Computing Compliant Anonymisations of Quantified ABoxes w.r.t. EL - - PowerPoint PPT Presentation

computing compliant anonymisations of quantified aboxes w
SMART_READER_LITE
LIVE PREVIEW

Computing Compliant Anonymisations of Quantified ABoxes w.r.t. EL - - PowerPoint PPT Presentation

Computing Compliant Anonymisations of Quantified ABoxes w.r.t. EL Policies Franz Baader 1 Francesco Kriegel 1 Adrian Nuradiansyah 1 Rafael Pealoza 2 1 Technische Universitt Dresden 2 University of Milano-Bicocca November 4 th , 2020 November 4


slide-1
SLIDE 1

Computing Compliant Anonymisations of Quantified ABoxes w.r.t. EL Policies

Franz Baader1 Francesco Kriegel1 Adrian Nuradiansyah1 Rafael Peñaloza2

1Technische Universität Dresden 2University of Milano-Bicocca

November 4th, 2020

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 1 / 11

slide-2
SLIDE 2

An Illustration of Non-Compliance

Dataset Privacy policy not compliant

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 2 / 11

slide-3
SLIDE 3

An Illustration of Non-Compliance

Dataset Privacy policy not compliant Dataset: ∃{x}.{Politician(d), Businessman(d), related(d, x), Politician(x), Businessman(x)} Policy: {Politician ⊓ Businessman, ∃r.(Politician ⊓ Businessman)} The individual d is an instance of both concepts w.r.t. the dataset ⇒ not compliant!

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 2 / 11

slide-4
SLIDE 4

An Illustration of Non-Compliance

Dataset Privacy policy not compliant Anonymised dataset anonymised compliant

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 2 / 11

slide-5
SLIDE 5

An Illustration of Non-Compliance

Dataset Privacy policy not compliant Anonymised dataset anonymised compliant (being

  • ptimal!)

preserves information as much as possible

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 2 / 11

slide-6
SLIDE 6

An Illustration of Non-Compliance

Dataset Privacy policy not compliant Anonymised dataset anonymised compliant (being

  • ptimal!)

preserves information as much as possible Question: How to anonymise a dataset in a minimal way s.t. all the published information follows from the original one, but privacy constraints are satisfied?

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 2 / 11

slide-7
SLIDE 7

An Illustration of Non-Compliance

Dataset Privacy policy not compliant Anonymised dataset anonymised compliant (being

  • ptimal!)

preserves information as much as possible Question: How to anonymise a dataset in a minimal way s.t. all the published information follows from the original one, but privacy constraints are satisfied? Assumption: Our problem will be considered in the context of Description Logic (DL) ontologies

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 2 / 11

slide-8
SLIDE 8

How Our Dataset Looks Like

A quantified ABox ∃X.A ∃{x}.{Politician(d), Businessman(d), related(d, x), Politician(x), Businessman(x)} is built over a set X of variables, e.g., x, x1, x2, . . . a set of individual names, e.g., d, d1, d2, . . . a set of concept names, e.g., Politician, Businessman, P, B, . . . a set of role names, e.g., related, r, s

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 3 / 11

slide-9
SLIDE 9

How Our Dataset Looks Like

A quantified ABox ∃X.A ∃{x}.{Politician(d), Businessman(d), related(d, x), Politician(x), Businessman(x)} is built over a set X of variables, e.g., x, x1, x2, . . . a set of individual names, e.g., d, d1, d2, . . . a set of concept names, e.g., Politician, Businessman, P, B, . . . a set of role names, e.g., related, r, s and A, in general, consists of: concept assertions, e.g., Politician(d), Businessman(x), . . . role assertions, e.g., related(d, x), . . . Note: A traditional DL ABox is a quantified ABox where X is empty.

