Using provenance for secure data fusion in cooperative systems

Clara Bertolissi, Jerry den Hartog, Nicola Zannone

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Abstract

In the context of cooperative systems, data coming from multiple, autonomous, heterogeneous information sources, is processed and fused into new pieces of information that can be further processed by other entities participating in the cooperation. Controlling the access to such evolving and variegated data, often under the authority of different entities, is challenging. In this work, we identify a set of access control requirements for multi-source cooperative systems and propose an attribute-based access control model where provenance information is used to specify access constraints that account for both the evolution of data objects and the process of data fusion. We demonstrate the feasibility of the proposed model by showing how it can be implemented within existing access control mechanisms with minimal changes.

LanguageEnglish
Title of host publicationSACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies
Place of PublicationNew York
PublisherAssociation for Computing Machinery, Inc
Pages185-194
Number of pages10
ISBN (Electronic)978-1-4503-6753-0
DOIs
StatePublished - 28 May 2019
Event24th ACM Symposium on Access Control Models and Technologies, SACMAT 2019 - Toronto, Canada
Duration: 3 Jun 20196 Jun 2019

Conference

Conference24th ACM Symposium on Access Control Models and Technologies, SACMAT 2019
CountryCanada
CityToronto
Period3/06/196/06/19

Fingerprint

Data fusion
Access control

Keywords

  • ABAC
  • Data fusion
  • Provenance

Cite this

Bertolissi, C., den Hartog, J., & Zannone, N. (2019). Using provenance for secure data fusion in cooperative systems. In SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (pp. 185-194). New York: Association for Computing Machinery, Inc. DOI: 10.1145/3322431.3325100
Bertolissi, Clara ; den Hartog, Jerry ; Zannone, Nicola. / Using provenance for secure data fusion in cooperative systems. SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. New York : Association for Computing Machinery, Inc, 2019. pp. 185-194
@inproceedings{e5da3424e107497e99f7d9ae93f28ac6,
title = "Using provenance for secure data fusion in cooperative systems",
abstract = "In the context of cooperative systems, data coming from multiple, autonomous, heterogeneous information sources, is processed and fused into new pieces of information that can be further processed by other entities participating in the cooperation. Controlling the access to such evolving and variegated data, often under the authority of different entities, is challenging. In this work, we identify a set of access control requirements for multi-source cooperative systems and propose an attribute-based access control model where provenance information is used to specify access constraints that account for both the evolution of data objects and the process of data fusion. We demonstrate the feasibility of the proposed model by showing how it can be implemented within existing access control mechanisms with minimal changes.",
keywords = "ABAC, Data fusion, Provenance",
author = "Clara Bertolissi and {den Hartog}, Jerry and Nicola Zannone",
year = "2019",
month = "5",
day = "28",
doi = "10.1145/3322431.3325100",
language = "English",
pages = "185--194",
booktitle = "SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies",
publisher = "Association for Computing Machinery, Inc",
address = "United States",

}

Bertolissi, C, den Hartog, J & Zannone, N 2019, Using provenance for secure data fusion in cooperative systems. in SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Inc, New York, pp. 185-194, 24th ACM Symposium on Access Control Models and Technologies, SACMAT 2019, Toronto, Canada, 3/06/19. DOI: 10.1145/3322431.3325100

Using provenance for secure data fusion in cooperative systems. / Bertolissi, Clara; den Hartog, Jerry; Zannone, Nicola.

SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. New York : Association for Computing Machinery, Inc, 2019. p. 185-194.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

TY - GEN

T1 - Using provenance for secure data fusion in cooperative systems

AU - Bertolissi,Clara

AU - den Hartog,Jerry

AU - Zannone,Nicola

PY - 2019/5/28

Y1 - 2019/5/28

N2 - In the context of cooperative systems, data coming from multiple, autonomous, heterogeneous information sources, is processed and fused into new pieces of information that can be further processed by other entities participating in the cooperation. Controlling the access to such evolving and variegated data, often under the authority of different entities, is challenging. In this work, we identify a set of access control requirements for multi-source cooperative systems and propose an attribute-based access control model where provenance information is used to specify access constraints that account for both the evolution of data objects and the process of data fusion. We demonstrate the feasibility of the proposed model by showing how it can be implemented within existing access control mechanisms with minimal changes.

AB - In the context of cooperative systems, data coming from multiple, autonomous, heterogeneous information sources, is processed and fused into new pieces of information that can be further processed by other entities participating in the cooperation. Controlling the access to such evolving and variegated data, often under the authority of different entities, is challenging. In this work, we identify a set of access control requirements for multi-source cooperative systems and propose an attribute-based access control model where provenance information is used to specify access constraints that account for both the evolution of data objects and the process of data fusion. We demonstrate the feasibility of the proposed model by showing how it can be implemented within existing access control mechanisms with minimal changes.

KW - ABAC

KW - Data fusion

KW - Provenance

UR - http://www.scopus.com/inward/record.url?scp=85067202963&partnerID=8YFLogxK

U2 - 10.1145/3322431.3325100

DO - 10.1145/3322431.3325100

M3 - Conference contribution

SP - 185

EP - 194

BT - SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies

PB - Association for Computing Machinery, Inc

CY - New York

ER -

Bertolissi C, den Hartog J, Zannone N. Using provenance for secure data fusion in cooperative systems. In SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. New York: Association for Computing Machinery, Inc. 2019. p. 185-194. Available from, DOI: 10.1145/3322431.3325100