computing compliant anonymisations of quantified aboxes w
play

Computing Compliant Anonymisations of Quantified ABoxes w.r.t. EL - PowerPoint PPT Presentation

Computing Compliant Anonymisations of Quantified ABoxes w.r.t. EL Policies Franz Baader 1 Francesco Kriegel 1 Adrian Nuradiansyah 1 Rafael Pealoza 2 1 Technische Universitt Dresden 2 University of Milano-Bicocca November 4 th , 2020 November 4


  1. Computing Compliant Anonymisations of Quantified ABoxes w.r.t. EL Policies Franz Baader 1 Francesco Kriegel 1 Adrian Nuradiansyah 1 Rafael Peñaloza 2 1 Technische Universität Dresden 2 University of Milano-Bicocca November 4 th , 2020 November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 1 / 11

  2. An Illustration of Non-Compliance not compliant Dataset Privacy policy November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 2 / 11

  3. An Illustration of Non-Compliance not compliant Dataset Privacy policy Dataset: ∃{ x } . { Politician ( d ) , Businessman ( d ) , related ( d , x ) , Politician ( x ) , Businessman ( x ) } Policy: { Politician ⊓ Businessman , ∃ r . ( Politician ⊓ Businessman ) } The individual d is an instance of both concepts w.r.t. the dataset ⇒ not compliant! November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 2 / 11

  4. An Illustration of Non-Compliance not compliant anonymised compliant Dataset Anonymised Privacy dataset policy November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 2 / 11

  5. An Illustration of Non-Compliance not compliant anonymised compliant Dataset Anonymised (being Privacy dataset optimal!) policy preserves information as much as possible November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 2 / 11

  6. An Illustration of Non-Compliance not compliant anonymised compliant Dataset Anonymised (being Privacy dataset optimal!) policy preserves information as much as possible Question: How to anonymise a dataset in a minimal way s.t. all the published information follows from the original one , but privacy constraints are satisfied ? November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 2 / 11

  7. An Illustration of Non-Compliance not compliant anonymised compliant Dataset Anonymised (being Privacy dataset optimal!) policy preserves information as much as possible Question: How to anonymise a dataset in a minimal way s.t. all the published information follows from the original one , but privacy constraints are satisfied ? Assumption: Our problem will be considered in the context of Description Logic (DL) ontologies November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 2 / 11

  8. How Our Dataset Looks Like A quantified ABox ∃ X . A ∃{ x } . { Politician ( d ) , Businessman ( d ) , related ( d , x ) , Politician ( x ) , Businessman ( x ) } is built over a set X of variables , e.g., x , x 1 , x 2 , . . . a set of individual names, e.g., d , d 1 , d 2 , . . . a set of concept names , e.g., Politician , Businessman , P , B , . . . a set of role names , e.g., related , r , s November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 3 / 11

  9. How Our Dataset Looks Like A quantified ABox ∃ X . A ∃{ x } . { Politician ( d ) , Businessman ( d ) , related ( d , x ) , Politician ( x ) , Businessman ( x ) } is built over a set X of variables , e.g., x , x 1 , x 2 , . . . a set of individual names, e.g., d , d 1 , d 2 , . . . a set of concept names , e.g., Politician , Businessman , P , B , . . . a set of role names , e.g., related , r , s and A , in general, consists of: concept assertions , e.g., Politician ( d ) , Businessman ( x ) , . . . role assertions , e.g., related ( d , x ) , . . . Note: A traditional DL ABox is a quantified ABox where X is empty. November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 3 / 11

  10. How Our Dataset Looks Like A quantified ABox ∃ X . A ∃{ x } . { Politician ( d ) , Businessman ( d ) , related ( d , x ) , Politician ( x ) , Businessman ( x ) } Entailment between Quantified ABoxes ∃ X . A | = ∃ Y . B denotes that ∃ X . A entails ∃ Y . B The entailment problem between quantified ABoxes is NP-complete November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 3 / 11

  11. How the Policy Looks Like A policy P is a finite set of EL concepts { Politician ⊓ Businessman , ∃ r . ( Politician ⊓ Businessman ) } It has the following components: Atoms ( P ) = { Politician , Businessman , ∃ r . ( Politician ⊓ Businessman ) } Let P 1 be the first concept in P Conj ( P 1 ) = { Politician , Businessman } occurs in the top-level conjunction of P 1 November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 4 / 11

  12. How the Policy Looks Like A policy P is a finite set of EL concepts { Politician ⊓ Businessman , ∃ r . ( Politician ⊓ Businessman ) } It has the following components: Atoms ( P ) = { Politician , Businessman , ∃ r . ( Politician ⊓ Businessman ) } Let P 1 be the first concept in P Conj ( P 1 ) = { Politician , Businessman } occurs in the top-level conjunction of P 1 Reasoning Problems in EL C ⊑ ∅ D means that the EL concept C is subsumed by the EL concept D ∃ X . A | = C ( a ) means that the individual a is an instance of the EL concept C w.r.t. ∃ X . A Both subsumption and instance relationships can be checked in polynomial time for EL November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 4 / 11

