Classifying Usage Control and Data ProvenanceArchitectures

2021 
Given the ubiquity of data acquisition and processing in our everyday life,protecting data sovereignty in distributed systems is a significant topic ofresearch. Usage control and provenance tracking systems are very promisingsteps towards a technical solution for the problem of data sovereignty. However,due to their complexity and diversity these systems are still not fully understood.In this work we investigate the functionality of usage control and provenancetracking systems. We classify them into three different categories based on theirsecurity goals and properties. Furthermore we identify generic use cases forthese systems that help to understand what attack vectors system operators haveto be mindful of.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []