A Comprehensive Survey on the State-of-the-art Data Provenance Approaches for Security Enforcement

07/04/2021
by   Md Morshed Alam, et al.
0

Data provenance collects comprehensive information about the events and operations in a computer system at both application and system levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve system resilience by uncovering several malicious attack traces after a system compromise that are leveraged by the analyzer to understand the attack behavior and discover the level of damage. Existing literature demonstrates a number of research efforts on information capture, management, and analysis of data provenance. In recent years, provenance in IoT devices attracts several research efforts because of the proliferation of commodity IoT devices. In this survey paper, we present a comparative study of the state-of-the-art approaches to provenance by classifying them based on frameworks, deployed techniques, and subjects of interest. We also discuss the emergence and scope of data provenance in IoT networks. Finally, we present the urgency in several directions that data provenance needs to pursue, including data management and analysis.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/04/2021

Network Traffic Characteristics of IoT Devices in Smart Homes

Understanding network traffic characteristics of IoT devices plays a cri...
research
12/08/2018

IoT Lotto: Utilizing IoT Devices in Brute-Force Attacks

The number of IoT devices in use is increasing rapidly and so is the num...
research
03/14/2019

Machine Learning in IoT Security: Current Solutions and Future Challenges

The future Internet of Things (IoT) will have a deep economical, commerc...
research
11/22/2018

Digital Forensics for IoT and WSNs

In the last decade, wireless sensor networks (WSNs) and Internet-of-Thin...
research
07/09/2021

A Survey on RISC-V Security: Hardware and Architecture

The Internet of Things (IoT) is an ongoing technological revolution. Emb...
research
12/01/2021

Outlier Detection using AI: A Survey

An outlier is an event or observation that is defined as an unusual acti...
research
02/11/2021

A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions

In recent years, ransomware has been one of the most notorious malware t...

Please sign up or login with your details

Forgot password? Click here to reset