The University of Southampton

EU Provenance: Enabling and Supporting Provenance in Grids for Complex Problems

Logo
Date:
2004-2006
Themes:
Trust and Provenance, Grid and Distributed Computing
Funding:
EU

The concept of Provenance is already well understood in the study of fine art where it refers to the trusted, documented history of some work of art. Given that documented history, the object attains an authority that allows scholars to understand and appreciate its importance and context relative to other works of art. Objects that do not have a trusted, proven history may be treated with some scepticism by those that study and view them. This same concept of Provenance may also be applied to data and information generated within a computer system; particularly when the information is subject to regulatory control over an extended period of time.

Today's grid architectures suffer from limitations, such as lack of mechanisms to trace results and infrastructures to build up trusted networks. Provenance enables users to trace how a particular result has been arrived at by identifying the individual and aggregated services that produced a particular output. The overarching aim of the Provenance project is to design, conceive and implement an industrial-strength open provenance architecture for grid systems, and to deploy and evaluate it in complex grid applications, namely aerospace engineering and organ transplant management. This support includes a scalable and secure architecture, an open proposal for standardising the protocols and data structures, a set of tools for configuring and using the provenance architecture, an open source reference implementation, and a deployment and validation in industrial context.

The impact of this project is to provide mechanisms that allow information generated and managed within a grid infrastructure to be proven and trusted. By this we mean that the information's history, including the processes that created and modified it, are documented in a way that can be inspected, validated and reasoned about by authorised users that need to ensure information controls have not been altered, abused or tampered with.

Primary investigator

Secondary investigators

  • fx
  • lc
  • vhkt
  • sj

Partners

  • IBM Hursley
  • Cardiff University
  • UPC, Barcelona
  • DLR, Germany
  • SZTAKi, Budapest

Associated research group

  • Intelligence, Agents, Multimedia Group
Share this project FacebookTwitterWeibo