{"id":"https://openalex.org/W3159748891","doi":"https://doi.org/10.3233/jcs-200108","title":"A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement","display_name":"A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement","publication_year":2021,"publication_date":"2021-04-27","ids":{"openalex":"https://openalex.org/W3159748891","doi":"https://doi.org/10.3233/jcs-200108","mag":"3159748891"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-200108","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-200108","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2107.01678","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Md Morshed Alam","orcid":null},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md Morshed Alam","raw_affiliation_strings":["Department of Software and Information Systems, University of North Carolina at Charlotte, NC, USA. E-mails:\u00a0,\u00a0"],"affiliations":[{"raw_affiliation_string":"Department of Software and Information Systems, University of North Carolina at Charlotte, NC, USA. E-mails:\u00a0,\u00a0","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"last","author":{"id":null,"display_name":"Weichao Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weichao Wang","raw_affiliation_strings":["Department of Software and Information Systems, University of North Carolina at Charlotte, NC, USA. E-mails:\u00a0,\u00a0"],"affiliations":[{"raw_affiliation_string":"Department of Software and Information Systems, University of North Carolina at Charlotte, NC, USA. E-mails:\u00a0,\u00a0","institution_ids":["https://openalex.org/I102149020"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I102149020"],"apc_list":null,"apc_paid":null,"fwci":4.0193,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.94755629,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"29","issue":"4","first_page":"423","last_page":"446"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.334199994802475,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.334199994802475,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.16519999504089355,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.10480000078678131,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.5246000289916992},{"id":"https://openalex.org/keywords/provenance","display_name":"Provenance","score":0.4415999948978424},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.42239999771118164},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.40310001373291016},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.3353999853134155},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.32519999146461487}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7749999761581421},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.538100004196167},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.5246000289916992},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4936000108718872},{"id":"https://openalex.org/C2780049196","wikidata":"https://www.wikidata.org/wiki/Q23582628","display_name":"Provenance","level":2,"score":0.4415999948978424},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.42239999771118164},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.40310001373291016},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3353999853134155},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.32519999146461487},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.3188000023365021},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.30720001459121704},{"id":"https://openalex.org/C1668388","wikidata":"https://www.wikidata.org/wiki/Q1149776","display_name":"Data management","level":2,"score":0.27619999647140503},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.272599995136261},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2583000063896179},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.25360000133514404},{"id":"https://openalex.org/C141441539","wikidata":"https://www.wikidata.org/wiki/Q1970908","display_name":"Boom","level":2,"score":0.25099998712539673}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3233/jcs-200108","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-200108","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2107.01678","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2107.01678","pdf_url":"https://arxiv.org/pdf/2107.01678","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2107.01678","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2107.01678","pdf_url":"https://arxiv.org/pdf/2107.01678","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W168132470","https://openalex.org/W1552694902","https://openalex.org/W1813893391","https://openalex.org/W1994326726","https://openalex.org/W2009232481","https://openalex.org/W2035168235","https://openalex.org/W2096347345","https://openalex.org/W2115309705","https://openalex.org/W2121239173","https://openalex.org/W2156479376","https://openalex.org/W2161337603","https://openalex.org/W2170967934","https://openalex.org/W2200241032","https://openalex.org/W2508433864","https://openalex.org/W2532844970","https://openalex.org/W2560810941","https://openalex.org/W2579106964","https://openalex.org/W2586755859","https://openalex.org/W2613352518","https://openalex.org/W2686848947","https://openalex.org/W2691976780","https://openalex.org/W2746119360","https://openalex.org/W2747394252","https://openalex.org/W2747669027","https://openalex.org/W2766945679","https://openalex.org/W2790316935","https://openalex.org/W2792078641","https://openalex.org/W2794756467","https://openalex.org/W2885157095","https://openalex.org/W2888349659","https://openalex.org/W2889727957","https://openalex.org/W2890559797","https://openalex.org/W2896143299","https://openalex.org/W2898207212","https://openalex.org/W2904005650","https://openalex.org/W2904434523","https://openalex.org/W2917849969","https://openalex.org/W2936934590","https://openalex.org/W2947175569","https://openalex.org/W2958272037","https://openalex.org/W2962567288","https://openalex.org/W2972103753","https://openalex.org/W2986164614","https://openalex.org/W2995131918","https://openalex.org/W3006977583","https://openalex.org/W3092077023","https://openalex.org/W3121476206","https://openalex.org/W3125379488","https://openalex.org/W3126410834","https://openalex.org/W4229702632","https://openalex.org/W4240073465"],"related_works":[],"abstract_inverted_index":{"Data":[0,40],"provenance":[1,41,93,123,145,159],"collects":[2],"comprehensive":[3],"information":[4,82],"about":[5],"the":[6,32,37,60,64,69,103,119,139,152],"events":[7],"and":[8,17,24,67,85,132,141,166],"operations":[9],"in":[10,94,146,154],"a":[11,22,53,76,115],"computer":[12],"system":[13,44,54],"at":[14],"both":[15],"application":[16],"kernel":[18],"levels.":[19],"It":[20],"provides":[21],"detailed":[23],"accurate":[25],"history":[26],"of":[27,71,78,87,102,105,118,134,143],"transactions":[28],"that":[29,56,157],"help":[30],"delineate":[31],"data":[33,88,144,158,164],"flow":[34],"scenario":[35],"across":[36],"whole":[38],"system.":[39],"helps":[42],"achieve":[43],"resilience":[45],"by":[46,59,124],"uncovering":[47],"several":[48,98,155],"malicious":[49],"attack":[50,65],"traces":[51],"after":[52],"compromise":[55],"are":[57],"leveraged":[58],"analyzer":[61],"to":[62,122,161],"understand":[63],"behavior":[66],"discover":[68],"level":[70],"damage.":[72],"Existing":[73],"literature":[74],"demonstrates":[75],"number":[77],"research":[79,99],"efforts":[80,100],"on":[81,128],"capture,":[83],"management,":[84],"analysis":[86],"provenance.":[89],"In":[90,109],"recent":[91],"years,":[92],"IoT":[95,107,147],"devices":[96],"attracts":[97],"because":[101],"proliferation":[104],"commodity":[106],"devices.":[108],"this":[110],"survey":[111],"paper,":[112],"we":[113,150],"present":[114,151],"comparative":[116],"study":[117],"state-of-the-art":[120],"approaches":[121],"classifying":[125],"them":[126],"based":[127],"frameworks,":[129],"deployed":[130],"techniques,":[131],"subjects":[133],"interest.":[135],"We":[136],"also":[137],"discuss":[138],"emergence":[140],"scope":[142],"network.":[148],"Finally,":[149],"urgency":[153],"directions":[156],"needs":[160],"pursue,":[162],"including":[163],"management":[165],"analysis.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2021-05-10T00:00:00"}
