Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1988688.1988700acmotherconferencesArticle/Chapter ViewAbstractPublication PageswimsConference Proceedingsconference-collections
research-article

A semantic privacy-preserving model for data sharing and integration

Published: 25 May 2011 Publication History

Abstract

In this paper, we encompass and extend previous ontology-based data integration system. A semantic privacy-preserving model provides authorized view-based query answering over a widespread multiple servers for data sharing and integration. The combined semantics-enabled privacy protection policies are used to empower the data integration and access control services at the virtual platform (VP). The ontology mapping and merging algorithm with a local-as-view (LAV) source description that creates a global ontology schema at the VP by integrating multiple local ontology schemas for data sharing. The perfect rules integration of datalog rules enforces the data query and protection services. Semantics-enable policies are combined together at the VP, but the access control criteria specified in each server are still satisfied. Therefore the soundness and completeness of data sharing and protection criteria are ensured to support the validity of policy combination. This guarantees the trustworthiness of data sharing and protection services in multiple servers.

References

[1]
A. H. Anderson. A comparison of two privacy policy languages: EPAL and XACML. In Proceedings of the 3rd ACM Workshop on Secure Web Services (SWS'06), pages 53--60. ACM, 2006.
[2]
I. A. Antón et al. A roadmap for comprehensive online for privacy policy management. Comm. of the ACM, 50(7):109--116, July 2007.
[3]
A. P. Bernstein and L. M. Haas. Information integration in the enterprise. Comm. of the ACM, 51(8):72--79, July 2008.
[4]
A. P. Bonatti et al. An algebra for composing access control policies. ACM Trans. on Information and Systems Security, 5(1):1--35, February 2002.
[5]
P. Bonatti and D. Olmedilla. Policy language specification, enforcement, and integration. project deliverable D2, working group I2. Technical report, REWERSE, 2005.
[6]
J. d. Bruijn. RIF RDF and OWL compatibility. Technical report, W3C, Oct. 2009.
[7]
D. Calvanese et al. Description logic framework for information integration. In Proc. of the 6th Int. Conf. on Principles of Knowledge Representation and Reasoning, pages 2--13. Morgan Kaufmann, 1998.
[8]
D. Calvanese et al. Data integration through DL -- LiteA ontologies. In 3rd Int. Workshop on Semantics in Data and Knowledge Base (SDKB), volume 4925, pages 26--47. Springer, 2008.
[9]
D. Calvanese et al. View-based query answering over description logic ontologies. In Proc. of KR-2008. AAAI Press, 2008.
[10]
D. Calvanese and G. D. Giacomo. Data integration: A logic-based perspective. AI Magazine, 26(1):59--70, 2005.
[11]
D. Calvanses et al. Description logics for information integration. In Computational Logic, LNAI 2408, pages 41--60. Springer, 2002.
[12]
C. Clifton et al. Privacy-preserving data integration and sharing. In Data Mining and Knowledge Discovery, pages 19--26. ACM, 2004.
[13]
J. Euzenat and P. Shvaiko. Ontology Matching. Springer-Verlag, 2007.
[14]
M. Friedman et al. Navigational plans for data integration. In Proc. of the Sixteen National Conference on Artificial Intelligence (AAAI'99), pages 67--73. AAAI/MIT Press, 1999.
[15]
F. Goasdoué and M.-C. Rousset. Answering queries using views: a KRDB perspective for the semantic web. ACM Trans. on Internet Technology, 4(3):255--288, August 2004.
[16]
C. B. Grau et al. Modular reuse of ontologies: Theory and practice. Journal of Artificial Intelligence Research, pages 273--318, 2008.
[17]
C. B. Grau et al. OWL2: The next step for OWL. Web Semantics: Science, Services and Agents on the World Wide Web 3, pages 309--322, 2008.
[18]
A. Halevy, A. Rajaraman, and J. Ordille. Data integration: The teenage years. In VLDB'06, pages 9--16. ACM, 2006.
[19]
Y. A. Halevy. Answering queries using views: A survey. The VLDB Journal, 10(4):270--294, 2001.
[20]
I. Horrocks et al. OWL rules: A proposal and prototype implementation. Web Semantics: Science, Services and Agents on the World Wide Web 3, 3(1):23--40, 2005.
[21]
Y. J. Hu and H. Boley. Sempif: A semantic meta-policy interchange format for multiple web policies. In 2010 IEEE/WIC/ACM Int. Conference on Web Intelligence and Intelligent Agent Technology, pages 302--307. IEEE, 2010.
[22]
S. Jajodia et al. Flexible support for multiple access control policies. ACM Trans. on Database Systems, 26(2):214--260, June 2001.
[23]
E. Jiménez-Ruiz et al. Ontology integration using mappings: Towards getting the right logical consequences. In ESWC 2009, LNCS 5554, pages 173--187. Springer, 2009.
[24]
G. Karjoth and M. Schunter. A privacy policy model for enterprises. In 15th IEEE Computer Security Foundations Workshop (CSFW). IEEE, June 2002.
[25]
G. Karjoth, M. Schunter, and E. V. Herreweghen. Translating privacy practices into privacy promises - how to promise what you can keep. In POLICY'03. IEEE, 2003.
[26]
M. Lenzerini. Data integration: A theoretical perspective. In Proceedings of the ACM Symposium on Principles of Database Systems (PODS), pages 233--246. ACM, 2002.
[27]
Y. A. Levy. Logic-based techniques in data integration. In T. Yu and S. Jajodia, editors, Logic-based Artificial Intelligence, pages 1--27. Kulwer, 2001.
[28]
P. Mazzoleni et al. XACML policy integration algorithms. ACM Trans. on Information and System Security, 11(1), 2008.
[29]
B. Motik, U. Sattler, and R. Studer. Query answering for OWL-DL with rules. In 3rd International Semantic Web Conference (ISWC) 2004, LNCS 3298, pages 549--563. Springer, 2004.
[30]
A. Nash and A. Deutsch. Privacy in GLAV information integration. In ICDT 2007, LNCS 4353, pages 89--103. Springer, 2007.
[31]
J. M. O'Connor and A. K. Das. SQWRL: a query language for OWL. In OWLED, volume 529. CEUR, 2009.
[32]
J. Park and R. T. Sandhu. The UCONABC usage control model. ACM Trans. on Information and System Security, 7(1):128--174, 2004.
[33]
A. Poggi et al. Linking data to ontologies. Journal on Data Semantics X, 4900:133--173, 2008.
[34]
D. J. Ullman. Information integration using logical views. Theoretical Computer Science, 239:189--210, 2000.
[35]
S. D. C. d. Vimercati et al. Access control policies and languages in open environments. In T. Yu and S. Jajodia, editors, Secure Data Management in Decentralized Systems, pages 21--58. Springer, 2007.

