A Comprehensive Survey on the State-of-the-art Data Provenance Approaches for Security Enforcement

by   Md Morshed Alam, et al.

Data provenance collects comprehensive information about the events and operations in a computer system at both application and system levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve system resilience by uncovering several malicious attack traces after a system compromise that are leveraged by the analyzer to understand the attack behavior and discover the level of damage. Existing literature demonstrates a number of research efforts on information capture, management, and analysis of data provenance. In recent years, provenance in IoT devices attracts several research efforts because of the proliferation of commodity IoT devices. In this survey paper, we present a comparative study of the state-of-the-art approaches to provenance by classifying them based on frameworks, deployed techniques, and subjects of interest. We also discuss the emergence and scope of data provenance in IoT networks. Finally, we present the urgency in several directions that data provenance needs to pursue, including data management and analysis.


page 1

page 2

page 3

page 4


Network Traffic Characteristics of IoT Devices in Smart Homes

Understanding network traffic characteristics of IoT devices plays a cri...

Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions

In recent years, the Internet of Things (IoT) technology has led to the ...

Machine Learning in IoT Security: Current Solutions and Future Challenges

The future Internet of Things (IoT) will have a deep economical, commerc...

Digital Forensics for IoT and WSNs

In the last decade, wireless sensor networks (WSNs) and Internet-of-Thin...

A Survey on RISC-V Security: Hardware and Architecture

The Internet of Things (IoT) is an ongoing technological revolution. Emb...

A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions

In recent years, ransomware has been one of the most notorious malware t...

Outlier Detection using AI: A Survey

An outlier is an event or observation that is defined as an unusual acti...