Addressing the Limitations of Γ - privacy

نویسنده

  • Isuru Suriarachchi
چکیده

Collection of provenance information is an important aspect of any scientific workflow system. Workflow provenance generally captures lot of information about individual modules in the workflow including input parameters, input and output data products, intermediate data products, module invocation times etc. Therefore, a complete provenance graph contains enough information for someone to have a clear picture about the workflow structure, individual modules and data flow within the workflow. This can cause privacy issues in certain workflows which consume sensitive information. To address these issues, workflow owners may want to keep some provenance information confidential and make sure those are not published with provenance data. Davidson et al. [1] presents Γ-privacy which quantifies the module privacy requirements of scientific workflow provenance data. It ensures the privacy of all modules in the workflow by hiding some information from the original provenance data. And also, Γ-privacy tries to minimize the cost of hidden data to make sure the maximum amount of provenance information is published. However, Cheney and Perera [2] points out some limitations of Γprivacy including the difficulty of deciding an appropriate value for Γ in a complex workflow. In this paper, we discuss those limitations in more details and present a solution to address the main limitations of Γ-privacy including the difficulty of selecting a value for Γ using the ideas from differential privacy [3] and ProPub [4]. Keywords—Workflow provenance, Module privacy, Differential privacy, Noise.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Addressing the Dilema Between Collaboration and Privacy in Coworking Spaces

This paper aims to inform design strategies for regulating privacy in coworking spaces. Coworking spaces are growing at a high rate, yet studies related to the social, psychological, behavioral and physical needs associated with these environments are limited. The growth of coworking spaces is in greater part facilitated by a drive towards greater interaction and collaboration among the workfor...

متن کامل

مقایسه ی ُمیزان رعایت اصول محرمانگی در موارد قانونی بر مبنای راهنمای سازمان بهداشت جهانی دربیمارستان های آموزشی وابسته به دانشگاه های علوم پزشکی ایران ،تهران و شهیدبهشتی :1387.

Introduction: In many countries, the medical records are important legal documents, essential not only for the present and future care for patients but also as legal documents to protect the patients and the hospitals. Medical record is a confidential document and always the patient's right to privacy must be regarded. Methods: This is a descriptive - cross sectional study. Study sample were 34...

متن کامل

An evaluation of recent secure deduplication proposals

Deduplication is widely used by cloud storage providers to cut costs, by storing and uploading a single instance of identical files shared across multiple user accounts. However, cross-account deduplication introduces several new side-channel attacks on user privacy; see e.g., Harnik et al. (IEEE Security and Privacy Magazine, 2010), Mulazzani et al. (USENIX Security, 2011). As a response, seve...

متن کامل

A study on the role of the landscape design with the approach of solving the limitations of use for women in the coastal areas in Iran as an Islamic country

The coastal landscape is relatively new and complex category that offers the potential of sharing the sciences of architecture, perspective, nature and the environment, tourism and hospitality, beyond their physical effects on one another, their widespread effects in enhancing identity and the quality of the architectural atmosphere cannot be ignored. Approaches to greeting with beaches in Isla...

متن کامل

A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress

Network monitoring activities are surrounded by serious privacy implications. The inherent leakage-proneness is harshened due to the increasing complexity of the monitoring procedures and infrastructures, that may include multiple traffic observation points, distributed mitigation mechanisms and even inter-operator cooperation. In this paper, we report a work in progress policy model that aims ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014