  13. Optimal Compliant Anonymisations A quantified ABox ∃ Y . B is an optimal P -compliant anonymisation of ∃ X . A iff ∃ Y . B �| = P ( a ) for all P ∈ P and all individuals a ( compliance ) ∃ X . A | = ∃ Y . B ( anonymisation ) there is no P -compliant anonymisation ∃ Z . C of ∃ X . A that stricly entails ∃ Y . B ( optimal ) November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 5 / 11

  14. How to Make an ABox Compliant Non-compliance means that there exist an individual a and P ∈ P s.t. a is an instance of all atoms in Conj ( P ) w.r.t. ∃ X . A . November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 6 / 11

  15. How to Make an ABox Compliant Non-compliance means that there exist an individual a and P ∈ P s.t. a is an instance of all atoms in Conj ( P ) w.r.t. ∃ X . A . ⇒ To make the ABox compliant, choose one atom C from Conj ( P ) such that a will not be an instance of C in the resulting anonymisation This idea is represented by the use of a compliance seed function November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 6 / 11

  16. How to Make an ABox Compliant Non-compliance means that there exist an individual a and P ∈ P s.t. a is an instance of all atoms in Conj ( P ) w.r.t. ∃ X . A . ⇒ To make the ABox compliant, choose one atom C from Conj ( P ) such that a will not be an instance of C in the resulting anonymisation This idea is represented by the use of a compliance seed function A compliance seed function (csf) s on ∃ X . A for P maps each individual name a to a subset of Atoms ( P ) such that for each P ∈ P , there is C ∈ s ( a ) such that C ∈ Conj ( P ) ∃ X . A = ∃{ x } . { P ( d ) , B ( d ) , r ( d , x ) , P ( x ) , B ( x ) } P = { P ⊓ B , ∃ r . ( P ⊓ B ) } Mapping d to s ( d ) = { B , ∃ r . ( P ⊓ B ) } yields a csf November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 6 / 11

  17. Computing a Compliant Anonymisation From a given csf s , we can compute a compliant anonymisation with the following idea: ∃ X . A = ∃{ x } . { P ( d ) , B ( d ) , r ( d , x ) , P ( x ) , B ( x ) } P = { P ⊓ B , ∃ r . ( P ⊓ B ) } November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 7 / 11

  18. Computing a Compliant Anonymisation From a given csf s , we can compute a compliant anonymisation with the following idea: ∃ X . A = ∃{ x } . { P ( d ) , B ( d ) , r ( d , x ) , P ( x ) , B ( x ) } P = { P ⊓ B , ∃ r . ( P ⊓ B ) } 1. Copy operation : select a variable/an individual, copy this object, and duplicate assertions involving it November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 7 / 11

  19. Computing a Compliant Anonymisation From a given csf s , we can compute a compliant anonymisation with the following idea: ∃ X . A = ∃{ x } . { P ( d ) , B ( d ) , r ( d , x ) , P ( x ) , B ( x ) } P = { P ⊓ B , ∃ r . ( P ⊓ B ) } 1. Copy operation : select a variable/an individual, copy this object, and duplicate assertions involving it e.g., ( select d and make the copy y d ) ∃{ x , y d } . { P ( d ) , B ( d ) , r ( d , x ) , P ( x ) , B ( x ) , P ( y d ) , B ( y d ) , r ( y d , x ) } November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 7 / 11

  20. Computing a Compliant Anonymisation From a given csf s , we can compute a compliant anonymisation with the following idea: ∃ X . A = ∃{ x } . { P ( d ) , B ( d ) , r ( d , x ) , P ( x ) , B ( x ) } P = { P ⊓ B , ∃ r . ( P ⊓ B ) } 1. Copy operation : select a variable/an individual, copy this object, and duplicate assertions involving it e.g., ( select x and make the copy y x ) ∃{ x , y d , y x } . { P ( d ) , B ( d ) , r ( d , x ) , P ( x ) , B ( x ) , P ( y d ) , B ( y d ) , r ( y d , x ) , r ( d , y x ) , r ( y d , y x ) , P ( y x ) , B ( y x ) } November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 7 / 11

  21. Computing a Compliant Anonymisation From a given csf s , we can compute a compliant anonymisation with the following idea: ∃ X . A = ∃{ x } . { P ( d ) , B ( d ) , r ( d , x ) , P ( x ) , B ( x ) } P = { P ⊓ B , ∃ r . ( P ⊓ B ) } 1. Copy operation : select a variable/an individual, copy this object, and duplicate assertions involving it ∃{ x , y d , y x } . { P ( d ) , B ( d ) , r ( d , x ) , P ( x ) , B ( x ) , P ( y d ) , B ( y d ) , r ( y d , x ) , r ( d , y x ) , r ( y d , y x ) , P ( y x ) , B ( y x ) } Note: It suffices to create at most exponentially many copies of each object! November 4 th , 2020 Computing Compliant Anonymisations ISWC 2020 7 / 11

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend