A Near Real-Time Big Data Provenance Generation Method Based on the Conjoint Analysis of Heterogeneous Logs
Data provenance is an effective approach for data security supervision. In the distributed, multi-user, and multi-layer big data system, only the provenance generation method, which leverages the information logged at both application and operating system level, has the capacity to completely obtain...
Main Authors: | Yuanzhao Gao, Xingyuan Chen, Binglong Li, Xuehui Du |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2023-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10198446/ |
Similar Items
-
IoT Big Data provenance scheme using blockchain on Hadoop ecosystem
by: Houshyar Honar Pajooh, et al.
Published: (2021-08-01) -
Using Introspection to Collect Provenance in R
by: Barbara Lerner, et al.
Published: (2018-03-01) -
Big Data Provenance Using Blockchain for Qualitative Analytics via Machine Learning
by: Kashif Mehboob Khan, et al.
Published: (2023-05-01) -
A Model To Capture Interaction Between Data Provenance And Workflow Provenance
by: Zeeshan Ahmed, et al.
Published: (2014-12-01) -
s2p: Provenance Research for Stream Processing System
by: Qian Ye, et al.
Published: (2021-06-01)