Skip to main content

Data Security and Null Value Imputation in Distributed Information Systems

  • Conference paper
Monitoring, Security, and Rescue Techniques in Multiagent Systems

Part of the book series: Advances in Soft Computing ((AINSC,volume 28))

Summary

Distributed Information System (DIS) is seen as a collection of autonomous in-formation systems which can collaborate with each other. This collaboration can be driven by requests for knowledge needed to predict what values should replace null values in missing or incomplete attributes. Any incompleteness in data can be seen either as the result of a partial knowledge about properties of objects stored in DIS or some attributes might be just hidden from users because of the security reason. Clearly, in the second case, we have to be certain that the missing values can not be predicted from the available data by chase, distributed chase or any other null value imputation method. Let us assume that an attributes d is hidden at one of the sites of DIS, denoted by S and called a client. With a goal to reconstruct this hidden attribute, a request for a definition of this attribute can be sent by S to some of its remote sites (see [15]). These definitions stored in a knowledge-base KB can be used by Chase algorithm (see [4, 6]) to impute missing attribute values describing objects in S. In this paper we show how to identify these objects and what additional values in S have to be hidden from users to guarantee that initially hidden attribute values in S can not be properly predicted by Distributed Chase.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Atzeni, P., DeAntonellis, V. (1992) Relational database theory, The Benjamin Cummings Publishing Company

    Google Scholar 

  2. Benjamins, V. R., Fensel, D., Perez, A. G. (1998) Knowledge management through ontologies, in Proceedings of the 2nd International Conference on Practical Aspects of Knowledge Management (PAKM-98), Basel, Switzerland.

    Google Scholar 

  3. Chandrasekaran, B., Josephson, J. R., Benjamins, V. R. (1998) The ontology of tasks and methods, in Proceedings of the 11th Workshop on Knowledge Acquisition, Modeling and Management, Banff, Alberta, Canada

    Google Scholar 

  4. Dardzińska, A., Raś, Z.W. (2003) Rule-Based Chase Algorithm for Partially Incomplete Information Systems, in Proceedings of the Second International Workshop on Active Mining (AM’2003), Maebashi City, Japan, October, 2003, 42–51

    Google Scholar 

  5. Dardzińska, A., Raś, Z.W. (2003) On Rules Discovery from Incomplete Information Systems, in Proceedings of ICDM’03 Workshop on Foundations and New Directions of Data Mining, (Eds: T.Y. Lin, X. Hu, S. Ohsuga, C. Liau), Melbourne, Florida, IEEE Computer Society, 2003, 31–35

    Google Scholar 

  6. Dardzińska, A., Raś, Z.W. (2003) Chasing Unknown Values in Incomplete Information Systems, in Proceedings of ICDM’03 Workshop on Foundations and New Directions of Data Mining, (Eds: T.Y. Lin, X. Hu, S. Ohsuga, C. Liau), Melbourne, Florida, IEEE Computer Society, 2003, 24–30

    Google Scholar 

  7. Fensel, D., (1998), Ontologies: a silver bullet for knowledge management and electronic commerce, Springer-Verlag, 1998

    Google Scholar 

  8. Grzymala-Busse, J. (1997) A new version of the rule induction system LERS, in Fundamenta Informaticae, Vol. 31, No. 1, 27–39

    MATH  Google Scholar 

  9. Giudici, P. (2003) Applied Data Mining, Statistical Methods for Business and Industry, Wiley, West Sussex, England

    MATH  Google Scholar 

  10. Guarino, N., ed. (1998) Formal Ontology in Information Systems, IOS Press, Amsterdam

    Google Scholar 

  11. Guarino, N., Giaretta, P. (1995) Ontologies and knowledge bases, towards a terminological clarification, in Towards Very Large Knowledge Bases: Knowledge Building and Knowledge Sharing, IOS Press

    Google Scholar 

  12. Pawlak, Z. (1991) Rough sets-theoretical aspects of reasoning about data, Kluwer, Dordrecht

    MATH  Google Scholar 

  13. Pawlak, Z. (1991) Information systems-theoretical foundations, in Information Systems Journal, Vol. 6, 1981, 205–218

    Google Scholar 

  14. Raś, Z.W. (1994) Dictionaries in a distributed knowledge-based system, in Concurrent Engineering: Research and Applications, Conference Proceedings, Pittsburgh, Penn., Concurrent Technologies Corporation, pp. 383–390

    Google Scholar 

  15. Raś, Z.W, Dardzińska, A. (2004) Ontology Based Distributed Autonomous Knowledge Systems, in Information Systems International Journal, Elsevier, Vol. 29, No. 1, 2004, 47–58

    Google Scholar 

  16. Raś, Z.W, Dardzińska, A. (2004) Query Answering based on Collaboration and Chase, in the Proceedings of FQAS’04 Conference, Lyon, France, LNCS/LNAI, Springer-Verlag, 2004, will appear

    Google Scholar 

  17. Raś, Z.W., Joshi, S. Query approximate answering system for an incomplete DKBS, in Fundamenta Informaticae Journal, IOS Press, Vol. 30, No. 3/4, 1997, 313–324

    Google Scholar 

  18. Sowa, J.F. (2000a) Ontology, metadata, and semiotics, in B. Ganter & G. W. Mineau, eds., Conceptual Structures: Logical, Linguistic, and Computational Issues, LNAI, No. 1867, Springer-Verlag, Berlin, 2000, pp. 55–81

    Google Scholar 

  19. Sowa, J.F. (2000b) Knowledge Representation: Logical, Philosophical, and Computational Foundations, Brooks/Cole Publishing Co., Pacific Grove, CA.

    Google Scholar 

  20. Sowa, J.F. (1999a) Ontological categories, in L. Albertazzi, ed., Shapes of Forms: From Gestalt Psychology and Phenomenology to Ontology and Mathematics, Kluwer Academic Publishers, Dordrecht, 1999, pp. 307–340.

    Google Scholar 

  21. Van Heijst, G., Schreiber, A., Wielinga, B. (1997) Using explicit ontologies in KBS development, in International Journal of Human and Computer Studies, Vol. 46, No. 2/3, 183–292.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Raś, Z.W., Dardzińska, A. (2005). Data Security and Null Value Imputation in Distributed Information Systems. In: Monitoring, Security, and Rescue Techniques in Multiagent Systems. Advances in Soft Computing, vol 28. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-32370-8_9

Download citation

  • DOI: https://doi.org/10.1007/3-540-32370-8_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23245-2

  • Online ISBN: 978-3-540-32370-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics