Skip to main content

Semantics-Enabled Policies for Information Sharing and Protection in the Cloud

  • Conference paper
Social Informatics (SocInfo 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6984))

Included in the following conference series:

Abstract

The cloud computing platform provides utility computing allowing people to have convenient and flexible information sharing services on the web. We investigate the inter-disciplinary area of information technology and law and use semantics-enabled policies for modeling legal regulations in the cloud. The semantics-enabled policies of information sharing and protection are represented as a combination of ontologies and rules to capture the concept of security and privacy laws. Ontologies are abstract knowledge representations of information sharing and protection which extracted manually from the data sharing and protection laws. Rules provide further enforcement power after ontologies have been constructed. The emerging challenges of legalizing semantics-enabled policies for laws in the cloud include mitigating the gap between semantics-enabled policy and laws to avoid any ambiguity in the policy representation, and resolving possible conflicts among policies when they are required to integrate the laws from multiple jurisdictions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bruening, J.P., Treacy, B.C.: Cloud computing: privacy, security challenges. Privacy & Security Law Report (2009)

    Google Scholar 

  2. Takabi, H., et al.: Security and privacy challenges in cloud computing environments. IEEE Seurity & Privacy 8, 24–31 (2010)

    Article  Google Scholar 

  3. Antón, I.A., et al.: A roadmap for comprehensive online for privacy policy management. Comm. of the ACM 50, 109–116 (2007)

    Article  Google Scholar 

  4. Vimercati, S.D.C.d., et al.: Second research report on next generation policies, project deliverable D5.2.2. Technical report, PrimeLife (2010)

    Google Scholar 

  5. Ardagna, A.C., et al.: A privacy-aware access control system. Journal of Computer Security 16, 369–397 (2008)

    Article  Google Scholar 

  6. Karjoth, G., et al.: Translating privacy practices into privacy promises - how to promise what you can keep. In: POLICY 2003. IEEE, Los Alamitos (2003)

    Google Scholar 

  7. Hu, Y.J., Yang, J.J.: A semantic privacy-preserving model for data sharing and integration. In: International Conference on Web Intelligence, Mining and Semantics (WIMS 2011). ACM, Norway (2011)

    Google Scholar 

  8. Cabuk, S., et al.: Towards automated security policy enforcement in multi-tenant virtual data centers. Journal of Computer Security 18, 89–121 (2010)

    Article  Google Scholar 

  9. Popp, R., Poindexter, J.: Countering terrorism through information and privacy protection technologies. IEEE Seurity & Privacy 4, 24–33 (2006)

    Article  Google Scholar 

  10. Kettler, B., et al.: Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies. In: Popp, L.R., Yen, J. (eds.) Emergent Information Technologies and Enabling Policies for Counter-Terrorism, pp. 175–195. Wiley, Chichester (2005)

    Google Scholar 

  11. Buchanan, W., et al.: Interagency data exchange protocols as computational data protection law. In: Legal Knowledge and Information Systems - JURIX, pp. 143–146. IOS Press, Amsterdam (2010)

    Google Scholar 

  12. Bonatti, P., Olmedilla, D.: Policy language specification, enforcement, and integration. project deliverable D2, working group I2. Technical report, REWERSE (2005)

    Google Scholar 

  13. Gruber, T.R.: A translation approach to portable ontology specifications. Knowledge Acquisition 5 (1993)

    Google Scholar 

  14. Kagal, L., et al.: Using semantic web technologies for policy management on the web. In: 21st National Conference on Artificial Intelligence (AAAI). AAAI, Menlo Park (2006)

    Google Scholar 

  15. Tonti, G., Bradshaw, J.M., Jeffers, R., Montanari, R., Suri, N., Uszok, A.: Semantic web languages for policy representation and reasoning: A comparison of kAoS, Rei, and Ponder. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 419–437. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  16. Hu, Y.J., Boley, H.: SemPIF: A semantic meta-policy interchange format for multiple web policies. In: 2010 IEEE/WIC/ACM Int. Conference on Web Intelligence and Intelligent Agent Technology, pp. 302–307. IEEE, Los Alamitos (2010)

    Chapter  Google Scholar 

  17. Hosmer, H.H.: Metapolicies I. ACM SIGSAC Review 10, 18–43 (1992)

    Article  Google Scholar 

  18. Berger, S., et al.: Security for the cloud infrastructure: Trusted virtual data center implementation. IBM Journal of Research and Development, 6:1–6:12 (2009)

    Google Scholar 

  19. Clifton, C., et al.: Privacy-preserving data integration and sharing. In: Data Mining and Knowledge Discovery, pp. 19–26. ACM, New York (2004)

    Google Scholar 

  20. Calvanese, D., Giacomo, G.D.: Data integration: A logic-based perspective. AI Magazine 26, 59–70 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hu, YJ., Wu, WN., Yang, JJ. (2011). Semantics-Enabled Policies for Information Sharing and Protection in the Cloud. In: Datta, A., Shulman, S., Zheng, B., Lin, SD., Sun, A., Lim, EP. (eds) Social Informatics. SocInfo 2011. Lecture Notes in Computer Science, vol 6984. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24704-0_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24704-0_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24703-3

  • Online ISBN: 978-3-642-24704-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics