Data provenance analysis has been used as an assistive measure for ensuring system integrity. However, such techniques are typically reactive approaches to identify the root cause of an attack in its aftermath. This is in part due to fact that the collection of provenance metadata often results in a deluge of information that cannot easily be queried and analyzed in real time. This paper presents an approach for proactively reasoning about provenance metadata within the Automatic Cryptographic Data Centric (ACDC) security architecture, a new security infrastructure in which all data interactions are considered at a coarse granularity, similar to the Function as a Service model. At this scale, we have found that data interactions are manageable for the proactive specification and evaluation of provenance policies -- constraints placed on provenance metadata to prevent the consumption of untrusted data. This paper provides a model for proactively evaluating provenance metadata in the ACDC paradigm as well as a case study of an electronic voting scheme to demonstrate the applicability of ACDC and the provenance policies needed to ensure data integrity.
翻译:数据出处分析是用来确保系统完整性的辅助措施,然而,这类技术通常是用于确定攻击发生后袭击根源的被动反应方法,部分原因是收集出处元数据往往造成大量信息,无法轻易实时查询和分析。本文介绍了在自动加密数据中心安全架构内主动推理出处元数据的方法,这是一种新的安全基础设施,所有数据互动都以粗糙的颗粒方式考虑,类似于功能作为服务模式。在这个规模上,我们发现数据互动可以用于预先说明和评价出处政策 -- -- 对出处元数据加以限制,以防止不可靠数据的消耗。本文提供了一个模式,用以主动评价自动加密数据中心模式中的出处元数据,并研究电子投票计划,以显示ACDC的适用性,以及确保数据完整性所需的证明政策。