Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense

Slides:



Advertisements
Similar presentations
웹 서비스 개요.
Advertisements

Fall IM 2000 Evfolution of Presence Based Networks Evolution of Presence Based Networks Jonathan Rosenberg Chief Scientist.
TU e technische universiteit eindhoven / department of mathematics and computer science Modeling User Input and Hypermedia Dynamics in Hera Databases and.
TU/e technische universiteit eindhoven Hera: Development of Semantic Web Information Systems Geert-Jan Houben Peter Barna Flavius Frasincar Richard Vdovjak.
CH-4 Ontologies, Querying and Data Integration. Introduction to RDF(S) RDF stands for Resource Description Framework. RDF is a standard for describing.
Social Media.
Architecture Representation
Semantic Web Thanks to folks at LAIT lab Sources include :
1 UIM with DAML-S Service Description Team Members: Jean-Yves Ouellet Kevin Lam Yun Xu.
RDF Tutorial.
Building and Analyzing Social Networks Web Data and Semantics in Social Network Applications Dr. Bhavani Thuraisingham February 15, 2013.
UNDERSTANDING JAVA APIS FOR MOBILE DEVICES v0.01.
1 Introduction to XML. XML eXtensible implies that users define tag content Markup implies it is a coded document Language implies it is a metalanguage.
Using Social Semantic Web Data for Privacy Policies Presentation of the Bachelor Thesis Emily Kigel.
Data Security in Local Networks using Distributed Firewalls
GPS Tracking & Inventory Management GPS Tracking & Inventory Management Presented by: Product Activation Group.
Copyright © Norman Sadeh Semantic Web Technologies to Reconcile Privacy and Context Awareness Norman M. Sadeh ISRI- School of Computer Science.
THE SECOND LIFE OF A SENSOR: INTEGRATING REAL-WORLD EXPERIENCE IN VIRTUAL WORLDS USING MOBILE PHONES Sherrin George & Reena Rajan.
Smart Learning Services Based on Smart Cloud Computing
Social networking FACEBOOK AND TWITTER. Then In the beginning of Facebook, there were very few features. There were no status updates, messages, photo.
Combining KMIP and XACML. What is XACML? XML language for access control Coarse or fine-grained Extremely powerful evaluation logic Ability to use any.
XACML Briefing for PMRM TC Hal Lockhart July 8, 2014.
Managing Large RDF Graphs (Infinite Graph) Vaibhav Khadilkar Department of Computer Science, The University of Texas at Dallas FEARLESS engineering.
Valma Technical Aspects
Anupam Joshi and Tim Finin Ebiquity UMBC
Practical RDF Chapter 1. RDF: An Introduction
Identity Management Report By Jean Carreon and Marlon Gonzales.
Aegis: A Semantic Implementation of Privacy as Contextual Integrity in Social Ecosystems Imrul Kayes, Adriana Iamnitchi.
Intelligent Agents Meet the Semantic Web in Smart Spaces Harry Chen,Tim Finin, Anupam Joshi, and Lalana Kagal University of Maryland, Baltimore County.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
Tim Finin University of Maryland, Baltimore County 29 January 2013 Joint work with Anupam Joshi, Laura Zavala and our students SRI Social Media Workshop.
UMBC iConnect Audumbar Chormale, Dr. A. Joshi, Dr. T. Finin, Dr. Z. Segall.
Auckland Connected Systems User Group November 19th 2009 Jeffrey Chilberto BizTalk Consultant
Triple-space computing* The Third International Semantic Web Conference Hiroshima, Japan, Dieter Fensel Digital Enterprise.
