首页> 外文期刊>ACM Transactions on Internet Technology >PROV 2R : Practical Provenance Analysis of Unstructured Processes
【24h】

PROV 2R : Practical Provenance Analysis of Unstructured Processes

机译:PROM 2R:非结构化过程的实际出种分析

获取原文
获取原文并翻译 | 示例
           

摘要

Information produced by Internet applications is inherently a result of processes that are executed locally. Think of a web server that makes use of a CGI script, or a content management system where a post was first edited using a word processor. Given the impact of these processes to the content published online, a consumer of that information may want to understand what those impacts were. For example, understanding from where text was copied and pasted to make a post, or if the CGI script was updated with the latest security patches, may all influence the confidence on the published content. Capturing and exposing this information provenance is thus important to ascertaining trust to online content. Furthermore, providers of internet applications may wish to have access to the same information for debugging or audit purposes. For processes following a rigid structure (such as databases or workflows), disclosed provenance systems have been developed that efficiently and accurately capture the provenance of the produced data. However, accurately capturing provenance from unstructured processes, for example, user-interactive computing used to produce web content, remains a problem to be tackled. In this article, we address the problem of capturing and exposing provenance from unstructured processes. Our approach, called PROV2R (PROVenance Record and Replay) is composed of two parts: (a) the decoupling of provenance analysis from its capture; and (b) the capture of high-fidelity provenance from unmodified programs. We use techniques originating in the security and reverse engineering communities, namely, record and replay and taint tracking. Taint tracking fundamentally addresses the data provenance problem but is impractical to apply at runtime due to extremely high overhead. With a number of case studies, we demonstrate that PROV2R enables the use of taint analysis for high-fidelity provenance capture, while keeping the runtime overhead at manageable levels. In addition, we show how captured information can be represented using the W3C PROV provenance model for exposure on the Web.
机译:由Internet应用程序生成的信息本质上是本地执行的过程的结果。想想使用CGI脚本的Web服务器,或者使用Word处理器首先编辑POST的内容管理系统。鉴于这些流程对在线发布的内容的影响,该信息的消费者可能希望了解这些影响是什么。例如,从文本复制并粘贴到发布的位置,或者如果使用最新的安全补丁更新了CGI脚本,可能会影响对已发布内容的信心。因此,捕获和暴露此信息出处因此对于对在线内容的信任来说是重要的。此外,Internet应用程序的提供者可能希望能够访问用于调试或审计目的的相同信息。对于刚性结构(例如数据库或工作流程)之后的过程,已经开发了所公开的来源系统,从而有效且准确地捕获所产生的数据的出处。然而,精确地捕获来自非结构化过程的出处,例如用于产生Web内容的用户交互式计算,仍然是要解决的问题。在本文中,我们解决了从非结构化过程中捕获和暴露出来的问题。我们的方法,称为PROP2R(出处记录和重播)由两部分组成:(a)从捕获中分析出种分析的解耦; (b)未修改的计划捕获高保真处理。我们使用源自安全性和逆向工程社区的技术,即记录和重播和污染跟踪。 Taint跟踪从根本上解决了数据出处问题,但由于极高的开销而在运行时应用是不切实际的。通过许多案例研究,我们证明了Prov2R能够利用污染分析来进行高保真处理捕获,同时在可管理的级别保持运行时开销。此外,我们展示了如何使用W3C PROP出处模型来表示捕获的信息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号