Scientific Workflow Security

The scientific workflow is an important paradigm for automating and accelerating data processing and sharing in the scientific community. The correctness of scientific discoveries relies on the trustworthiness and reliability of the data processed by scientific workflows and the underlying cyberinfrastructure. Unfortunately, modern scientific workflow systems lack robust infrastructure support for trustworthy execution of scientific workflows and for protecting the data processed by scientific workflows. A scientist or student may forge or alter datasets or computation simply to get papers accepted for publication. A malicious user may also publish forged workflow data on websites, misleading other scientists into investigating and publishing invalid results. This project aims to support a community of engineers and scientists to collaboratively and securely collect, analyze, and share data using scientific workflows.


Recent Publications

A Comparison Study of Intel SGX and AMD Memory Encryption Technology Saeid Mofrad, Fengwei Zhang, Shiyong Lu, and Weidong Shi, The Hardware and Architectural Support for Security and Privacy(HASP'18), in conjunction with The 45th International Symposium on Computer Architecture (ISCA'18), Los Angeles, California, June, 2018. [pdf]

DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis, Zhenyu Ning and Fengwei Zhang, The 48th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'18), Luxembourg, June, 2018. [pdf]

Previous Publications

Satisfiability Analysis of Workflows with Control-Flow Patterns and Authorization Constraints, by Ping Yang, Xing Xie, Indrakshi Ray, and Shiyong Lu, IEEE Transactions on Services Computing, 7(2), pages 237-251, April-June 2014. [pdf]

Trustworthy and Dynamic Mobile Task Scheduling in Data-Intensive Scientific Workflow Environments, by Zijiang Yang, Shiyong Lu, Ping Yang, and Andrey Kashlev, International Journal of Computers and Their Applications, 20(2), pages 1-- 13, June 2013.

Analysis of Scientific Workflow Provenance Access Control Policies, Ruiqi Luo, Ping Yang, Shiyong Lu, and Mikhail I. Gofman, The 9th IEEE International Conference on Services Computing (SCC), application and experience track, pages 266--273, © IEEE Press, 2012. [pdf]

Model Checking Approach to Secure Host Access Enforcement of Mobile Tasks in Scientific Workflows, by Zijiang Yang, Shiyong Lu, Ping Yang and Fahima Bhuyan, Special Issue on Scientific Workflows, Provenance and Their Applications of International Journal of Computers and Their Applications, 18(3), 148--159, 2011.

Secure Scientific Workflow Provenance Querying with Security Views, by Artem Chebotko, Shiyong Lu, Seunghan Chang, Farshad Fotouhi and Ping Yang, IEEE Transactions on Services Computing , 3(4), pages 322--337, 2010. [pdf]

Information Flow Analysis of Scientific Workflows, by Ping Yang, Shiyong Lu, Mikhail Gofman, and Zijiang Yang, Special issue on scientific workflows, Journal of Computer and System Sciences (JCSS) , volume 76(6), pages 390-402, © Elsevier, 2010.

Secure Scientific Workflow Provenance Querying with Security Views, by Artem Chebotko, Seunghan Chang, Shiyong Lu, Farshad Fotouhi and Ping Yang, 9th International Conference on Web-Age Information Management (WAIM), pages 349-356, © IEEE press, 2008. [pdf] (Acceptance rate: 25%)

Formal Modelling and Analysis of Scientific Workflows Using Hierarchical State Machines, by P. Yang, Z. Yang and S. Lu, to appear, 2nd International Workshop on Scientific Workflows and Business Workflow Standards in e-Science, held in conjuction with IEEE international conference on e-science and grid computing, © IEEE press, 2007. [abstract| bibtex| pdf]

NSF Binghamton