Abstract
With the increased need of data sharing among multiple organizations, such as government organizations, financial corporations, medical hospitals and academic institutions, it is critical to ensure that data is trustworthy so that effective decisions can be made based on these data. In this paper, we first discuss motivations and requirement for data trustworthiness. We then present an architectural framework for a comprehensive system for trustworthiness assurance. We then discuss an important issue in our framework, that is, the evaluation of data provenance and survey a trust model for estimating the confidence level of the data and the trust level of data providers. By taking into account confidence about data provenance, we introduce an approach for policy observing query evaluation. We highlight open research issues and research directions throughout the paper.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Dai, C., Lin, D., Bertino, E., Kantarcioglu, M.: An Approach to Evaluate Data Trustworthiness based on Data Provenance. In: Jonker, W., Petković, M. (eds.) SDM 2008. LNCS, vol. 5159, pp. 82–98. Springer, Heidelberg (2008)
Dai, C., Lin, D., Kantarcioglu, M., Bertino, E., Celikel, E., Thuraisingham, B.: Query Processing Techniques for Compliance with Data Confidence Policies. Technical Report, CERIAS (submitted for publication) (2009)
Biba, K.J.: Integrity Considerations for Secure Computer Systems. Technical Report TR-3153, Mitre (1977)
Clark, D.D., Wilson, D.R.: A Comparison of Commercial and Military Computer Security Policies. In: IEEE Symposium on Security and Privacy, Oakland, CA (1987)
Eckerson, W.: Data Warehousing Special Report: Data quality and the bottom line (2002), http://www.adtmag.com/article.aspx?id=6321
Juran, J.M.: Juran on Leadership for Quality – an Executive Handbook. Free Press, New York (1989)
Kahn, B., Strong, D., Wang, R.: Information Quality Benchmarks: Product and Service Performance. In: Communications of the ACM, vol. 45, pp. 184–192. ACM, New York (2002)
Price, R., Shanks, G.: A Semiotic Information Quality Framework. In: IFIPInternational Conference on Decision Support Systems: Decision Support in anUncertain and Complex World, Prato, Italy (2004)
Wand, Y., Wang, R.Y.: Anchoring Data Quality Dimensions in Ontological Foundations. In: Communications of the ACM, vol. 39, pp. 86–95. ACM, New York (1996)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Twelfth International World Wide Web Conference, pp. 640–651. ACM, New York (2003)
Dalvi, N.N., Suciu, D.: Efficient Query Evaluation on Probabilistic Databases. In: Thirtieth International Conference on Very Large Data Bases, pp. 864–875. Morgan Kaufmann, San Fransisco (2004)
Ferraiolo, D.F., Sandhu, R.S., Gavrila, S.I., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. In: ACM Transactions on Information and System Security, vol. 4, pp. 224–274. ACM, New York (2001)
Simmhan, Y.L., Plale, B., Gannon, D.: A Survey of Data Provenance Techniques. Technical Report, Indiana University, Bloomington (2007)
Buneman, P., Khanna, S., Tan, W.C.: Why and where: A characterization of data provenance. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol. 1973, pp. 316–330. Springer, Heidelberg (2000)
Lanter, D.P.: Design of a Lineage-Based Meta-Data Base for GIS. Cartography and Geographic Information Systems 18, 255–261 (1991)
Greenwood, M., Goble, C., Stevens, R., Zhao, J., Addis, M., Marvin, D., Moreau, L., Oinn, T.: Provenance of e-Science Experiments – Experiences from Bioinformatics. In: UK OST e-Science All Hands Meeting (2003)
Malin, J.L., Keating, N.L.: The Cost-Quality Trade-off: Need for Data Quality Standards for Studies that Impact Clinical Practice and Health Policy. Journal of Clinical Oncology 23, 4581–4584 (2005)
Ramakrishnan, R., Gehrke, J.: Database Management Systems. McGraw-Hill, New York (2000)
Levien, R.: Attack Resistant Trust Metrics. PhD thesis, University of California, Berkeley, CA, USA (2002)
Mella, G., Ferrari, E., Bertino, E., Koglin, Y.: Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems. In: ACM Transactions on Information and System Security, vol. 9, pp. 421–460. ACM, New York (2006)
Jackson, M.O.: Social and Economics Networks. Princeton University Press, Princeton (2008)
Batini, C., Scannapieco, M.: Data Quality: Concepts, Methodologies and Techniques. Springer, Heidelberg (2006)
Scannapieco, M., Figotin, I., Bertino, E., Elmagarmid, A.: Privacy Preserving Schema and Data Matching. In: ACM SIGMOD International Conference on Management of Data, pp. 653–664 (2007)
Inan, A., Kantarcioglu, M., Bertino, E., Scannapieco, M.: A Hybrid Approach to Private Record Linkage. In: 24th IEEE International Conference on Data Engineering, pp. 496—505 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bertino, E., Dai, C., Kantarcioglu, M. (2009). The Challenge of Assuring Data Trustworthiness. In: Zhou, X., Yokota, H., Deng, K., Liu, Q. (eds) Database Systems for Advanced Applications. DASFAA 2009. Lecture Notes in Computer Science, vol 5463. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00887-0_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-00887-0_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00886-3
Online ISBN: 978-3-642-00887-0
eBook Packages: Computer ScienceComputer Science (R0)