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 3 / 11

slide-10
SLIDE 10

How Our Dataset Looks Like

A quantified ABox ∃X.A ∃{x}.{Politician(d), Businessman(d), related(d, x), Politician(x), Businessman(x)}

Entailment between Quantified ABoxes

∃X.A | = ∃Y .B denotes that ∃X.A entails ∃Y .B The entailment problem between quantified ABoxes is NP-complete

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 3 / 11

slide-11
SLIDE 11

How the Policy Looks Like

A policy P is a finite set of EL concepts {Politician ⊓ Businessman, ∃r.(Politician ⊓ Businessman)} It has the following components: Atoms(P) = {Politician, Businessman, ∃r.(Politician ⊓ Businessman)} Let P1 be the first concept in P Conj(P1) = {Politician, Businessman} occurs in the top-level conjunction

  • f P1

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 4 / 11

slide-12
SLIDE 12

How the Policy Looks Like

A policy P is a finite set of EL concepts {Politician ⊓ Businessman, ∃r.(Politician ⊓ Businessman)} It has the following components: Atoms(P) = {Politician, Businessman, ∃r.(Politician ⊓ Businessman)} Let P1 be the first concept in P Conj(P1) = {Politician, Businessman} occurs in the top-level conjunction

  • f P1

Reasoning Problems in EL

C ⊑∅ D means that the EL concept C is subsumed by the EL concept D ∃X.A | = C(a) means that the individual a is an instance of the EL concept C w.r.t. ∃X.A Both subsumption and instance relationships can be checked in polynomial time for EL

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 4 / 11

slide-13
SLIDE 13

Optimal Compliant Anonymisations

A quantified ABox ∃Y .B is an optimal P-compliant anonymisation

  • f ∃X.A iff

∃Y .B | = P(a) for all P ∈ P and all individuals a (compliance) ∃X.A | = ∃Y .B (anonymisation) there is no P-compliant anonymisation ∃Z.C of ∃X.A that stricly entails ∃Y .B (optimal)

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 5 / 11

slide-14
SLIDE 14

How to Make an ABox Compliant

Non-compliance means that there exist an individual a and P ∈ P s.t. a is an instance of all atoms in Conj(P) w.r.t. ∃X.A.

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 6 / 11

slide-15
SLIDE 15

How to Make an ABox Compliant

Non-compliance means that there exist an individual a and P ∈ P s.t. a is an instance of all atoms in Conj(P) w.r.t. ∃X.A. ⇒ To make the ABox compliant, choose one atom C from Conj(P) such that a will not be an instance of C in the resulting anonymisation This idea is represented by the use of a compliance seed function

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 6 / 11

slide-16
SLIDE 16

How to Make an ABox Compliant

Non-compliance means that there exist an individual a and P ∈ P s.t. a is an instance of all atoms in Conj(P) w.r.t. ∃X.A. ⇒ To make the ABox compliant, choose one atom C from Conj(P) such that a will not be an instance of C in the resulting anonymisation This idea is represented by the use of a compliance seed function A compliance seed function (csf) s on ∃X.A for P maps each individual name a to a subset of Atoms(P) such that for each P ∈ P, there is C ∈ s(a) such that C ∈ Conj(P) ∃X.A = ∃{x}.{P(d), B(d), r(d, x), P(x), B(x)} P = {P ⊓ B, ∃r.(P ⊓ B)} Mapping d to s(d) = {B, ∃r.(P ⊓ B)} yields a csf

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 6 / 11

slide-17
SLIDE 17

Computing a Compliant Anonymisation

From a given csf s, we can compute a compliant anonymisation with the following idea: ∃X.A = ∃{x}.{P(d), B(d), r(d, x), P(x), B(x)} P = {P ⊓ B, ∃r.(P ⊓ B)}

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 7 / 11

slide-18
SLIDE 18

Computing a Compliant Anonymisation

From a given csf s, we can compute a compliant anonymisation with the following idea: ∃X.A = ∃{x}.{P(d), B(d), r(d, x), P(x), B(x)} P = {P ⊓ B, ∃r.(P ⊓ B)}

  • 1. Copy operation: select a variable/an individual, copy this object, and

duplicate assertions involving it

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 7 / 11

slide-19
SLIDE 19

Computing a Compliant Anonymisation

From a given csf s, we can compute a compliant anonymisation with the following idea: ∃X.A = ∃{x}.{P(d), B(d), r(d, x), P(x), B(x)} P = {P ⊓ B, ∃r.(P ⊓ B)}

  • 1. Copy operation: select a variable/an individual, copy this object, and

duplicate assertions involving it e.g., (select d and make the copy yd) ∃{x, yd}.{P(d), B(d), r(d, x), P(x), B(x), P(yd), B(yd), r(yd, x)}

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 7 / 11

slide-20
SLIDE 20

Computing a Compliant Anonymisation

From a given csf s, we can compute a compliant anonymisation with the following idea: ∃X.A = ∃{x}.{P(d), B(d), r(d, x), P(x), B(x)} P = {P ⊓ B, ∃r.(P ⊓ B)}

