Scientific Workflow and Provenance Security

Recently, scientific workflow has emerged as an important platform for automating and accelerating data processing and data sharing in the scientific community. Provenance of a scientific workflow captures the derivation history of a data product, including the sources, intermediate data products, and the steps that were applied to produce the data product. Provenance is essential for scientific workflows to support reproducibility of scientific discovery, result interpretation, and problem diagnosis. Due to the highly competitive nature of scientific research, it is important to ensure that sensitive provenance information can be accessed by and propagated to only authorized parties before the scientific results are ready for public release. The goal of this project is to secure information propagation in scientific workflows and control the access to scientific workflow provenance.



Satisfiability Analysis of Workflows with Control-Flow Patterns and Authorization Constraints, by Ping Yang, Xing Xie, Indrakshi Ray, and Shiyong Lu, IEEE Transactions on Services Computing, 7(2), pages 237-251, April-June 2014. [pdf]

Trustworthy and Dynamic Mobile Task Scheduling in Data-Intensive Scientific Workflow Environments, by Zijiang Yang, Shiyong Lu, Ping Yang, and Andrey Kashlev, International Journal of Computers and Their Applications, 20(2), pages 1-- 13, June 2013.

Analysis of Scientific Workflow Provenance Access Control Policies, Ruiqi Luo, Ping Yang, Shiyong Lu, and Mikhail I. Gofman, The 9th IEEE International Conference on Services Computing (SCC), application and experience track, pages 266--273, © IEEE Press, 2012. [pdf]

Model Checking Approach to Secure Host Access Enforcement of Mobile Tasks in Scientific Workflows, by Zijiang Yang, Shiyong Lu, Ping Yang and Fahima Bhuyan, Special Issue on Scientific Workflows, Provenance and Their Applications of International Journal of Computers and Their Applications, 18(3), 148--159, 2011.

Secure Scientific Workflow Provenance Querying with Security Views, by Artem Chebotko, Shiyong Lu, Seunghan Chang, Farshad Fotouhi and Ping Yang, IEEE Transactions on Services Computing , 3(4), pages 322--337, 2010. [pdf]

Information Flow Analysis of Scientific Workflows, by Ping Yang, Shiyong Lu, Mikhail Gofman, and Zijiang Yang, Special issue on scientific workflows, Journal of Computer and System Sciences (JCSS) , volume 76(6), pages 390-402, © Elsevier, 2010.

Secure Scientific Workflow Provenance Querying with Security Views, by Artem Chebotko, Seunghan Chang, Shiyong Lu, Farshad Fotouhi and Ping Yang, 9th International Conference on Web-Age Information Management (WAIM), pages 349-356, © IEEE press, 2008. [pdf] (Acceptance rate: 25%)

Formal Modelling and Analysis of Scientific Workflows Using Hierarchical State Machines, by P. Yang, Z. Yang and S. Lu, to appear, 2nd International Workshop on Scientific Workflows and Business Workflow Standards in e-Science, held in conjuction with IEEE international conference on e-science and grid computing, © IEEE press, 2007. [abstract| bibtex| pdf]