PROV2R: Practical provenance analysis of unstructured processes

Manolis Stamatogiannakis*, Elias Athanasopoulos, Herbert Bos, Paul Groth

*Corresponding author for this work

Research output: Contribution to JournalArticleAcademicpeer-review

Abstract

Information produced by Internet applications is inherently a result of processes that are executed locally. Think of a web server that makes use of a CGI script, or a content management system where a post was first edited using a word processor. Given the impact of these processes to the content published online, a consumer of that information may want to understand what those impacts were. For example, understanding from where text was copied and pasted to make a post, or if the CGI script was updated with the latest security patches, may all influence the confidence on the published content. Capturing and exposing this information provenance is thus important to ascertaining trust to online content. Furthermore, providers of internet applications may wish to have access to the same information for debugging or audit purposes. For processes following a rigid structure (such as databases or workflows), disclosed provenance systems have been developed that efficiently and accurately capture the provenance of the produced data. However, accurately capturing provenance from unstructured processes, for example, user-interactive computing used to produce web content, remains a problem to be tackled. In this article,we address the problem of capturing and exposing provenance from unstructured processes. Our approach, called PROV2R (PROVenance Record and Replay) is composed of two parts: (a) the decoupling of provenance analysis from its capture; and (b) the capture of high-fidelity provenance from unmodified programs. We use techniques originating in the security and reverse engineering communities, namely, record and replay and taint tracking. Taint tracking fundamentally addresses the data provenance problem but is impractical to apply at runtime due to extremely high overhead. With a number of case studies, we demonstrate that PROV2R enables the use of taint analysis for high-fidelity provenance capture, while keeping the runtime overhead at manageable levels. In addition, we show how captured information can be represented using the W3C PROV provenance model for exposure on the Web.

Original languageEnglish
Article number37
JournalACM Transactions on Internet Technology
Volume17
Issue number4
DOIs
Publication statusPublished - 1 Aug 2017

Keywords

  • Data provenance
  • introspection
  • PANDA
  • taint analysis
  • W3C PROV

Fingerprint Dive into the research topics of 'PROV<sub>2</sub>R: Practical provenance analysis of unstructured processes'. Together they form a unique fingerprint.

Cite this