This software aims to incorporate both provenance and persistent identifiers to the data analytics processes in big data. A provenance system responsible for creating entities and recording processes will be developed. The entities will be made available via persistent identifiers, allowing the knowledge representation in both graphical and textual forms.




Definition of adequate standards for infrastructure requirements related to (at least) the following aspects: cloud and puppet-based infrastructure; secure and replicated database storage for high availability; auto-scaling and load balancing enabled architecture; provenance database requirements.

Definition of cyber security requirements related to (at least) the following aspects: secured framework for both applications and network; secure authentication using LDAP, two factor authentication or other identity management solution; ACLs (Access Control List).

Definition of requirements and standards for such a provenance system dealing with persistent identifiers related to (at least) the following aspects: usability in terms of data formats; different sources for data by using both push and pull technology; data acquiring API complying with W3C PROV standards; utility to convert non-standard data formats to be compliant with W3C PROV standards; generation of unique persistent identifiers for identifying the location of the data or physical objects (preferably DOI); definition of a monitoring routine to check the validity of the persistent identifiers; system must be subject to licencing conditions, so the user can restrict data sharing on both the whole provenience record or any physical object; displaying of the data on the secure web interface in different formats (e.g., use of SQL and NoSQL query languages); usage of elastic search functionality


  Release Notes:


. v 1.1.0 (Current release)
. Release Notes (coming soon)

  Features:


. Quick & Simple Configuration
. Live Sever/Application migration
. Application/Data Cloning
. Realtime Application and Database Backups
. Secure Network
. Dynamic Firewall Configuration
. Monitoring & Alerting
. Central Logging
. Application Code Management
. Dedicated Environment