Document provenance in the cloud: Constraints and challenges

Mohamed Amin Sakka, Bruno Defude, Jorge Tellez

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The amounts of digital information are growing in size and complexity. With the emergence of distributed services over internet and the booming of electronic exchanges, the need to identify information origins and its lifecycle history becomes essential. Essential because it's the only factor ensuring information integrity and probative value. That's why in different areas like government, commerce, medicine and science, tracking data origins is essential and can serve for informational, quality, forensics, regulatory compliance, rights protection and intellectual property purposes. Managing information provenance is a complex task and it has been extensively treated in databases, file system and scientific workflows. However, provenance in the cloud is a more challenging task due to specific problems related to the cloud added to the traditional ones.

Original languageEnglish
Title of host publicationNetworked Services and Applications - Engineering, Control and Management - 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Proceedings
Pages107-117
Number of pages11
DOIs
Publication statusPublished - 16 Aug 2010
Externally publishedYes
Event16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management, EUNICE 2010 - Trondheim, Norway
Duration: 28 Jun 201030 Jun 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6164 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management, EUNICE 2010
Country/TerritoryNorway
CityTrondheim
Period28/06/1030/06/10

Fingerprint

Dive into the research topics of 'Document provenance in the cloud: Constraints and challenges'. Together they form a unique fingerprint.

Cite this