Lecture20 - The University of Texas at Dallas

Download Report

Transcript Lecture20 - The University of Texas at Dallas

Trustworthy Semantic Web
Dr. Bhavani Thuraisingham
The University of Texas at Dallas
Inference Problem
March 4, 2011
History
 Statistical databases (1970s – present)
 Inference problem in databases (early 1980s - present)
 Inference problem in MLS/DBMS (late 1980s – present)
 Unsolvability results (1990)
 Logic for secure databases (1990)
 Semantic data model applications (late 1980s - present)
 Emerging applications (1990s – present)
 Privacy (2000 – present)
Statistical Databases
 Census Bureau has been focusing for decades on statistical
inference and statistical database
 Collections of data such as sums and averages may be given out
but not the individual data elements
 Techniques include
- Perturbation where results are modified
- Randomization where random samples are used to compute
summaries
 Techniques are being used now for privacy preserving data mining
Security Constraints / Access Control Rules /
Policies
 Simple Constraint: John cannot access the attribute Salary of
relation EMP
 Content-based constraint: If relation MISS contains information
about missions in the Middle East, then John cannot access MISS
 Association-based Constraint: Ship’s location and mission taken
together cannot be accessed by John; individually each attribute can
be accessed by John
 Release constraint: After X is released Y cannot be accessed by
John
 Aggregate Constraint: Ten or more tuples taken together cannot be
accessed by John
 Dynamic Constraint: After the Mission, information about the
mission can be accessed by John
Security Constraints/Policies for Healthcare
 Simple Constraint: Only doctors can access medical records
 Content-based constraint: If the patient has Aids then this
information is private
 Association-based Constraint: Names and medical records taken
together is private
 Release constraint: After medical records are released, names
cannot be released
 Aggregate Constraint: The collection of patients is private,
individually public
 Dynamic Constraint: After the patient dies, information about him
becomes public
Inference Problem in MLS/DBMS
 Inference is the process of forming conclusions from premises
 If the conclusions are unauthorized, it becomes a problem
 Inference problem in a multilevel environment
 Aggregation problem is a special case of the inference
problem - collections of data elements is Secret but the
individual elements are Unclassified
 Association problem: attributes A and B taken together is
Secret - individually they are Unclassified
Revisiting Security Constraints / Policies
 Simple Constraint: Mission attribute of SHIP is Secret
 Content-based constraint: If relation MISSION contains information
about missions in Europe, then MISSION is Secret
 Association-based Constraint: Ship’s location and mission taken
together is Secret; individually each attribute is Unclassified
 Release constraint: After X is released Y is Secret
 Aggregate Constraint: Ten or more tuples taken together is Secret
 Dynamic Constraint: After the Mission, information about the
mission is Unclassified
 Logical Constraint: A Implies B; therefore if B is Secret then A must
be at least Secret
Enforcement of Security Constraints
User Interface Manager
Security
Constraints
Constraint
Manager
Query Processor:
Constraints during
query and release
operations
Update
Processor:
Database Design
Tool
Constraints during
database design
operation
Constraints
during
update
operation
Data Manager
Database
Query Algorithms
 Query is modified according to the constraints
 Release database is examined as to what has been released
 Query is processed and response assembled
 Release database is examined to determine whether the response
should be released
 Result is given to the user
 Portions of the query processor are trusted
Update Algorithms
 Certain constraints are examined during update operation
 Example: Content-based constraints
 The security level of the data is computed
 Data is entered at the appropriate level
 Certain parts of the Update Processor are trusted
Database Design Algorithms
 Certain constraints are examined during the database design time
- Example: Simple, Association and Logical Constraints
 Schema are assigned security levels
 Database is partitioned accordingly
 Example:
- If Ships location and mission taken together is Secret, then
SHIP (S#, Sname) is Unclassified,
LOC-MISS(S#, Location, Mission) is Secret
LOC(Location) is Unclassified
- MISS(Mission) is Unclassified
Example Security-Enhanced Semantic Web
Technology
to be developed
by project
Interface to the Security-Enhanced
Semantic Web
Inference Engine/
Inference Controller
Security Policies
Ontologies
Rules
Semantic Web
Engine
RDF, OWL
Documents
Web Pages,
Databases