Abstract
We present a canonical form for prov that is a normalized way of representing prov documents as mathematical expressions. As opposed to the normal form specified by the prov-constraints recommendation, the canonical form we present is defined for all prov documents, irrespective of their validity, and it can be serialized in a unique way. The article makes the case for a canonical form for prov and its potential uses, namely comparison of prov documents in different formats, validation, and signature of prov documents. A signature of a prov document allows the integrity and the author of provenance to be ascertained; since the signature is based on the canonical form, these checks are not tied to a particular encoding, but can be performed on any representation of prov.
Supplemental Material
Available for Download
Supplemental movie, appendix, image and software files for, A Canonical Form for PROV Documents and Its Application to Equality, Signature, and Validation
- Rocio Aldeco-Pŕez and Luc Moreau. 2010. Securing provenance-based audits. In Proceedings of the International Provenance and Annotation Workshop (IPAW’10) (Lecture Notes in Computer Science), Vol. 6378. 148--164.Google Scholar
Cross Ref
- David Beckett, Tim Berners-Lee, Eric Prud’hommeaux, and Gavin Carothers. 2014. Terse RDF Triple Language. W3C Working Group Recommendation REC-turtle-20140225. World Wide Web Consortium. Retrieved from https://www.w3.org/TR/2014/REC-turtle-20140225/.Google Scholar
- John Boyer and Glenn Marcy. 2008. Canonical XML Version 1.1. W3C Recommendation May 2008. World Wide Web Consortium. Retrieved from http://www.w3.org/TR/2008/REC-xml-c14n11-20080502/.Google Scholar
- Dan Brickley and R. V. Guha. 2014. RDF Vocabulary Description Language 1.0: RDF Schema. W3C Recommendation. World Wide Web Consortium. Retrieved from http://www.w3.org/TR/rdf-schema/.Google Scholar
- Jeremy J. Carroll. 2002. Matching RDF graphs. In Proceedings of the 1st International Semantic Web Conference (ISWC’02). Springer, Berlin, 5--15. Google Scholar
Digital Library
- Jeremy J. Carroll. 2003. Signing RDF graphs. In Second International Semantic Web Conference (ISWC’03), Sanibel Island, FL, October 20--23, 2003. Springer Berlin, 369--384. Google Scholar
Digital Library
- James Cheney. 2013. Semantics of the PROV Data Model. W3C Working Group Note NOTE-prov-sem-20130430. World Wide Web Consortium. Retrieved from http://www.w3.org/TR/2013/NOTE-prov-sem-20130430/.Google Scholar
- James Cheney, Laura Chiticarius, and Wang-Chiew Tan. 2009. Provenance in databases: Why, how, and where. Foundations and Trends in Databases 1, 4 (2009), 379--474. Google Scholar
Digital Library
- James Cheney, Paolo Missier, Luc Moreau (Eds.), and Tom De Nies. 2013. Constraints of the PROV Data Model. W3C Recommendation. World Wide Web Consortium. http://www.w3.org/TR/2013/REC-prov-constraints-20130430/Google Scholar
- D. Eastlake and P. Jones. 2001. US Secure Hash Algorithm 1 (SHA1). Technical Report. Internet Engineering Task Force. Google Scholar
Digital Library
- D. Eastlake, J. Reagle, D. Solo, F. Hirsch, and T. Roessler. 2008. XML-Signature Syntax and Processing (2nd ed.). W3C Recommendation. World Wide Web Consortium. Retrieved from http://www.w3.org/TR/xmldsig-core.Google Scholar
- L. M. R. Gadelha, Jr. and M. Mattoso. 2008. Kairos: An architecture for securing authorship and temporal information of provenance data in grid-enabled workflow management systems. In IEEE Fourth International Conference on eScience (eScience’08). 597--602. Google Scholar
Digital Library
- Paul Groth and Luc Moreau (Eds.). 2013. PROV-Overview. An Overview of the PROV Family of Documents. Technical Report. World Wide Web Consortium. Retrieved from http://www.w3.org/TR/2013/NOTE-prov-overview-20130430/.Google Scholar
- Ragib Hasan, Radu Sion, and Marianne Winslett. 2009. The case of the fake Picasso: Preventing history forgery with secure provenance. In Proceedings of the 7th Conference on File and Storage Technologies (FAST’09). 1--14. Google Scholar
Digital Library
- Patrick J. Hayes and Peter F. Patel-Schneider. 2014. RDF 1.1 Semantics. W3C Recommendation February 2014. World Wide Web Consortium. Retrieved from https://www.w3.org/TR/2014/REC-rdf11-mt-20140225/.Google Scholar
- Hook Hua, Curt Tilmes, Stephan Zednik (Eds.), and Luc Moreau. 2013. PROV-XML: The PROV XML Schema. W3C Working Group Note NOTE-prov-xml-20130430. World Wide Web Consortium. Retrieved from http://www.w3.org/TR/2013/NOTE-prov-xml-20130430/.Google Scholar
- Trung Dong Huynh, Michael O. Jewell, Amir Sezavar Keshavarz, Danius T. Michaelides, Huanjia Yang, and Luc Moreau. 2013. The PROV-JSON Serialization. Member Submission. World Wide Web Consortium. Retrieved from http://www.w3.org/Submission/prov-json/.Google Scholar
- Trung Dong Huynh and Luc Moreau. 2014. ProvStore: A public provenance repository. In 5th International Provenance and Annotation Workshop (IPAW’14) (Lecture Notes in Computer Science). Springer Berlin, Germany, 275--277.Google Scholar
