skip to main content
10.1145/2613087.2613092acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

Towards fine grained RDF access control

Published:25 June 2014Publication History

ABSTRACT

The Semantic Web is envisioned as the future of the current web, where the information is enriched with machine understandable semantics. According to the World Wide Web Consortium (W3C), "The Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries". Among the various technologies that empower Semantic Web, the most significant ones are Resource Description Framework (RDF) and SPARQL, which facilitate data integration and a means to query respectively. Although Semantic Web is elegantly and effectively equipped for data sharing and integration via RDF, lack of efficient means to securely share data pose limitations in practice. In order to make data sharing and integration pragmatic for Semantic Web, we present a query language based secure data sharing mechanism. We extend SPARQL with a new query form called SANITIZE which comprises a set of sanitization operations that are used to sanitize or mask sensitive data within an RDF graph. The sanitization operations can be further leveraged towards RDF access control and anonymization, thus enabling secure sharing of RDF data.

References

  1. S. Chaudhuri, R. Kaushik, and R. Ramamurthy. Database Access Control and Privacy: Is there a common ground? In CIDR, 2011.Google ScholarGoogle Scholar
  2. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-Based Access Control Models. Computer, 29(2):38--47, February 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies. ACM Trans. Database Syst., 26(2), 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Bishop. Introduction to Computer Security. Addison-Wesley Professional, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. L. Sweeney. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05):557--570, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Dwork. Differential privacy. Automata, languages and programming, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Oracle. Fine-Grained Access Control for RDF Data. http://goo.gl/WJSNB.Google ScholarGoogle Scholar
  8. L. Kagal, T. W. Finin, and A. Joshi. A Policy Based Approach to Security for the Semantic Web. In ISWC, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. T. W. Finin, A. Joshi, L. Kagal, J. Niu, R. S. Sandhu, W. H. Winsborough, and B. M. Thuraisingham. R OWL BAC: Representing Role Based Access Control in OWL. In SACMAT, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Hollenbach, J. Presbrey, and T. Berners-Lee. Using RDF Metadata To Enable Access Control on the Social Semantic Web. In CK2009, volume 514, 2009.Google ScholarGoogle Scholar
  11. B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu, and B. Thuraisingham. A semantic web based framework for social network access control. In SACMAT, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. H. Garlik, A. Seaborne, and E. Prud'hommeaux. SPARQL 1.1 Query Language. http://www.w3.org/TR/sparql11-query/.Google ScholarGoogle Scholar
  13. O. Lassila, R. R. Swick, and World Wide Web Consortium. Resource Description Framework (RDF) Model and Syntax Specification, 1998.Google ScholarGoogle Scholar
  14. L. Moreau, B. Clifford, and J. Freire et. al. The Open Provenance Model core specification (v1.1). Future Generation Computer Systems (FGCS), 27, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. O. Hartig and J. Zhao. Provenance Vocabulary Core Ontology Specification, 2010.Google ScholarGoogle Scholar
  16. J. Péerez, M. Arenas, and C. Gutierrez. Semantics and Complexity of SPARQL. In ISWC, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Arenas, S. Conca, and J. Pérez. Counting beyond a Yottabyte, or how SPARQL 1.1 property paths will prevent adoption of the standard. In WWW, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. D. A. Schmidt. Denotational semantics: A methodology for language development. William C. Brown Publishers, Dubuque, IA, USA, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. T. Cadenhead, V. Khadilkar, M. Kantarcioglu, and B. Thuraisingham. A Language for Provenance Access Control. In CODASPY. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Bishop, J. Cummins, S. Peisert, A. Singh, B. Bhumiratana, and D. A. Agarwal. Relationships and Data Sanitization: A Study in Scarlet. In NSPW, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. R. Horne, V. Sassone, and N. Gibbins. Operational Semantics for SPARQL Update. In JIST, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. T. Cadenhead, V. Khadilkar, M. Kantarcioglu, and B. Thuraisingham. Transforming Provenance using Redaction. In SACMAT, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards fine grained RDF access control

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SACMAT '14: Proceedings of the 19th ACM symposium on Access control models and technologies
          June 2014
          234 pages
          ISBN:9781450329392
          DOI:10.1145/2613087

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 25 June 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          SACMAT '14 Paper Acceptance Rate17of58submissions,29%Overall Acceptance Rate177of597submissions,30%

          Upcoming Conference

          SACMAT 2024

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader