What is it about?

Since building a completely secure system is impossible, a security-critical system needs to be resilient against cyberattacks, and data provenance can help achieve that. Data provenance provides us with a comprehensive history of data and processes across a system. We can leverage this history to verify data ownership and track the process activities and the changes made in data. We can also employ this history in reconstructing an attack scenario to understand the attack behavior better. In this paper, we survey the state-of-the-art provenance approaches that exist in the literature and present a comprehensive comparative discussion of those approaches. But before that, we provide a conceptual overview of a provenance system architecture. We also discuss how we can deploy provenance systems in an IoT environment to ensure policy compliance, detect attack chains in trigger-action platforms, and maintain data integrity. Since commodity and health IoT devices continuously collect user-sensitive data, we need to verify whether the devices comply with the defined policies and whether there are vulnerabilities in trigger-action platforms that attackers can exploit to attack the network and steal user data. In addition, we also present a brief discussion on how to secure a provenance system itself so that attackers cannot alter the components of the provenance system before attempting the ultimate attack. Finally, we recommend some probable research topics that may enrich the existing literature.

Featured Image

Why is it important?

We present a comprehensive overview of the recent provenance approaches, including those which support on-the-fly provenance reduction and runtime provenance analysis. We also provide a comparative discussion on the state-of-the-art provenance systems used in the IoT domain and briefly discuss the security of provenance systems themselves. Thus, this survey paper gives a complete overview of the existing provenance approaches and demonstrates how these approaches can be securely employed to ensure the security and privacy of IoT and other distributed platforms. Furthermore, our suggestion of future research directions will help the provenance community advance the literature to a certain extent.

Perspectives

We decide to survey the state-of-the-art provenance approaches to enable the provenance community to delineate the recent advancements made in this domain and anticipate future research directions. We also envision the extensive deployment of provenance systems to ensure security and privacy in IoT, Cyber-physical Systems, and other distributed networks. That's why we also make an urge for the provenance systems in IoT.

Md Morshed Alam
University of North Carolina at Charlotte

Read the Original

This page is a summary of: A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement, Journal of Computer Security, June 2021, IOS Press,
DOI: 10.3233/jcs-200108.
You can read the full text:

Read

Resources

Contributors

The following have contributed to this page