  • 1. Copy operation: select a variable/an individual, copy this object, and

duplicate assertions involving it e.g., (select x and make the copy yx) ∃{x, yd, yx}.{P(d), B(d), r(d, x), P(x), B(x), P(yd), B(yd), r(yd, x), r(d, yx), r(yd, yx), P(yx), B(yx)}

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 7 / 11

slide-21
SLIDE 21

Computing a Compliant Anonymisation

From a given csf s, we can compute a compliant anonymisation with the following idea: ∃X.A = ∃{x}.{P(d), B(d), r(d, x), P(x), B(x)} P = {P ⊓ B, ∃r.(P ⊓ B)}

  • 1. Copy operation: select a variable/an individual, copy this object, and

duplicate assertions involving it ∃{x, yd, yx}.{P(d), B(d), r(d, x), P(x), B(x), P(yd), B(yd), r(yd, x), r(d, yx), r(yd, yx), P(yx), B(yx)} Note: It suffices to create at most exponentially many copies of each object!

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 7 / 11

slide-22
SLIDE 22

Computing a Compliant Anonymisation

From a given csf s, we can compute a compliant anonymisation with the following idea: ∃X.A = ∃{x}.{P(d), B(d), r(d, x), P(x), B(x)} P = {P ⊓ B, ∃r.(P ⊓ B)}

  • 1. Copy operation: select a variable/an individual, copy this object, and

duplicate assertions involving it ∃{x, yd, yx}.{P(d), B(d), r(d, x), P(x), B(x), P(yd), B(yd), r(yd, x), r(d, yx), r(yd, yx), P(yx), B(yx)}

  • 2. Deletion operation: The given csf s will guide which assertions should

be removed from the current anonymisation

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 7 / 11

slide-23
SLIDE 23

Computing a Compliant Anonymisation

From a given csf s, we can compute a compliant anonymisation with the following idea: ∃X.A = ∃{x}.{P(d), B(d), r(d, x), P(x), B(x)} P = {P ⊓ B, ∃r.(P ⊓ B)}

  • 1. Copy operation: select a variable/an individual, copy this object, and

duplicate assertions involving it ∃{x, yd, yx}.{P(d), B(d), r(d, x), P(x), B(x), P(yd), B(yd), r(yd, x), r(d, yx), r(yd, yx), P(yx), B(yx)}

  • 2. Deletion operation: The given csf s will guide which assertions should

be removed from the current anonymisation Since s(d) = {B, ∃r.(P ⊓ B)} ⇒ d is not allowed to be an instance of B ∃{x, yd, yx}.{P(d),✟✟ ✟ ❍❍ ❍ B(d), r(d, x), P(x), B(x), P(yd), B(yd), r(yd, x), r(d, yx), r(yd, yx), P(yx), B(yx)}

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 7 / 11

slide-24
SLIDE 24

Computing a Compliant Anonymisation

From a given csf s, we can compute a compliant anonymisation with the following idea: ∃X.A = ∃{x}.{P(d), B(d), r(d, x), P(x), B(x)} P = {P ⊓ B, ∃r.(P ⊓ B)}

  • 1. Copy operation: select a variable/an individual, copy this object, and

duplicate assertions involving it ∃{x, yd, yx}.{P(d), B(d), r(d, x), P(x), B(x), P(yd), B(yd), r(yd, x), r(d, yx), r(yd, yx), P(yx), B(yx)}

  • 2. Deletion operation: The given csf s will guide which assertions should

be removed from the current anonymisation Since s(d) = {B, ∃r.(P ⊓ B)} ⇒ r-successors of d are not allowed to be an instance of P ⊓ B ∃{x, yd, yx}.{P(d),✟✟ ✟ ❍❍ ❍ B(d), r(d, x), P(x),✟✟ ✟ ❍❍ ❍ B(x), P(yd), B(yd), r(yd, x), r(d, yx), r(yd, yx),✟✟ ✟ ❍❍ ❍ P(yx), B(yx)}

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 7 / 11

slide-25
SLIDE 25

Computing a Compliant Anonymisation

From a given csf s, we can compute a compliant anonymisation with the following idea: ∃X.A = ∃{x}.{P(d), B(d), r(d, x), P(x), B(x)} P = {P ⊓ B, ∃r.(P ⊓ B)} The following resulting anonymisation ca(∃X.A, s) = ∃Y .B is a P-compliant anonymisation of ∃X.A, where B is {P(d), r(d, x), P(x), P(yd), B(yd), r(yd, x), r(d, yx), r(yd, yx), B(yx)} and Y = {x, yd, yx}

