Skip to main content

Protecting Sensitive Data in Web of Data

  • Conference paper
  • First Online:
Advances in Model and Data Engineering in the Digitalization Era (MEDI 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1481))

Included in the following conference series:

  • 436 Accesses

Abstract

Over the last few years, the web of data has been increased. It permitted sharing and an interconnection of a large data in several domains and it keeps increasing day by day. However, certain sectors such as health, economic, government, etc., have a limited participation, due to the confidential nature of data. In order to develop the web of data, taking in consideration the confidentiality and the utility of data, we propose in this paper a framework of confidentiality preservation and sharing of the linked data. Our approach provides the means to generate privacy policies that specify the sensitive data to be protected in an Resource Description Framework (RDF) triple. Subsequently the application of the policy on the graph will allow their replacement by their encryption, thus ensuring a balance between confidentiality and utility of data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://jena.apache.org.

References

  1. Berners-Lee, T.: Linked Data (2006). http://www.w3.org/DesignIssues/LinkedData.html

  2. Grau, B.C., Kostylev, E.V.: Logical foundations of privacy-preserving publishing of linked data. In: AAAI, pp. 943–949. AAAI Press (2016)

    Google Scholar 

  3. Finin, T., et al.: ROWLBAC: representing role based access control in OWL. In: 13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO, USA (2008)

    Google Scholar 

  4. Gabillon, A., Letouzey, L.: A view based access control model for SPARQL. In: NSS 2010, pp. 105–112, (2010)

    Google Scholar 

  5. Sacco, O., Passant, A.: A Privacy Preference Ontology (PPO) for linked data. In: Proceedings of the 4th Workshop about Linked Data on the Web, LDOW 2011 (2011)

    Google Scholar 

  6. Costabello, L., Villata, S., Delaforge, N.: Linked data access goes mobile: contextaware authorization for graph stores. In: LDOW - 5th WWW Workshop on Linked Data on the Web (2012)

    Google Scholar 

  7. Meersman, R., et al. (eds.): OTM 2011. LNCS, vol. 7045. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25106-1

  8. Mainini, P., Laube, A.: Access control in linked data using WebID: a practical approach validated in a lifelong learning use case. In: 12th International Conference on Semantic Systems - SEMANTiCS2016, Leipzig, Germany, (2016)

    Google Scholar 

  9. Sambra, A., Corlosquet, S.: WebID 1.0, Web Identity and Discovery (2015). https://dvcs.w3.org/hg/WebID/raw-file/tip/spec/identity-respec.html

  10. Kirrane, S., Abdelrahman, A., Mileo, A., Decker, S.: Secure manipulation of linked data. In: Alani, H., et al. (eds.) ISWC 2013. LNCS, vol. 8218, pp. 248–263. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41335-3_16

  11. Sayah, T., Coquery, E., Thion, R., Hacid, M.-S.: Access control enforcement for selective disclosure of linked data. In: Barthe, G., Markatos, E., Samarati, P. (eds.) Security and Trust Management. STM 2016. LNCS, vol. 9871. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46598-2_4

  12. Giereth, M.: On partial encryption of RDF-Graphs. In: Gil, Y., Motta, E., Ben-jamins, V.R., Musen, M.A. (eds.) ISWC 2005. LNCS, vol. 3729, pp. 308–322. Springer, Heidelberg (2005). https://doi.org/10.1007/11574620_24

  13. Kasten, A., Scherp, A., Armknecht, F., Krause, M.: Towards search on encrypted graph data. In: Proceedings of the International Conference on Society, Privacy and the Semantic Web-Policy and Technology, pp. 46–57 (2013)

    Google Scholar 

  14. Fernandez, J. D., Kirrane, S., Polleres, A., Steyskal, S.: Self-enforcing access control for encrypted RDF. In: Blomqvist, E., Maynard, D., Gangemi, A., Hoekstra, R., Hitzler, P., Hartig, O. (eds.) The Semantic Web. ESWC 2017. LNCS, vol. 10249. Springer, Cham. https://doi.org/10.1007/978-3-319-58068-5_37

  15. Fernandez, J.D., Kirrane, S., Polleres, A., Steysal, S.: HDTcrypt: compression and encryption of RDF datasets. Semant. Web J. 11, 337–359 (2018)

    Google Scholar 

  16. Heitmann, B., Hermsen, F., Decker, S.: k-RDF-neighbourhood anonymity: combining structural and attribute-based anonymisation for linked data. In: PrivOn@ISWC. CEUR Workshop Proceedings, vol. 1951. CEUR-WS.org (2017)

    Google Scholar 

  17. Delanaux, R., Bonifati, A., Rousset, M.-C., Thion, R.: Query-based linked data anonymization. In: The 17th International Semantic Web Conference (ISWC 2018), Monterey, USA (2018)

    Google Scholar 

  18. Pérez, J., Arenas, M., Gutierrez, C.: Semantics and complexity of SPARQL. ACM Trans. Database Syst. 34, 1–45 (2009)

    Google Scholar 

  19. Guo, Y., Pan, Z., Heflin, J.: LUBM: a benchmark for owl knowledge base systems. J. Web Semant. (2005). http://swat.cse.lehigh.edu/projects/lubm/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fethi Imad Benaribi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Benaribi, F.I., Malki, M., Faraoun, K.M. (2021). Protecting Sensitive Data in Web of Data. In: Bellatreche, L., Chernishev, G., Corral, A., Ouchani, S., Vain, J. (eds) Advances in Model and Data Engineering in the Digitalization Era. MEDI 2021. Communications in Computer and Information Science, vol 1481. Springer, Cham. https://doi.org/10.1007/978-3-030-87657-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-87657-9_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-87656-2

  • Online ISBN: 978-3-030-87657-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics