Abstract
Along with describing the web resources with ontology-based metadata to make them machine-understandable, one also needs to carefully protect Semantic Web data from unauthorized access. This paper presents a query rewriting mechanism for access control so as to avoid leakage of sensitive resources in the Semantic Web. We propose to specify the security policies for access restrictions on resources as views declared based on ontologies. Illustrated examples are presented in the paper for explaining the underlying concepts. In addition, bucket-based algorithms are proposed for supporting the query rewriting.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bonatti, P.A., Duma, C., Fuchs, N., Nejdl, W., Olmedilla, D., Peer, J., Shahmehri, N.: Semantic Web policies - A discussion of requirements and research issues. In: Sure, Y., Domingue, J. (eds.) ESWC 2006. LNCS, vol. 4011, pp. 712–724. Springer, Heidelberg (2006)
Cautis, B.: Distributed access control: A privacy-conscious approach. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, Sophia, Antipolis, France (2007)
Duma, C., Herzog, A., Shahmehri, N.: Privacy in the Semantic Web: What policy languages have to offer. In: Proceedings of the 11th IEEE International Workshop on Policies for Distributed Systems and Networks (2007)
Halevy., A.Y.: Answering queries using views: A survey. VLDB Journal 2001 10(4), 270–294 (2001)
Kagal, L., Finin, T., Joshi, A.: A policy based approach to security for the Semantic Web. In: Fensel, D., Sycara, K.P., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 402–418. Springer, Heidelberg (2003)
Kaushik, S., Wijesekera, D., Ammann, P.: Policy-based dissemination of partial web-ontologies. In: Proceedings of the 2005 Workshop on Secure Web Services (2005)
Javanmardi, S., Amini, M., Jalili, R.: An access control model for protecting Semantic Web resources. In: Proceedings of the 2nd International Semantic Web Policy Workshop, Athens, GA (2006)
Jain, A., Farkas, C.: Secure resource description framework: An access control model. In: Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, Lake Tahoe, California, USA (2006)
Jeong, D., Jing, Y., Baik, D.-K.: Access control model based on RDB security policy for OWL ontology. In: Shi, Y., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2007. LNCS, vol. 4488, pp. 720–727. Springer, Heidelberg (2007)
Jajodia, S., Samarati, P., Sapino, M.L., Subrahmaninan, V.S.: Flexible support for multiple access control policies. ACM Transactions on Database Systems 26(2), 214–260 (2001)
Li, Q., Atluri, V.: Concept-level access control for the Semantic Web. In: Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, Virginia (2003)
Lakshmanan, V.S.L., Wang, H., Zhao, Z.: Answering tree pattern queries using views. In: Proceedings of the 32nd International Conference on Very Large Databases, Seoul, Korea, pp. 571–582 (2006)
Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: Proceedings of 2004 ACM SIGMOD International Conference on Management of Data, Paris, France (2004)
World Wide Web Consortium. Semantic Web, http://www.w3.org/2001/sw/
World Wide Web. RDF Vocabulary Description Language 1.0: RDF Schema (December 2003), http://www.w3.org/TR/rdf-schema/
World Wide Web Consortium. OWL Web Ontology Language Overview (December 2003), http://www.w3.org/TR/owl-features/
Abel, F., Coi, J., Henze, N., Koesling, A.W., Krause, D., Olmedilla, D.: Enabling advanced and context-dependent access control in RDF Stores. In: Aberer, K., Choi, K.-S., Noy, N., Allemang, D., Lee, K.-I., Nixon, L., Golbeck, J., Mika, P., Maynard, D., Mizoguchi, R., Schreiber, G., Cudré-Mauroux, P. (eds.) ASWC 2007 and ISWC 2007. LNCS, vol. 4825, pp. 1–14. Springer, Heidelberg (2007)
Broekstra, J., Kampman, A., van Harmelen, F.: Sesame: A generic architecture for storing and querying RDF and RDF Schema. In: Horrocks, I., Hendler, J. (eds.) ISWC 2002. LNCS, vol. 2342, pp. 54–68. Springer, Heidelberg (2002)
Wilkinson, K., Sayers, C., Kuno, H., Reynolds, D.: Efficient RDF storage and retrieval in Jena2. In: Proceeding of the 1st International Workshop on Semantic Web and Databases, Berlin (2003)
Heflin, J., Hendler, J., and Luke, S.: SHOE: A knowledge representation language for internet applications. Technical Report CS-TR-4078 (UMIACS TR-99-71), Dept. of Computer Science, University of Maryland at College Park (1999)
Damiani, E., De Capitani di Vimercati, S., Fugazza, C., Samarati, P.: Extending policy languages to the Semantic Web. In: Koch, N., Fraternali, P., Wirsing, M. (eds.) ICWE 2004. LNCS, vol. 3140, pp. 330–343. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, J., Cheung, W.K. (2008). Query Rewriting for Access Control on Semantic Web. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2008. Lecture Notes in Computer Science, vol 5159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85259-9_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-85259-9_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85258-2
Online ISBN: 978-3-540-85259-9
eBook Packages: Computer ScienceComputer Science (R0)