Security in semantic web Hassan Abolhassani, Leila Sharif Sharif university of technology

Slides:



Advertisements
Similar presentations
Querying on the Web: XQuery, RDQL, SparQL Semantic Web - Spring 2006 Computer Engineering Department Sharif University of Technology.
Advertisements

Schema Matching and Query Rewriting in Ontology-based Data Integration Zdeňka Linková ICS AS CR Advisor: Július Štuller.
The 20th International Conference on Software Engineering and Knowledge Engineering (SEKE2008) Department of Electrical and Computer Engineering
The Logic of Intelligence Pei Wang Department of Computer and Information Sciences Temple University.
CMSC 104, Version 8/061L04Algorithms1.ppt Algorithms, Part 1 of 3 Topics Definition of an Algorithm Algorithm Examples Syntax versus Semantics Reading.
CSE 425: Semantic Analysis Semantic Analysis Allows rigorous specification of a program’s meaning –Lets (parts of) programming languages be proven correct.
Research topics Semantic Web - Spring 2007 Computer Engineering Department Sharif University of Technology.
Searching the Semantic Web. Introduction  Research Focuses: IE Ontologies (creating, languages, merging, storing, querying)  Next Sep: Using the Semantic.
Soft computing Lecture 6 Introduction to neural networks.
Xyleme A Dynamic Warehouse for XML Data of the Web.
SECTIONS 21.4 – 21.5 Sanuja Dabade & Eilbroun Benjamin CS 257 – Dr. TY Lin INFORMATION INTEGRATION.
Dynamic Ontologies on the Web Jeff Heflin, James Hendler.
Relational Data Mining in Finance Haonan Zhang CFWin /04/2003.
Visual Web Information Extraction With Lixto Robert Baumgartner Sergio Flesca Georg Gottlob.
We Need Smart XML Processing HTML has ultra-complex semantics XML has no semantics Something must bridge the gap  A program ?  A clear set of data semantics?
CS 331 / CMPE 334 – Intro to AI CS 531 / CMPE AI Course Outline.
CIS101 Introduction to Computing Week 11. Agenda Your questions Copy and Paste Assignment Practice Test JavaScript: Functions and Selection Lesson 06,
Information Extraction from HTML: General Machine Learning Approach Using SRV.
Parsing SLP Chapter 13. 7/2/2015 Speech and Language Processing - Jurafsky and Martin 2 Outline  Parsing with CFGs  Bottom-up, top-down  CKY parsing.
CS580: Building Web Based Information Systems Roger Alexander & Adele Howe The purpose of the course is to teach theory and practice underlying the construction.
Text Mining: Finding Nuggets in Mountains of Textual Data Jochen Dijrre, Peter Gerstl, Roland Seiffert Presented by Drew DeHaas.
Semantic Web Technologies Lecture # 2 Faculty of Computer Science, IBA.
Grade Scale Test 1 Results: Average class score after partial credit: __________ Commonly missed questions: #_________________ If you got less than 70%
Practical RDF Chapter 1. RDF: An Introduction
Li Yi, APSEC ‘12 Constructing Feature Models Us­­ing a Cross-Join Merging Operator.
INTERPRETING IMPERATIVE PROGRAMMING LAGUAGES IN EXTENSIBLE STYLESHEET LANGUAGE TRANSFORMATIONS (XSLT) Authors: Ruhsan Onder Assoc.
Database Support for Semantic Web Masoud Taghinezhad Omran Sharif University of Technology Computer Engineering Department Fall.
Ming Fang 6/12/2009. Outlines  Classical logics  Introduction to DL  Syntax of DL  Semantics of DL  KR in DL  Reasoning in DL  Applications.
Master Thesis Defense Jan Fiedler 04/17/98
Navigational Plans For Data Integration Marc Friedman Alon Levy Todd Millistein Presented By Avinash Ponnala Avinash Ponnala.
Search - on the Web and Locally Related directly to Web Search Engines: Part 1 and Part 2. IEEE Computer. June & August 2006.
Module 5 Planning for SQL Server® 2008 R2 Indexing.
Universit at Dortmund, LS VIII
Algorithms, Part 1 of 3 Topics  Definition of an Algorithm  Algorithm Examples  Syntax versus Semantics Reading  Sections
Semantic web course – Computer Engineering Department – Sharif Univ. of Technology – Fall Description Logics: Logic foundation of Semantic Web Semantic.
Semantic Web - an introduction By Daniel Wu (danielwujr)
Q2Semantic: A Lightweight Keyword Interface to Semantic Search Haofen Wang 1, Kang Zhang 1, Qiaoling Liu 1, Thanh Tran 2, and Yong Yu 1 1 Apex Lab, Shanghai.
For: CS590 Intelligent Systems Related Subject Areas: Artificial Intelligence, Graphs, Epistemology, Knowledge Management and Information Filtering Application.
Intelligent Web Topics Search Using Early Detection and Data Analysis by Yixin Yang Presented by Yixin Yang (Advisor Dr. C.C. Lee) Presented by Yixin Yang.
Efficient RDF Storage and Retrieval in Jena2 Written by: Kevin Wilkinson, Craig Sayers, Harumi Kuno, Dave Reynolds Presented by: Umer Fareed 파리드.
Majid Sazvar Knowledge Engineering Research Group Ferdowsi University of Mashhad Semantic Web Reasoning.
Digital libraries and web- based information systems Mohsen Kamyar.
OWL Representing Information Using the Web Ontology Language.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Vision for Semantic Web.
Of 33 lecture 1: introduction. of 33 the semantic web vision today’s web (1) web content – for human consumption (no structural information) people search.
Computer Science, Algorithms, Abstractions, & Information CSC 2001.
Semantic web Bootstrapping & Annotation Hassan Sayyadi Semantic web research laboratory Computer department Sharif university of.
1 1 COMP5331: Knowledge Discovery and Data Mining Acknowledgement: Slides modified based on the slides provided by Lawrence Page, Sergey Brin, Rajeev Motwani.
Web Information Retrieval Prof. Alessandro Agostini 1 Context in Web Search Steve Lawrence Speaker: Antonella Delmestri IEEE Data Engineering Bulletin.
M1G Introduction to Programming 2 3. Creating Classes: Room and Item.
DEDUCTION PRINCIPLES AND STRATEGIES FOR SEMANTIC WEB Chain resolution and its fuzzyfication Dr. Hashim Habiballa University of Ostrava.
ece 627 intelligent web: ontology and beyond
1 UMBC CMSC 104, Section Fall 2002 Algorithms, Part 1 of 3 Topics Definition of an Algorithm Algorithm Examples Syntax versus Semantics Reading.
Review: What is a logic? A formal language –Syntax – what expressions are legal –Semantics – what legal expressions mean –Proof system – a way of manipulating.
Semantic Wiki: Automating the Read, Write, and Reporting functions Chuck Rehberg, Semantic Insights.
INTRODUCTION TO COMPUTER PROGRAMMING(IT-303) Basics.
 Every word matters. Generally, all the words you put in the query will be used.  Search is always case insensitive. A search for [ new york times ]
CMSC 104, L041 Algorithms, Part 1 of 3 Topics Definition of an Algorithm Example: The Euclidean Algorithm Syntax versus Semantics Reading Sections 3.1.
1 Representing and Reasoning on XML Documents: A Description Logic Approach D. Calvanese, G. D. Giacomo, M. Lenzerini Presented by Daisy Yutao Guo University.
Algorithms, Part 1 of 3 The First step in the programming process
Algorithms, Part 1 of 3 Topics Definition of an Algorithm
Kenneth Baclawski et. al. PSB /11/7 Sa-Im Shin
Presented by: Hassan Sayyadi
Algorithms I: An Introduction to Algorithms
Staff Scheduling at USPS Mail Processing & Distribution Centers
Unit 4 Introducing the Study.
2008/09/17: Lecture 4 CMSC 104, Section 0101 John Y. Park
Algorithms, Part 1 of 3 Topics Definition of an Algorithm
Chaitali Gupta, Madhusudhan Govindaraju
Algorithms, Part 1 of 3 Topics Definition of an Algorithm
Presentation transcript:

Security in semantic web Hassan Abolhassani, Leila Sharif Sharif university of technology

Outline ● Semantic Web: a short introduction ● Security model in html document based web ● Security issues in a sample semantic web ● Analysis of solutions ● Query reformulation: centralized version ● Query reformulation: distributed version ● Security aware inference engine

Semantic web ● Bringing meaning to the web ● Overcome the limitation of current web – Machine processing is not possible – Search engines returns a lot of un-related results ● Impossible using current web: – Find information about animals that use sonar but are not either bats or dolpines – Finding (best) prices of goods and services – Delegating task to agents: Book me a holiday next weekend somewhere warm not too far away

Syntatic web

Semantic web layers

Focus of this work

Outline ● Semantic Web: a short introduction ● Security model in html document based web ● Security issues in a sample semantic web ● Analysis of solutions ● Query reformulation: centralized version ● Query reformulation: distributed version ● Security aware inference engine

Simplified security model of the current web ● A page as a whole is subject to security ● All the concepts in a page is treated equally ● Searches return references to pages, not to concepts ● This model is not applicable to semantic web

Outline ● Semantic Web: a short introduction ● Security model in html document based web ● Security issues in a sample semantic web ● Analysis of solutions ● Query reformulation: centralized version ● Query reformulation: distributed version ● Building security aware inference engine

A sample semantic web ● company1 has name1 as its name ● person1 is the president of the company1 ● this person has phone1 as his personal phone and phone2 as his office phone ● the company has partner1 as one of its partners ● partner1 has product1 with name1 and price1 as its name and price respectively ●...

A sample semantic web (cont.)

Example queries (in OWL/QL) ● Finding the “personalPhone” number of the president of “company1”: Query: (“What is the personalPhone of president of company1”) Query Pattern: {(c:president company1 ?person) (p:personalPhone ?person ?phone)} Must-Bind Variables List: (?phone) May-Bind variables List: () Don't-Bind Variables List: () Answer Pattern: {(p:personalPhone “president of company1” ?phone)}

Example queries (in OWL/QL) ● Finding the “personalPhone” number of the president of “company1”: Query: (“What is the personalPhone of president of company1”) Query Pattern: {(c:president company1 ?person) (p:personalPhone ?person ?phone)} Must-Bind Variables List: (?phone) May-Bind variables List: () Don't-Bind Variables List: () Answer Pattern: {(p:personalPhone “president of company1” ?phone)} Is anybody's access to personal phone number of president of company ok?

Example queries (in OWL/QL) ● Finding a provider company that provides product1 Query: (“What partner provides product1”) Query Pattern: {(c:partner company1 ?partner) (c:product ?partner prd:product1)} Must-Bind Variables List: (?partner) May-Bind variables List: () Don't-Bind Variables List: () Answer Pattern: {(prd:prduct ?partner prd:product1)}

Example queries (in OWL/QL) ● Finding a provider company that provides product1 Query: (“What partner provides product1”) Query Pattern: {(c:partner company1 ?partner) (c:product ?partner prd:product1)} Must-Bind Variables List: (?partner) May-Bind variables List: () Don't-Bind Variables List: () Answer Pattern: {(prd:prduct ?partner prd:product1)} Is anybody's access to partner information ok?

Differences between traditional web and semantic web security ● Concepts are linked not web pages ● Query instead of search ● A query processor traverses a semantic web graph ● For each node in the graph a different access previlage may be assigned ● We don't want to repeat current web limitations ● Each different site has its own logon facility ● Single sign-on is introduced to solve this ● How to add security to SW?

Outline ● Semantic Web: a short introduction ● Security model in html document based web ● Security issues in a sample semantic web ● Analysis of solutions ● Query reformulation: centralized version ● Query reformulation: distributed version ● Building security aware inference engine

Ad-hoc solution ● Create several semantic webs: ● Separate non-public and public information ● This works but is not a general solution: ● Results in redundant information: creation, maintenamce, and other problems. ● It is not feasible when we have a distributed model (query processor should know about all security measures of involving sites)

Query reformulation (filtering) ● Using OWL/QL features of variable binding

Query reformulation (cont.) ● Merits: ● Easy to implement ● Has not a significant overhead on query processing ● Demerits ● Not applicable when a semantic model is distributed

Distributed query reformulation Query pattern Query processor Site1 filtering agent Site2 filtering agent SiteN filtering agent Query pattern Filtered Query pattern

Distributed query reformulation (cont.) ● Merits: ● No centeralized control on security is needed ● Applicable to semantic webs that are distributed ● Demerits ● Overhead of pre-prossesing ● The need for filtering agents at each site ● May introduce security holes (should be investigated further)

Security aware inference engines ● It is clear by now that the general solution is to add security at the level of inference engines ● To have a security model we need to have a formalism ● The basic formal model for SW is considered to be Description logic: ● A variable-free logic formalism ● A deciedable fragment of first-order logic ● All constructs are convertible to first-order logic unary and binary predicate

Security aware inference engines (cont.) ● Basic description logic AL (attributive language) description logic: Sample statements:

Security aware inference engines (cont.) ● Inference in Description Logic ● Tableau based reasoning algorithms has been developed ● This algorithms work based on expansion (completion) rules ● A tree is expanded starting from the original statement (i.e. Query) ● Algorithm stops when a clash appears (i.e. C and ~C in the same node)

Security aware inference engines (cont.) ● Example of inference

Security aware inference engines (cont.) ● Example of inference

Security aware inference engines (cont.) ● Example of inference

Security aware inference engines (cont.) ● Example of inference

Security aware inference engines (cont.) ● Example of inference

Security aware inference engines (cont.) ● Example of inference

Security aware inference engines (cont.) ● Example of inference

Security aware inference engines (cont.) ● Expansion rules for ALC

Security aware inference engines (cont.) ● Adding security semantics to expansion rules

Security aware inference engines (cont.) ● Security added tableau algorithm ● Output of reasoner depends on the way the processing is terminated: ● In case of a clash the output can be something like: The query is not answerable by the knowledge base ● In case of a security violation: You are not allowed to traverse parts of knowledge base needed to respond to your query apply completion rules in arbitrary order as long as possible: - stop in case of clash - stop in case of “security violation” - Terminate if no completion rule is applicable

Security aware inference engines (cont.) ● Merits: ● An algorithm based on a formal language ● Complexity is same as tableau ● Demerits ● ?

Conclusions ● Differences between security model of syntactic web and semantic web is recognized ● Several solutions proposed: ● Ad-hoc: applicable to small closed organizations ● Centeralized filtering: applicable to a small society of organizations ● Distributed filtering: applicable to any society of organizations but with preprocessing overhead ● Security aware inference engines: no limitations upto now is recognized

Thank you