Cited By

View all
  • (2016)Privacy-Knowledge Modeling for the Internet of ThingsComputer10.1109/MC.2016.36649:12(60-68)Online publication date: 1-Dec-2016
  • (2016)SWCTE: Semantic weighted context tagging engine for privacy preserving data mining2016 International Conference on Data Science and Engineering (ICDSE)10.1109/ICDSE.2016.7823968(1-5)Online publication date: Aug-2016
  • (2016)Automated Policy Combination for Secure Data Sharing in Cross-Organizational CollaborationsIEEE Access10.1109/ACCESS.2016.25851854(3454-3468)Online publication date: 2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
WIMS '11: Proceedings of the International Conference on Web Intelligence, Mining and Semantics
May 2011
563 pages
ISBN:9781450301480
DOI:10.1145/1988688
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 May 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. data sharing and integration
  2. database
  3. ontology and rule
  4. privacy protection
  5. query rewriting
  6. semantic web
  7. semantics-enabled policy
  8. www

Qualifiers

  • Research-article

Funding Sources

Conference

WIMS '11

Acceptance Rates

Overall Acceptance Rate 140 of 278 submissions, 50%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)1
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Privacy-Knowledge Modeling for the Internet of ThingsComputer10.1109/MC.2016.36649:12(60-68)Online publication date: 1-Dec-2016
  • (2016)SWCTE: Semantic weighted context tagging engine for privacy preserving data mining2016 International Conference on Data Science and Engineering (ICDSE)10.1109/ICDSE.2016.7823968(1-5)Online publication date: Aug-2016
  • (2016)Automated Policy Combination for Secure Data Sharing in Cross-Organizational CollaborationsIEEE Access10.1109/ACCESS.2016.25851854(3454-3468)Online publication date: 2016
  • (2015)A Multilevel Security Model for Search Engine Over Integrated DataTransactions on Computational Collective Intelligence XIX - Volume 938010.1007/978-3-662-49017-4_4(45-68)Online publication date: 1-Sep-2015
  • (2013)Crafting a balance between big data utility and protection in the semantic data cloudProceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics10.1145/2479787.2479806(1-12)Online publication date: 12-Jun-2013
  • (2012)Towards law-aware semantic cloud policies with exceptions for data integration and protectionProceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics10.1145/2254129.2254162(1-12)Online publication date: 13-Jun-2012
  • (2011)Semantics-enabled policies for information sharing and protection in the cloudProceedings of the Third international conference on Social informatics10.5555/2050728.2050760(198-211)Online publication date: 6-Oct-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media