2017 IEEE 10th International Conference on Cloud Computing (CLOUD) 2017
DOI: 10.1109/cloud.2017.91
|View full text |Cite
|
Sign up to set email alerts
|

Provenance in Context of Hadoop as a Service (HaaS) - State of the Art and Research Directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…technology solutions therefore also tend to span all stages. This is particularly true for provenance solutions that target machine-learning systems [91].…”
Section: Auditability In the Data-centric Stagesmentioning
confidence: 99%
See 1 more Smart Citation
“…technology solutions therefore also tend to span all stages. This is particularly true for provenance solutions that target machine-learning systems [91].…”
Section: Auditability In the Data-centric Stagesmentioning
confidence: 99%
“…A recent "roadmap" for the role of provenance in Spark-based scientific workflows is available from Guedes et al [89]. Still in the context of map-reduce based systems, [91] presents state of the art and research directions for provenance in the context of "Hadoop as a Service".…”
Section: Auditability In the Model-centric Stagesmentioning
confidence: 99%
“…Much of the literature around auditability relates to data provenance research in database and cloud concepts [44] and model provenance approaches [39]. It involves proposals on how to store provenance data [18,20,21,74,94], summarisation of provenance data [2,28,66], specific query language for the provenance data [28], query explainability [8,10], Natural language processing for provenance data [27,90] and cryptographic solutions to verify model's behaviours without exposing user privacy [72] or revealing model's intellectual properties [87].…”
Section: Auditability Technologiesmentioning
confidence: 99%
“…Where there is confidential information, there lies the threat as well. Analogous to this, several digital security threats have evolved drastically in the past years [11], [12], [13].…”
Section: Introductionmentioning
confidence: 99%