* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Lecture20 - The University of Texas at Dallas
Survey
Document related concepts
Transcript
Trustworthy Semantic Web Dr. Bhavani Thuraisingham The University of Texas at Dallas Inference Problem March 4, 2011 History Statistical databases (1970s – present) Inference problem in databases (early 1980s - present) Inference problem in MLS/DBMS (late 1980s – present) Unsolvability results (1990) Logic for secure databases (1990) Semantic data model applications (late 1980s - present) Emerging applications (1990s – present) Privacy (2000 – present) Statistical Databases Census Bureau has been focusing for decades on statistical inference and statistical database Collections of data such as sums and averages may be given out but not the individual data elements Techniques include - Perturbation where results are modified - Randomization where random samples are used to compute summaries Techniques are being used now for privacy preserving data mining Security Constraints / Access Control Rules / Policies Simple Constraint: John cannot access the attribute Salary of relation EMP Content-based constraint: If relation MISS contains information about missions in the Middle East, then John cannot access MISS Association-based Constraint: Ship’s location and mission taken together cannot be accessed by John; individually each attribute can be accessed by John Release constraint: After X is released Y cannot be accessed by John Aggregate Constraint: Ten or more tuples taken together cannot be accessed by John Dynamic Constraint: After the Mission, information about the mission can be accessed by John Security Constraints/Policies for Healthcare Simple Constraint: Only doctors can access medical records Content-based constraint: If the patient has Aids then this information is private Association-based Constraint: Names and medical records taken together is private Release constraint: After medical records are released, names cannot be released Aggregate Constraint: The collection of patients is private, individually public Dynamic Constraint: After the patient dies, information about him becomes public Inference Problem in MLS/DBMS Inference is the process of forming conclusions from premises If the conclusions are unauthorized, it becomes a problem Inference problem in a multilevel environment Aggregation problem is a special case of the inference problem - collections of data elements is Secret but the individual elements are Unclassified Association problem: attributes A and B taken together is Secret - individually they are Unclassified Revisiting Security Constraints / Policies Simple Constraint: Mission attribute of SHIP is Secret Content-based constraint: If relation MISSION contains information about missions in Europe, then MISSION is Secret Association-based Constraint: Ship’s location and mission taken together is Secret; individually each attribute is Unclassified Release constraint: After X is released Y is Secret Aggregate Constraint: Ten or more tuples taken together is Secret Dynamic Constraint: After the Mission, information about the mission is Unclassified Logical Constraint: A Implies B; therefore if B is Secret then A must be at least Secret Enforcement of Security Constraints User Interface Manager Security Constraints Constraint Manager Query Processor: Constraints during query and release operations Update Processor: Database Design Tool Constraints during database design operation Constraints during update operation Data Manager Database Query Algorithms Query is modified according to the constraints Release database is examined as to what has been released Query is processed and response assembled Release database is examined to determine whether the response should be released Result is given to the user Portions of the query processor are trusted Update Algorithms Certain constraints are examined during update operation Example: Content-based constraints The security level of the data is computed Data is entered at the appropriate level Certain parts of the Update Processor are trusted Database Design Algorithms Certain constraints are examined during the database design time - Example: Simple, Association and Logical Constraints Schema are assigned security levels Database is partitioned accordingly Example: - If Ships location and mission taken together is Secret, then SHIP (S#, Sname) is Unclassified, LOC-MISS(S#, Location, Mission) is Secret LOC(Location) is Unclassified - MISS(Mission) is Unclassified Example Security-Enhanced Semantic Web Technology to be developed by project Interface to the Security-Enhanced Semantic Web Inference Engine/ Inference Controller Security Policies Ontologies Rules Semantic Web Engine RDF, OWL Documents Web Pages, Databases