Abstract
Keeping track of lifecycle history and information origins are important because that is the only key issue to confirm information probative value and integrity. Provenance information management (Data Provenance) has recently been gained significant interest in computer security specifically in the domain of distributed environment. This is due partly to the increased in digital facts (complexity and size) and it widely spread usage in other fields of study, such as medicine, government, commerce, and science. Although its applications and use bring numerous benefit to scholars and practitioners, challenges still exist in its lifecycle history and information management. In this paper, we present a comprehensive survey of potentially influential components on provenance collection and its security, which enables us to investigate and summarize the current trends, methods and techniques addressing the aforementioned elements. This review provides more insight for researchers, system developers and engineers working on data, data mining and information security. More than 90 research publications on provenance collection and security have been examined, classified and listed for reference.
Disclosure statement
No potential conflict of interest was reported by the authors.
Additional information
Funding
Notes on contributors
![](/cms/asset/d6802128-eb8f-4f3f-b5df-509ce109b780/tjca_a_1501937_ilg0001.gif)
Wolali Ametepe
Wolali Ametepe received his Master of Information Technology (MIT) from OUM Malaysia, was a Senior Lecturer at Wisconsin International University Ghana Campus and working towards the Ph.D. degree in Computer Application Technology at Jiangsu University. He has also supervised and graduated more than 250 BS students. His research interests include social Engineering, CT project management, data provenance, IoT, cloud computing, information security, and Wireless sensor network. He is a member of IEICE.
![](/cms/asset/18e54d65-d6c4-45aa-be08-7dac51840a40/tjca_a_1501937_ilg0002.gif)
Changda Wang
Changda Wang was a Visiting Researcher with Carleton University and Purdue University. He is currently a Professor with the School of Computer Science and Communication Engineering, Jiangsu University. His recent research focuses on IoT security, network communication, and cloud computing. He is a member of CCF and serves in the Network and Data Communication Committee. He was a recipient of the Qinglan and Liuda Gaofeng Awards of Jiangsu Province.
![](/cms/asset/bcc9a66c-0851-4310-b084-1d3bdebf9606/tjca_a_1501937_ilg0003.gif)
Selasi Kwame Ocansey
Selasi Kwame Ocansey received his MSC in Information Technology at Sikkim Manipal University (India). He is currently a Ph.D. Candidate in computer applications at Jiangsu University (China) He has vast experiences teaching courses in Computer Networks, Computer Architectures, Programming and Graphics designing and he has also supervised and graduated more than 200 BS students in Africa. His research interests are in the fields of Cryptography, Cloud computing and Internet of things.
![](/cms/asset/00ef44da-1b75-453b-bee7-b39454f527a6/tjca_a_1501937_ilg0004.gif)
Xiaowei Li
Xiaowei Li received the M.S degree in Computer Science from Jiangsu University, China, in 2007.She is currently working towards the Ph.D degree in Computer Science in Jiangsu University. Her research interests include wireless network security and data security and privacy in cloud computing.
![](/cms/asset/d8348b13-8c56-4e35-b991-c43155751ee9/tjca_a_1501937_ilg0005.gif)
Fida Hussain
Fida Hussain received the B.E degree from D.U.E.T. Pakistan, in 2009 and the M.E. degree from Hamdard University Pakistan, in 2011. The Ph.D. degree from School Electrical and Information Engineering, Jiangsu University, China in 2018. His research interests include smart grids, power system automation machine learning and hydropower automation.