Privacy issues in scientific workflow provenance. Davidson, S. B, Khanna, S., Roy, S., & Boulakia, S. C. In Missier, P., Curcin, V., & Dadvidson, S., editors, First International Workshop on Workflow Approaches to New Data-centric Science (WANDS'10), Indianapolis, 2010. ACM. Paper abstract bibtex A scientific workflow often deals with proprietary modules as well as private or confidential data, such as health or medical information. Hence providing exact answers to provenance queries over all executions of the workflow may reveal private information. In this paper we first study the potential privacy issues in a scientific workflow -- module privacy, data privacy, and provenance privacy, and frame several natural questions: (i) can we formally analyze module, data or provenance privacy giving provable privacy guarantees for an unlimited/bounded number of provenance queries? (ii) how can we answer provenance queries, providing as much information as possible to the user while still guaranteeing the required privacy? Then we look at module privacy in detail and propose a formal model from our recent work in [11]. Finally we point to several directions for future work.
@INPROCEEDINGS{Davidson2010,
author = {Davidson, Susan B and Khanna, Sanjeev and Roy, Sudeepa and Boulakia,
Sarah Cohen},
title = {{Privacy issues in scientific workflow provenance}},
booktitle = {First International Workshop on Workflow Approaches to New Data-centric
Science (WANDS'10)},
year = {2010},
editor = {Missier, Paolo and Curcin, Vasa and Dadvidson, Susan},
address = {Indianapolis},
publisher = {ACM},
abstract = {A scientific workflow often deals with proprietary modules as well
as private or confidential data, such as health or medical information.
Hence providing exact answers to provenance queries over all executions
of the workflow may reveal private information. In this paper we
first study the potential privacy issues in a scientific workflow
-- module privacy, data privacy, and provenance privacy, and frame
several natural questions: (i) can we formally analyze module, data
or provenance privacy giving provable privacy guarantees for an unlimited/bounded
number of provenance queries? (ii) how can we answer provenance queries,
providing as much information as possible to the user while still
guaranteeing the required privacy? Then we look at module privacy
in detail and propose a formal model from our recent work in [11].
Finally we point to several directions for future work.},
keywords = {\#disease\_outbreak,\#management,\#privacy,\#provenance,\#use,\#workflow},
mendeley-tags = {\#disease\_outbreak,\#management,\#privacy,\#provenance,\#use,\#workflow},
url = {http://portal.acm.org/citation.cfm?id=1833398.1833401}
}
Downloads: 0
{"_id":"LSu3oyPTBm33vBHPo","bibbaseid":"davidson-khanna-roy-boulakia-privacyissuesinscientificworkflowprovenance-2010","downloads":0,"creationDate":"2015-12-16T16:13:41.388Z","title":"Privacy issues in scientific workflow provenance","author_short":["Davidson, S. B","Khanna, S.","Roy, S.","Boulakia, S. C."],"year":2010,"bibtype":"inproceedings","biburl":"http://delicias.dia.fi.upm.es/prov-xgCURATED.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"propositions":[],"lastnames":["Davidson"],"firstnames":["Susan","B"],"suffixes":[]},{"propositions":[],"lastnames":["Khanna"],"firstnames":["Sanjeev"],"suffixes":[]},{"propositions":[],"lastnames":["Roy"],"firstnames":["Sudeepa"],"suffixes":[]},{"propositions":[],"lastnames":["Boulakia"],"firstnames":["Sarah","Cohen"],"suffixes":[]}],"title":"Privacy issues in scientific workflow provenance","booktitle":"First International Workshop on Workflow Approaches to New Data-centric Science (WANDS'10)","year":"2010","editor":[{"propositions":[],"lastnames":["Missier"],"firstnames":["Paolo"],"suffixes":[]},{"propositions":[],"lastnames":["Curcin"],"firstnames":["Vasa"],"suffixes":[]},{"propositions":[],"lastnames":["Dadvidson"],"firstnames":["Susan"],"suffixes":[]}],"address":"Indianapolis","publisher":"ACM","abstract":"A scientific workflow often deals with proprietary modules as well as private or confidential data, such as health or medical information. Hence providing exact answers to provenance queries over all executions of the workflow may reveal private information. In this paper we first study the potential privacy issues in a scientific workflow -- module privacy, data privacy, and provenance privacy, and frame several natural questions: (i) can we formally analyze module, data or provenance privacy giving provable privacy guarantees for an unlimited/bounded number of provenance queries? (ii) how can we answer provenance queries, providing as much information as possible to the user while still guaranteeing the required privacy? Then we look at module privacy in detail and propose a formal model from our recent work in [11]. Finally we point to several directions for future work.","keywords":"#disease_outbreak,#management,#privacy,#provenance,#use,#workflow","mendeley-tags":"#disease_outbreak,#management,#privacy,#provenance,#use,#workflow","url":"http://portal.acm.org/citation.cfm?id=1833398.1833401","bibtex":"@INPROCEEDINGS{Davidson2010,\r\n author = {Davidson, Susan B and Khanna, Sanjeev and Roy, Sudeepa and Boulakia,\r\n\tSarah Cohen},\r\n title = {{Privacy issues in scientific workflow provenance}},\r\n booktitle = {First International Workshop on Workflow Approaches to New Data-centric\r\n\tScience (WANDS'10)},\r\n year = {2010},\r\n editor = {Missier, Paolo and Curcin, Vasa and Dadvidson, Susan},\r\n address = {Indianapolis},\r\n publisher = {ACM},\r\n abstract = {A scientific workflow often deals with proprietary modules as well\r\n\tas private or confidential data, such as health or medical information.\r\n\tHence providing exact answers to provenance queries over all executions\r\n\tof the workflow may reveal private information. In this paper we\r\n\tfirst study the potential privacy issues in a scientific workflow\r\n\t-- module privacy, data privacy, and provenance privacy, and frame\r\n\tseveral natural questions: (i) can we formally analyze module, data\r\n\tor provenance privacy giving provable privacy guarantees for an unlimited/bounded\r\n\tnumber of provenance queries? (ii) how can we answer provenance queries,\r\n\tproviding as much information as possible to the user while still\r\n\tguaranteeing the required privacy? Then we look at module privacy\r\n\tin detail and propose a formal model from our recent work in [11].\r\n\tFinally we point to several directions for future work.},\r\n keywords = {\\#disease\\_outbreak,\\#management,\\#privacy,\\#provenance,\\#use,\\#workflow},\r\n mendeley-tags = {\\#disease\\_outbreak,\\#management,\\#privacy,\\#provenance,\\#use,\\#workflow},\r\n url = {http://portal.acm.org/citation.cfm?id=1833398.1833401}\r\n}\r\n\r\n","author_short":["Davidson, S. B","Khanna, S.","Roy, S.","Boulakia, S. C."],"editor_short":["Missier, P.","Curcin, V.","Dadvidson, S."],"key":"Davidson2010","id":"Davidson2010","bibbaseid":"davidson-khanna-roy-boulakia-privacyissuesinscientificworkflowprovenance-2010","role":"author","urls":{"Paper":"http://portal.acm.org/citation.cfm?id=1833398.1833401"},"keyword":["#disease_outbreak","#management","#privacy","#provenance","#use","#workflow"],"downloads":0,"html":""},"search_terms":["privacy","issues","scientific","workflow","provenance","davidson","khanna","roy","boulakia"],"keywords":["#disease_outbreak","#management","#privacy","#provenance","#use","#workflow"],"authorIDs":[],"dataSources":["drTBSwRdnSo2Wujnd"]}