Abstract
A third-party trading platform is a web based system that provides services for sellers and buyers. On such platform, users are required to provide personal information to ensure the authenticity and undeniability of a transaction. In this paper, we propose an ontology based privacy protection model for third-party platform, which allows buyers and sellers to define privacy policies according to their preferences and converts policies into ontology based forms. We introduce the property of good sellers who require the minimal information from buyers while satisfying other trading requirements. The proposed policy matching algorithm finds such sellers as candidates for a buyer request. A practical example is given to illustrate our model.
Chapter PDF
References
Denker, G., Kagal, L., Finin, T.: Security in Semantic Web using OWL. Information Security Technical Report 10, 51–58 (2005)
Aumueller, D., Do, H.H., Massmann, S., Rahm, E.: Schema and Ontology Matching with COMA++. In: Proceedings of the 5th ACM SIGMOD International Conference on Management of Data, New York, pp. 906–908 (2005)
Bonatti, P.A., Faella, M., Galdi, C., Sauro, L.: Towards a Mechanism for Incentivating Privacy. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 472–488. Springer, Heidelberg (2011)
Fenz, S.: An Ontology-and Bayesian-based Approach for Determining Threat Probabilities. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, New York, pp. 344–354 (2005)
Hecker, M., Dillon, T.S., Chang, E.: Privacy Ontology Support for E-Commerce. In: Proceeding of IEEE Computer Society 2008, Internet Computing, pp. 54–61 (2008)
Garcia, D.Z., Toledo, M.B.: A Web Service Privacy Framework Based on a Policy Approach Enhanced with Ontologies. In: Proceedings of the 11th IEEE International Conference on Computational Science and Engineering, San Paulo, pp. 209–214 (2008)
Tumer, A., Dogac, A., Toroslu, I.H.: A Semantic-Based User Privacy Protection Framework for Web Services. In: Mobasher, B., Anand, S.S. (eds.) ITWP 2003. LNCS (LNAI), vol. 3169, pp. 289–305. Springer, Heidelberg (2005)
Gao, F., He, J., Peng, S.: An Approach for Privacy Protection Based-on Ontology. In: Proceedings of 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, Hubei, pp. 397–400 (2010)
Carminati, B., Ferrari, E., Heatherly, R.: A Semantic Web Based Framework for Social Network Access Control. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, New York, pp. 177–186 (2009)
Masoumzadeh, A., Joshi, J.: OSNAC: An Ontology-Based Access Control Model for Social Networking Systems. In: Proceedings of IEEE International Conference on Social Computing, Minneapolis, MN, pp. 751–759 (2010)
Qian, J.A., Jiang, X.H., Sun, T.F.: Privacy Ontology-based Personalized Access Control Model. Information Security and Communications Privacy 2, 67–73 (2011)
Lan, L.H., Ju, S.G., Liu, S.C.: Survey of study on privacy preserving data publishing. Application Research of Computers 27, 2822–2827 (2010)
Hu, Y.J., Wu, W.N., Cheng, D.R.: Towards law-aware semantic cloud policies with exceptions for data integration and protection. In: Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yu, H., Sun, Y., Hu, J. (2012). An Ontology Based Privacy Protection Model for Third-Party Platform. In: Huang, R., Ghorbani, A.A., Pasi, G., Yamaguchi, T., Yen, N.Y., Jin, B. (eds) Active Media Technology. AMT 2012. Lecture Notes in Computer Science, vol 7669. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35236-2_37
Download citation
DOI: https://doi.org/10.1007/978-3-642-35236-2_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35235-5
Online ISBN: 978-3-642-35236-2
eBook Packages: Computer ScienceComputer Science (R0)