Abstract
In this paper we study Secrecy-Preserving Query Answering problem under Open World Assumption (OWA) for \(\mathcal {EL}^+\) Knowledge Bases (KBs). First we compute some consequences of ABox (\(\mathcal {A}\)) and TBox (\(\mathcal {T}\)) denoted by \(\mathcal {A}^*\) and \(\mathcal {T}^*\) respectively. A secrecy set of a querying agent is subset \(\mathbb {S}\) of \(\mathcal {A}^*\cup \mathcal {T}^*\) which the agent is not allowed to access. Next we compute envelopes which provide logical protection to the secrecy set against the reasoning of the querying agent. Once envelopes are computed, they are used to efficiently answer assertional and GCI queries without compromising the secret information in \(\mathbb {S}\). When the querying agent asks a query q, the reasoner answers “Yes” if KB \(\models q\) and q does not belong to the envelopes; otherwise, the reasoner answers “Unknown”. Being able to answer “Unknown” plays a key role in protecting secrecy under OWA. Since we are not computing all the consequences of the KB, answers to the queries based on just \(\mathcal {A}^*\) and \(\mathcal {T}^*\) could be erroneous. To fix this problem, we further augment our algorithms to make the query answering procedure foolproof.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
\(r^\mathcal {I} \circ s^\mathcal {I}\) denotes composition of two binary relations \(r^\mathcal {I}\) and \(s^\mathcal {I}\).
References
Baader, F., Lutz, C., Suntisrivaraporn, B.: Efficient reasoning in EL. In: 2006 International Workshop on Description Logics DL 2006, pp. 15–26 (2006)
Baader, F., Brandt, S., Lutz, C.: Pushing the EL envelope. In: IJCAI, vol. 5, pp. 364–369
Baader, F.: Terminological cycles in a description logic with existential restrictions. In: IJCAI, vol. 3, pp. 325–330 (2003)
Bao, J., Slutzki, G., Honavar, V.: Privacy-preserving reasoning on the semantic web. In: Web Intelligence, pp. 791–797. IEEE Computer Society (2007)
Biskup, J., Weibert, T.: Kee** secrets in incomplete databases. Int. J. Inf. Secur. 7(3), 199–217 (2008)
Biskup, J., Tadros, C.: Revising belief without revealing secrets. In: Lukasiewicz, T., Sali, A. (eds.) FoIKS 2012. LNCS, vol. 7153, pp. 51–70. Springer, Heidelberg (2012). doi:10.1007/978-3-642-28472-4_4
Delaitre, V., Kazakov, Y.: Classifying ELH ontologies in SQL databases. In: OWLED (2009)
Lutz, C., Toman, D., Wolter, F.: Conjunctive query answering in \(\cal{EL}\) using a database system. In: OWLED (2008)
Lutz, C., Toman, D., Wolter, F.: Conjunctive query answering in the description logic EL using a relational database system. In: IJCAI, vol. 9, pp. 2070–2075 (2009)
Cuenca Grau, B., Kharlamov, E., Kostylev, E.V., Zheleznyakov, D.: Controlled query evaluation over OWL 2 RL ontologies. In: Alani, H., et al. (eds.) ISWC 2013. LNCS, vol. 8218, pp. 49–65. Springer, Heidelberg (2013). doi:10.1007/978-3-642-41335-3_4
Kagal, L., Finin, T., Joshi, A.: A policy based approach to security for the semantic web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 402–418. Springer, Heidelberg (2003). doi:10.1007/978-3-540-39718-2_26
Kazakov, Y., Krotzsch, M., Simancik, F.: The incredible ELK. J. Autom. Reason. 53(1), 1–61 (2014)
Knechtel, M., Hladik, J., Dau, F.: Using OWL DL reasoning to decide about authorization in RBAC. In: OWLED (2008)
Krishnasamy Sivaprakasam, G., Slutzki, G.: Secrecy-preserving query answering in ELH knowledge bases. In: Proceedings of 8th International Conference on Agents and Artificial Intelligence (2016)
Tao, J., Slutzki, G., Honavar, V.: Secrecy-preserving query answering for instance checking in \(\cal{EL}\). In: Proceedings of 4th International Conference on Web Reasoning and Rule Systems, pp. 195–203 (2010)
Tao, J., Slutzki, G., Honavar, V.: A conceptual framework for secrecy-preserving reasoning in knowledge bases. TOCL 16(1), 3:1–3:32 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Krishnasamy Sivaprakasam, G., Slutzki, G. (2017). Kee** Secrets in \(\mathcal {EL}^{+}\) Knowledge Bases. In: van den Herik, J., Filipe, J. (eds) Agents and Artificial Intelligence. ICAART 2016. Lecture Notes in Computer Science(), vol 10162. Springer, Cham. https://doi.org/10.1007/978-3-319-53354-4_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-53354-4_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-53353-7
Online ISBN: 978-3-319-53354-4
eBook Packages: Computer ScienceComputer Science (R0)