- Natalia Kwasnikowska, Luc Moreau, and Jan Van den Bussche. 2015. A formal account of the open provenance model. ACM Trans Web 9, 2 (February 2015), 44. Google Scholar
Digital Library
- Timothy Lebo, Satya Sahoo, Deborah McGuinness (Eds.), Khalid Behajjame, James Cheney, David Corsar, Daniel Garijo, Stian Soiland-Reyes, Stephan Zednik, and Jun Zhao. 2013. PROV-O: The PROV Ontology. W3C Recommendation. World Wide Web Consortium. Retrieved from http://www.w3.org/TR/2013/REC-prov-o-20130430/.Google Scholar
- Dave Longley and Manu Sporny. 2016. RDF Dataset Normalization. Technical Report. World Wide Web Consortium. Retrieved from http://json-ld.github.io/normalization/spec/.Google Scholar
- Brendan D. McKay and Adolfo Piperno. 2014. Practical graph isomorphism, II. Journal of Symbolic Computation 60 (2014), 94--112. Google Scholar
Digital Library
- Luc Moreau. 2016. Directed Qualified Pattern, Influence, Non-Influence Relations, Optional Attributes. PROV: Three Years Later Workshop. Retrieved from http://provenanceweek.org/2016/p3yl/papers/paper_87.pdf.Google Scholar
- Luc Moreau, Ben Clifford, Juliana Freire, Joe Futrelle, Yolanda Gil, Paul Groth, Natalia Kwasnikowska, Simon Miles, Paolo Missier, Jim Myers, Beth Plale, Yogesh Simmhan, Eric Stephan, and Jan Van den Bussche. 2011. The open provenance model core specification (v1.1). Future Generation Computer Systems 27, 6 (June2011), 743--756. Google Scholar
Digital Library
- Luc Moreau, Trung Dong Huynh, and Danius Michaelides. 2014. An online validator for provenance: Algorithmic design, testing, and API. In 17th International Conference on Fundamental Approaches to Software Engineering (FASE’14) (Lecture Notes in Computer Science), Vol. 8411. Springer-Verlag, 291--305. Google Scholar
Digital Library
- Luc Moreau and Bertram Ludaescher. 2008. The first provenance challenge. Concurrency and Computation: Practice and Experience 20, 5 (April 2008), 409--418. Google Scholar
Digital Library
- Luc Moreau and Paolo Missier (Eds.). 2013. PROV-DM: The PROV Data Model. W3C Recommendation. World Wide Web Consortium. Retrieved from http://www.w3.org/TR/2013/REC-prov-dm-20130430/.Google Scholar
- Luc Moreau, Paolo Missier (Eds.), James Cheney, and Stian Soiland-Reyes. 2013. PROV-N: The Provenance Notation. W3C Recommendation. World Wide Web Consortium. Retrieved from http://www.w3.org/TR/2013/REC-prov-n-20130430/.Google Scholar
- Martin Odersky, Lex Spoon, and Bill Venners. 2010. Programming in Scala. Artima.Google Scholar
- ProvRDF 2013. ProvRDF. (May2013). https://www.w3.org/2011/prov/wiki/ProvRDF.Google Scholar
- Sarvapali Ramchurn, Edwin Simpson, Joel Fischer, Trung Huynh, Y. Ikuno, Steven Reece, Wenchao Jiang, Feng Wu, Jack Flann, S. J. Roberts, Luc Moreau, T. Rodden, and N. R. Jennings. 2015. HAC-ER: A disaster response system based on human-agent collectives. In 14th International Conference on Autonomous Agents and Multi-Agent Systems. Istambul, Turkey, 533--541. http://eprints.soton.ac.uk/374070/ Google Scholar
Digital Library
- Ronald C. Read and Derek G. Corneil. 1977. The graph isomorphism disease. Journal of Graph Theory 1, 4 (1977), 339--363.Google Scholar
Cross Ref
- Joseph Reagle. 2008. XML-Signature Requirements. W3C Working Draft Oct. 1999. World Wide Web Consortium. https://www.w3.org/TR/xmldsig-requirements.Google Scholar
- Oshani Seneviratne and Ken Beckett. 2016. PROV: Three Years Later Workshop. Retrieved from http://provenanceweek.org/ 2016/p3yl/papers/paper_81.pdf.Google Scholar
- Manu Sporny. 2015. Secure Messaging 1.0. Technical Report. W3C Web Payments Community Group.Google Scholar
- Henk C. A. van Tilborg (Ed.). 2005. Encyclopedia of Cryptography and Security. Springer, New York. Google Scholar
Digital Library
- X. Wang, K. Zeng, K. Govindan, and P. Mohapatra. 2012. Chaining for securing data provenance in distributed information networks. In IEEE Military Communications Conference (MILCOM’12). 1--6.Google Scholar
Index Terms
A Canonical Form for PROV Documents and Its Application to Equality, Signature, and Validation
Recommendations
Provably Secure Convertible Nominative Signature Scheme
Information Security and CryptologyNominative signature, introduced by Kim, Park and Won, is a useful cryptographic primitive to limit the publicly verifiable property of ordinary digital signature. In a nominative signature scheme, a nominator and a nominee jointly generate a signature ...
A Secure Anonymous Proxy Multi-signature Scheme
ICETE 2014: Proceedings of the 11th International Joint Conference on e-Business and Telecommunications - Volume 4A proxy signature scheme enables a signer to delegate its signing rights to any other user, called the proxy signer, to produce a signature on its behalf. In a proxy multi-signature scheme, the proxy signer can produce one single signature on behalf of ...
Proxy-protected signature secure against the undelegated proxy signature attack
The proxy signature scheme enables an original signer to delegate his/her signing capability to a designated proxy signer, thereby the proxy signer can sign messages on behalf of the original signer. Recently, Zhou et al. proposed two proxy-protected ...






Comments