Sciweavers

BCS
2008

Provenance-Based Auditing of Private Data Use

14 years 2 months ago
Provenance-Based Auditing of Private Data Use
Across the world, organizations are required to comply with regulatory frameworks dictating how to manage personal information. Despite these, several cases of data leaks and exposition of private data to unauthorized recipients have been publicly and widely advertised. For authorities and system administrators to check compliance to regulations, auditing of private data processing becomes crucial in IT systems. Finding the origin of some data, determining how some data is being used, checking that the processing of some data is compatible with the purpose for which the data was captured are typical functionality that an auditing capability should support, but difficult to implement in a reusable manner. Such questions are so-called provenance questions, where provenance is defined as the process that led to some data being produced. The aim of this paper is to articulate how data provenance can be used as the underpinning approach of an auditing capability in IT systems. We present a...
Rocío Aldeco-Pérez, Luc Moreau
Added 29 Oct 2010
Updated 29 Oct 2010
Type Conference
Year 2008
Where BCS
Authors Rocío Aldeco-Pérez, Luc Moreau
Comments (0)