Kee** Secrets in \(\mathcal {EL}^{+}\) Knowledge Bases

  • Conference paper
  • First Online:
Agents and Artificial Intelligence (ICAART 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10162))

Included in the following conference series:

  • 802 Accesses

Abstract

In this paper we study Secrecy-Preserving Query Answering problem under Open World Assumption (OWA) for \(\mathcal {EL}^+\) Knowledge Bases (KBs). First we compute some consequences of ABox (\(\mathcal {A}\)) and TBox (\(\mathcal {T}\)) denoted by \(\mathcal {A}^*\) and \(\mathcal {T}^*\) respectively. A secrecy set of a querying agent is subset \(\mathbb {S}\) of \(\mathcal {A}^*\cup \mathcal {T}^*\) which the agent is not allowed to access. Next we compute envelopes which provide logical protection to the secrecy set against the reasoning of the querying agent. Once envelopes are computed, they are used to efficiently answer assertional and GCI queries without compromising the secret information in \(\mathbb {S}\). When the querying agent asks a query q, the reasoner answers “Yes” if KB \(\models q\) and q does not belong to the envelopes; otherwise, the reasoner answers “Unknown”. Being able to answer “Unknown” plays a key role in protecting secrecy under OWA. Since we are not computing all the consequences of the KB, answers to the queries based on just \(\mathcal {A}^*\) and \(\mathcal {T}^*\) could be erroneous. To fix this problem, we further augment our algorithms to make the query answering procedure foolproof.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 42.79
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 53.49
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    \(r^\mathcal {I} \circ s^\mathcal {I}\) denotes composition of two binary relations \(r^\mathcal {I}\) and \(s^\mathcal {I}\).

References

  1. Baader, F., Lutz, C., Suntisrivaraporn, B.: Efficient reasoning in EL. In: 2006 International Workshop on Description Logics DL 2006, pp. 15–26 (2006)

    Google Scholar 

  2. Baader, F., Brandt, S., Lutz, C.: Pushing the EL envelope. In: IJCAI, vol. 5, pp. 364–369

    Google Scholar 

  3. Baader, F.: Terminological cycles in a description logic with existential restrictions. In: IJCAI, vol. 3, pp. 325–330 (2003)

    Google Scholar 

  4. Bao, J., Slutzki, G., Honavar, V.: Privacy-preserving reasoning on the semantic web. In: Web Intelligence, pp. 791–797. IEEE Computer Society (2007)

    Google Scholar 

  5. Biskup, J., Weibert, T.: Kee** secrets in incomplete databases. Int. J. Inf. Secur. 7(3), 199–217 (2008)

    Article  Google Scholar 

  6. Biskup, J., Tadros, C.: Revising belief without revealing secrets. In: Lukasiewicz, T., Sali, A. (eds.) FoIKS 2012. LNCS, vol. 7153, pp. 51–70. Springer, Heidelberg (2012). doi:10.1007/978-3-642-28472-4_4

    Chapter  Google Scholar 

  7. Delaitre, V., Kazakov, Y.: Classifying ELH ontologies in SQL databases. In: OWLED (2009)

    Google Scholar 

  8. Lutz, C., Toman, D., Wolter, F.: Conjunctive query answering in \(\cal{EL}\) using a database system. In: OWLED (2008)

    Google Scholar 

  9. Lutz, C., Toman, D., Wolter, F.: Conjunctive query answering in the description logic EL using a relational database system. In: IJCAI, vol. 9, pp. 2070–2075 (2009)

    Google Scholar 

  10. Cuenca Grau, B., Kharlamov, E., Kostylev, E.V., Zheleznyakov, D.: Controlled query evaluation over OWL 2 RL ontologies. In: Alani, H., et al. (eds.) ISWC 2013. LNCS, vol. 8218, pp. 49–65. Springer, Heidelberg (2013). doi:10.1007/978-3-642-41335-3_4

    Chapter  Google Scholar 

  11. Kagal, L., Finin, T., Joshi, A.: A policy based approach to security for the semantic web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 402–418. Springer, Heidelberg (2003). doi:10.1007/978-3-540-39718-2_26

    Chapter  Google Scholar 

  12. Kazakov, Y., Krotzsch, M., Simancik, F.: The incredible ELK. J. Autom. Reason. 53(1), 1–61 (2014)

    Article  MATH  Google Scholar 

  13. Knechtel, M., Hladik, J., Dau, F.: Using OWL DL reasoning to decide about authorization in RBAC. In: OWLED (2008)

    Google Scholar 

  14. Krishnasamy Sivaprakasam, G., Slutzki, G.: Secrecy-preserving query answering in ELH knowledge bases. In: Proceedings of 8th International Conference on Agents and Artificial Intelligence (2016)

    Google Scholar 

  15. Tao, J., Slutzki, G., Honavar, V.: Secrecy-preserving query answering for instance checking in \(\cal{EL}\). In: Proceedings of 4th International Conference on Web Reasoning and Rule Systems, pp. 195–203 (2010)

    Google Scholar 

  16. Tao, J., Slutzki, G., Honavar, V.: A conceptual framework for secrecy-preserving reasoning in knowledge bases. TOCL 16(1), 3:1–3:32 (2014)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gopalakrishnan Krishnasamy Sivaprakasam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Krishnasamy Sivaprakasam, G., Slutzki, G. (2017). Kee** Secrets in \(\mathcal {EL}^{+}\) Knowledge Bases. In: van den Herik, J., Filipe, J. (eds) Agents and Artificial Intelligence. ICAART 2016. Lecture Notes in Computer Science(), vol 10162. Springer, Cham. https://doi.org/10.1007/978-3-319-53354-4_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-53354-4_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-53353-7

  • Online ISBN: 978-3-319-53354-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation