Visible to the public Securing Scientific WorkflowsConflict Detection Enabled

TitleSecuring Scientific Workflows
Publication TypeConference Proceedings
Year of Publication2015
AuthorsDonghoon Kim, Mladen A. Vouk
Conference NameIEEE International Conference on Software Quality, Reliability and Security (QRS) - Companion (QRS-C)
Pagination95-104
Date PublishedAugust 2-5, 2015
PublisherIEEE
Conference LocationVancouver, Canada
KeywordsResilience Requirements, Design, and Testing
Abstract

This paper investigates security of Kepler scientific workflow engine. We are especially interested in Kepler-based scientific workflows that may operate in cloud environments. We find that (1) three security properties (i.e., input validation, remote access validation, and data integrity) are essential for making Kepler-based workflows more secure, and (2) that use of the Kepler provenance module may help secure Kepler based workflows. We implemented a prototype security enhanced Kepler engine to demonstrate viability of use of the Kepler provenance module in provision and management of the desired security properties.

Notes

v4

DOI, DOI: 10.1109/QRS-C.2015.25
Citation Keynode-24177