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 7 / 11

slide-26
SLIDE 26

Soundness, Completeness, Complexity

In general, For every csf s, the induced ABox ca(∃X.A, s) = ∃Y .B is entailed by ∃X.A and complies with P

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 8 / 11

slide-27
SLIDE 27

Soundness, Completeness, Complexity

In general, For every csf s, the induced ABox ca(∃X.A, s) = ∃Y .B is entailed by ∃X.A and complies with P The set CA(∃X.A, P) = {ca(∃X.A, s) | s is a csf on ∃X.A for P} – contains all optimal P-compliant anonymisations of ∃X.A – can be computed in exponential time (exponentially many csfs!)

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 8 / 11

slide-28
SLIDE 28

Soundness, Completeness, Complexity

In general, For every csf s, the induced ABox ca(∃X.A, s) = ∃Y .B is entailed by ∃X.A and complies with P The set CA(∃X.A, P) = {ca(∃X.A, s) | s is a csf on ∃X.A for P} – contains all optimal P-compliant anonymisations of ∃X.A – can be computed in exponential time (exponentially many csfs!) To remove the ones that are not optimal, we use an NP-oracle to check entailment between compliant anonymisations

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 8 / 11

slide-29
SLIDE 29

Soundness, Completeness, Complexity

In general, For every csf s, the induced ABox ca(∃X.A, s) = ∃Y .B is entailed by ∃X.A and complies with P The set CA(∃X.A, P) = {ca(∃X.A, s) | s is a csf on ∃X.A for P} – contains all optimal P-compliant anonymisations of ∃X.A – can be computed in exponential time (exponentially many csfs!) To remove the ones that are not optimal, we use an NP-oracle to check entailment between compliant anonymisations Is it possible to get rid of the NP oracle?

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 8 / 11

slide-30
SLIDE 30

Improving Complexity

  • 1. Using a partial order ≤ on csfs

We take only the ≤-minimal csfs for computing optimal compliant anonymisations

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 9 / 11

slide-31
SLIDE 31

Improving Complexity

  • 1. Using a partial order ≤ on csfs

We take only the ≤-minimal csfs for computing optimal compliant anonymisations

  • 2. Introducing IQ-entailment

– EL concepts are instance queries (IQ) – Only compare ABoxes based on which instance queries entailed by them Deciding if ∃X.A IQ-entails ∃Y .B can be done in polynomial time

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 9 / 11

slide-32
SLIDE 32

Table of Complexity Results

Settings Completeness standard entailment all optimal compliant anonymisations standard entailment and ≤ on csfs

  • nly optimal compliant

anonymisations, not all of them IQ-entailment all optimal compliant IQ-anonymisations

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 10 / 11

slide-33
SLIDE 33

Table of Complexity Results

Settings Completeness standard entailment all optimal compliant anonymisations standard entailment and ≤ on csfs

  • nly optimal compliant

anonymisations, not all of them IQ-entailment all optimal compliant IQ-anonymisations Settings Combined Complexity Data Complexity standard entailment exponential time with an NP-oracle polynomial time with an NP-oracle standard entailment and ≤ on csfs exponential time polynomial time IQ-entailment exponential time polynomial time

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 10 / 11

slide-34
SLIDE 34

Future Work and References

Future Work Safety for EL policies A quantified ABox is safe for P if its combination with other P-compliant ABoxes is also compliant with P Compliance w.r.t. (general) TBoxes Computing optimal compliant anonymisations w.r.t. conjunctive queries

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 11 / 11

slide-35
SLIDE 35

Future Work and References

Future Work Safety for EL policies A quantified ABox is safe for P if its combination with other P-compliant ABoxes is also compliant with P Compliance w.r.t. (general) TBoxes Computing optimal compliant anonymisations w.r.t. conjunctive queries Our work is based on the following related work:

  • F. Baader, F. Kriegel, A. Nuradiansyah, Privacy-Preserving Ontology

Publishing for EL Instance Stores, JELIA 2019

  • B. Cuenca Grau and E. Kostylev, Logical Foundations of Linked Data

Anonymizations, JAIR, 2019

Computing Compliant Anonymisations ISWC 2020 November 4th, 2020 11 / 11