Javascript Cog Kit By Zhenhua Guo. Grid Applications Currently, most grid related applications are written as separate software. –server side: Globus,
Metadata. Generally speaking, metadata are data and information that describe and model data and information For example, a database schema is the metadata.
Page 1 WWRF Briefing WG2-br2 · Kellerer/Arbanowski · · 03/2005 · WWRF13, Korea Stefan Arbanowski, Olaf Droegehorn, Wolfgang.
POLICY ENGINE Research: Design & Language IRT Lab, Columbia University.
Page 1 Alliver™ Page 2 Scenario Users Contents Properties Contexts Tags Users Context Listener Set of contents Service Reasoner GPS Navigator.
The Birth & Growth of Web 2.0 COM 415-Fall II Ashley Velasco (Prince)
Lifecycle Metadata for Digital Objects November 1, 2004 Descriptive Metadata: “Modeling the World”
Efficient RDF Storage and Retrieval in Jena2 Written by: Kevin Wilkinson, Craig Sayers, Harumi Kuno, Dave Reynolds Presented by: Umer Fareed 파리드.
Dr. Bhavani Thuraisingham The University of Texas at Dallas Trustworthy Semantic Webs March 25, 2011 Data and Applications Security Developments and Directions.
ES component and structure Dr. Ahmed Elfaig The production system or rule-based system has three main component and subcomponents shown in Figure 1. 1.Knowledge.
Introduction to Semantic Web Service Architecture ► The vision of the Semantic Web ► Ontologies as the basic building block ► Semantic Web Service Architecture.
Human Tracking System Using DFP in Wireless Environment 3 rd - Review Batch-09 Project Guide Project Members Mrs.G.Sharmila V.Karunya ( ) AP/CSE.
Tool for Ontology Paraphrasing, Querying and Visualization on the Semantic Web Project By Senthil Kumar K III MCA (SS)‏
SPINNING THE SEMANTIC WEB APPLICATIONS FOR THE MODERN ERA LIBRARIES
User Profiling using Semantic Web Group members: Ashwin Somaiah Asha Stephen Charlie Sudharshan Reddy.
Application Ontology Manager for Hydra IST Ján Hreňo Martin Sarnovský Peter Kostelník TU Košice.
FriendFinder Location-aware social networking on mobile phones.
FriendFinder Location-aware social networking on mobile phones.
1 Ontolog OOR-BioPortal Comparative Analysis Todd Schneider 15 October 2009.
1/14/ :59 PM1/14/ :59 PM1/14/ :59 PM Research overview Koen Victor, 12/2007.
RIA to visualize the health of a project Team #4 Midterm presentation February 28,2008.
Multiparty Access Control for Online Social Networks : Model and Mechanisms.
ESG-CET Meeting, Boulder, CO, April 2008 Gateway Implementation 4/30/2008.
Semantic sewer pipe failure detection: Linked data approaches for discovering events Jonathan Yu | Research software engineer Environmental Information.
AFS/OSD Project R.Belloni, L.Giammarino, A.Maslennikov, G.Palumbo, H.Reuter, R.Toebbicke.
NSF Cyber Trust Annual Principal Investigator Meeting September 2005 Newport Beach, California UMBC an Honors University in Maryland Trust and Security.
Semantic Interoperability in GIS N. L. Sarda Suman Somavarapu.
Mechanisms for Requirements Driven Component Selection and Design Automation 최경석.
Building Trustworthy Semantic Webs
Architecture Components
Privacy Preservation in Context-Aware Systems
Analyzing and Securing Social Networks
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Lecture #6: RDF and RDF Security Dr. Bhavani Thuraisingham
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Presentation transcript:

Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense

 Increase in the user generated content on web  Rise in the online interactions and content sharing among users  More dynamic context  Need to provide precise control over the conditions under which users can share their personal information 2

Devise better privacy mechanisms to control the information flow in social networking systems. 3

Privacy control mechanism based on policy frameworks that are rich in semantic web technologies to control information flow in social networking applications. The privacy control mechanism  Provides users of the system better control while sharing information than the state of the art systems  Combines dynamic user context, For instance, current time, current location or current activity of the user 4

 Increase in the popularity of social networking systems(SNS) such as Facebook, MySpace, LiveJournal etc.  SNS allow creation of online profiles  Photos, videos and favorite links  ‘What’s on your mind’ or status updates  Content sharing with a huge list of friends and networks of friends 5

 Availability of GPS functionality on phone devices like iPhone, HTC-G1 and network based positioning methods on internet  Social network maps friends and their locations using Maps API on the web  Content sharing relative to location and time  Privacy is an important issue with the current systems like Google latitude, Loopt, Brightkite 6

 Privacy concerns when, how and to what extent information about someone is communicated to others  Distinguish among various peers in large network of friends  Capture continuous changes in the contextual information about users  Address privacy requirements subjective to individual 7

 RDF and OWL  Set of triples  Precise specification of classes used by policy languages  based on description logic, for which efficient reasoning systems are available  Notation3  expression of data and logic in the same language  simple and consistent grammar, greater expressiveness, and is a compact and readable alternative to RDF’s XML syntax  allow rules to be integrated smoothly with RDF  Policies based on semantic web technologies can better represent user context information and privacy preferences. 8

Static knowledge about user profile, and networks of friends Knowledge about dynamic user context like current activity, location Privacy enforcement rules Reasoning Engine Network Privacy Control Framework Content Preferences Content Aggregator Social Media Policy network ontology Database 9

 Policy network ontology  Integrates Rein and AIR policy ontology  Rein policies to provide access control and AIR policies to provide justification to the inferences made  Policies specified using N3 rules and Turtle  Reasoning engine  CWM, a forward chaining rule engine ▪ Pychinko, a forward chaining rule engine, written in Python, that implements Rete algorithm and allows for efficient processing of very large rule bases  Supports a significant subset of the math, string, time and logic built-ins 10

11 Policy(N3) Resource (User-location) Meta-Policy Policy Language (loc-access) Policy Language (loc-access) policy language meta-policy Request Requester Credentials Location-Access Answer Valid InValid access requester ans IsA Policy Network Ontology Request Ontology

Privacy Policy follows Deny-Access approach. It specifies authorization logic. Authentication is performed separately in the system.  What information user is willing to share  Location information with accuracy level  With whom  Friends  Group of friends  Under what conditions  Day and time of the week  Location of the user, specifying the area in which user can be seen  Accuracy level of the location information 12

Example policies can be :  Share my location with teachers on weekdays only if I am in the university campus and only between 9 am and 6 pm  Share exact location with members of family group all the time, in all locations  Do not share my location if user is at any of the sensitive locations  Do not share my activity status with teachers on weekends  Share my activity status with only close friends 13

Example of location access control policy: Share my location with teachers on weekdays only if I am in the university campus and only between 9 am and 6 pm 14

Example of location access control policy: Share exact location with members of family group all the time, in all locations 15

16 Example of location access control policy: Do not share my location if user is at any of the sensitive locations

17 Example of activity access control policy: Do not share my activity status with teachers on weekends

18 Example of activity access control policy: Do not share my location if user is at any of the sensitive locations

19 Example of Accountability Policy: Checks the compliance of location request with user's policy

 User shares her protected resources and defines the privacy preferences  System follows pull mechanism. All the different types of information sharing activities among participants are established by the privacy control module in the system.  Whenever any participant makes a query, it is sent to the privacy control module which in turn processes the query by reasoning over the policy networks associated with the resource, and returns the valid answer to the query.  Generalization is applied for the valid answers. 20

21 Query Form request and Assert required information Authenticate Requester Fetch knowledge about user Execute Reasoning Engine Apply generalization Result Assert Authorization Result Figure 3. Steps involved in query processing

 Client device is location aware device like GPS enabled phones or wi-fi enabled laptops  Google maps to plot user and her friends  User interface to define privacy preferences  Connects with Facebook accounts to fetch profile information and find networks of friends  Creates and stores policy ontology in persistent memory and reloads when required by reasoning engine 22

23

Privacy Configuration User Interface 24

Summary of features of our system and their comparison with the state of the art systems 25

Timing characteristics of various privacy rules with CWM and Pychinko. Policy1(location sharing rule with Math and time builtins), Policy 2 (activity sharing rule with Math and time builtins), Policy 3 (activity sharing without any builtins), Policy 4 (location sharing without any builtins). All timings shown are in milliseconds. 26

 We have described the system architecture of the policy based system and its various components and discussed implementation considerations. We demonstrated few examples of the policy that state of the art system does not support.  Future Work:  Improve scalability  Evaluate the utility  Predicting user privacy preferences 27

Privacy control mechanism based on policy frameworks that are rich in semantic web technologies to control information flow in social networking applications. The privacy control mechanism  Provides users of the system better control while sharing information than the state of the art systems  Combines dynamic user context, For instance, current time, current location or current activity of the user 28

Thank you 29