for provenance are needed (Rosenthal et al. 2009; Simmhan et al. 2005; Simmhan et al.).