Abstract
The cloud computing platform provides utility computing allowing people to have convenient and flexible information sharing services on the web. We investigate the inter-disciplinary area of information technology and law and use semantics-enabled policies for modeling legal regulations in the cloud. The semantics-enabled policies of information sharing and protection are represented as a combination of ontologies and rules to capture the concept of security and privacy laws. Ontologies are abstract knowledge representations of information sharing and protection which extracted manually from the data sharing and protection laws. Rules provide further enforcement power after ontologies have been constructed. The emerging challenges of legalizing semantics-enabled policies for laws in the cloud include mitigating the gap between semantics-enabled policy and laws to avoid any ambiguity in the policy representation, and resolving possible conflicts among policies when they are required to integrate the laws from multiple jurisdictions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bruening, J.P., Treacy, B.C.: Cloud computing: privacy, security challenges. Privacy & Security Law Report (2009)
Takabi, H., et al.: Security and privacy challenges in cloud computing environments. IEEE Seurity & Privacy 8, 24–31 (2010)
Antón, I.A., et al.: A roadmap for comprehensive online for privacy policy management. Comm. of the ACM 50, 109–116 (2007)
Vimercati, S.D.C.d., et al.: Second research report on next generation policies, project deliverable D5.2.2. Technical report, PrimeLife (2010)
Ardagna, A.C., et al.: A privacy-aware access control system. Journal of Computer Security 16, 369–397 (2008)
Karjoth, G., et al.: Translating privacy practices into privacy promises - how to promise what you can keep. In: POLICY 2003. IEEE, Los Alamitos (2003)
Hu, Y.J., Yang, J.J.: A semantic privacy-preserving model for data sharing and integration. In: International Conference on Web Intelligence, Mining and Semantics (WIMS 2011). ACM, Norway (2011)
Cabuk, S., et al.: Towards automated security policy enforcement in multi-tenant virtual data centers. Journal of Computer Security 18, 89–121 (2010)
Popp, R., Poindexter, J.: Countering terrorism through information and privacy protection technologies. IEEE Seurity & Privacy 4, 24–33 (2006)
Kettler, B., et al.: Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies. In: Popp, L.R., Yen, J. (eds.) Emergent Information Technologies and Enabling Policies for Counter-Terrorism, pp. 175–195. Wiley, Chichester (2005)
Buchanan, W., et al.: Interagency data exchange protocols as computational data protection law. In: Legal Knowledge and Information Systems - JURIX, pp. 143–146. IOS Press, Amsterdam (2010)
Bonatti, P., Olmedilla, D.: Policy language specification, enforcement, and integration. project deliverable D2, working group I2. Technical report, REWERSE (2005)
Gruber, T.R.: A translation approach to portable ontology specifications. Knowledge Acquisition 5 (1993)
Kagal, L., et al.: Using semantic web technologies for policy management on the web. In: 21st National Conference on Artificial Intelligence (AAAI). AAAI, Menlo Park (2006)
Tonti, G., Bradshaw, J.M., Jeffers, R., Montanari, R., Suri, N., Uszok, A.: Semantic web languages for policy representation and reasoning: A comparison of kAoS, Rei, and Ponder. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 419–437. Springer, Heidelberg (2003)
Hu, Y.J., Boley, H.: SemPIF: A semantic meta-policy interchange format for multiple web policies. In: 2010 IEEE/WIC/ACM Int. Conference on Web Intelligence and Intelligent Agent Technology, pp. 302–307. IEEE, Los Alamitos (2010)
Hosmer, H.H.: Metapolicies I. ACM SIGSAC Review 10, 18–43 (1992)
Berger, S., et al.: Security for the cloud infrastructure: Trusted virtual data center implementation. IBM Journal of Research and Development, 6:1–6:12 (2009)
Clifton, C., et al.: Privacy-preserving data integration and sharing. In: Data Mining and Knowledge Discovery, pp. 19–26. ACM, New York (2004)
Calvanese, D., Giacomo, G.D.: Data integration: A logic-based perspective. AI Magazine 26, 59–70 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hu, YJ., Wu, WN., Yang, JJ. (2011). Semantics-Enabled Policies for Information Sharing and Protection in the Cloud. In: Datta, A., Shulman, S., Zheng, B., Lin, SD., Sun, A., Lim, EP. (eds) Social Informatics. SocInfo 2011. Lecture Notes in Computer Science, vol 6984. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24704-0_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-24704-0_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24703-3
Online ISBN: 978-3-642-24704-0
eBook Packages: Computer ScienceComputer Science (R0)