privacy preserving ontology publishing for el instance
play

Privacy-Preserving Ontology Publishing for EL Instance Stores Franz - PowerPoint PPT Presentation

Privacy-Preserving Ontology Publishing for EL Instance Stores Franz Baader Francesco Kriegel Adrian Nuradiansyah Technische Universitt Dresden Published in JELIA 2019 and Submitted to Knstliche Intelligenz (KI) 2019 August 20, 2019 Adrian


  1. Privacy-Preserving Ontology Publishing for EL Instance Stores Franz Baader Francesco Kriegel Adrian Nuradiansyah Technische Universität Dresden Published in JELIA 2019 and Submitted to Künstliche Intelligenz (KI) 2019 August 20, 2019 Adrian Nuradiansyah Thursday Seminar August 20, 2019 1 / 20

  2. Privacy-Preserving Ontology Publishing compliant Privacy policies Ontology Adrian Nuradiansyah Thursday Seminar August 20, 2019 2 / 20

  3. Privacy-Preserving Ontology Publishing compliant compliant Privacy policies Other sources Ontology Adrian Nuradiansyah Thursday Seminar August 20, 2019 2 / 20

  4. Privacy-Preserving Ontology Publishing compliant compliant Privacy policies not compliant Other sources Ontology integrated integrated Adrian Nuradiansyah Thursday Seminar August 20, 2019 2 / 20

  5. Privacy-Preserving Ontology Publishing compliant compliant Privacy policies not compliant Other sources Ontology integrated integrated Adrian Nuradiansyah Thursday Seminar August 20, 2019 2 / 20

  6. Privacy-Preserving Ontology Publishing What people already did: In (Cuenca Grau & Kostylev, 2016): Privacy-Preserving Data Publishing Information to be published: a relational dataset with (labeled) nulls Policy is a conjunctive query. Considering three privacy properties when publishing datasets: policy-compliant, policy-safety, and optimality . Published information does not have background knowledge. Adrian Nuradiansyah Thursday Seminar August 20, 2019 3 / 20

  7. Privacy-Preserving Ontology Publishing What people already did: In (Cuenca Grau & Kostylev, 2016): Privacy-Preserving Data Publishing Information to be published: a relational dataset with (labeled) nulls Policy is a conjunctive query. Considering three privacy properties when publishing datasets: policy-compliant, policy-safety, and optimality . Published information does not have background knowledge. What we want to do: Privacy-Preserving Ontology Publishing (PPOP) Addressed in the context of Description Logic Ontologies Adrian Nuradiansyah Thursday Seminar August 20, 2019 3 / 20

  8. PPOP for EL instance stores Starting point : EL Ontologies with role-free ABoxes ( instance stores ) and empty TBoxes. An ABox A is role-free if all the axioms β ∈ A are only in the form of D ( a ) . Adrian Nuradiansyah Thursday Seminar August 20, 2019 4 / 20

  9. PPOP for EL instance stores Starting point : EL Ontologies with role-free ABoxes ( instance stores ) and empty TBoxes. An ABox A is role-free if all the axioms β ∈ A are only in the form of D ( a ) . Why no TBox? For instance, in SNOMED CT → Acyclic TBox → the TBox can be reduced away Even in SNOMED, patient data are usually annotated with SNOMED concepts, not with SNOMED roles. Adrian Nuradiansyah Thursday Seminar August 20, 2019 4 / 20

  10. PPOP for EL instance stores Starting point : EL Ontologies with role-free ABoxes ( instance stores ) and empty TBoxes. An ABox A is role-free if all the axioms β ∈ A are only in the form of D ( a ) . Why no TBox? For instance, in SNOMED CT → Acyclic TBox → the TBox can be reduced away Even in SNOMED, patient data are usually annotated with SNOMED concepts, not with SNOMED roles. W.l.o.g., only one concept assertion in A speaks about one individual C 1 ( a ) , C 2 ( a ) ∈ A implies ( C 1 ⊓ C 2 )( a ) ∈ A reduced Safe Ontologies − − − − → Safe Concepts Adrian Nuradiansyah Thursday Seminar August 20, 2019 4 / 20

  11. PPOP for EL instance stores Starting point : EL Ontologies with role-free ABoxes ( instance stores ) and empty TBoxes. An ABox A is role-free if all the axioms β ∈ A are only in the form of D ( a ) . Why no TBox? For instance, in SNOMED CT → Acyclic TBox → the TBox can be reduced away Even in SNOMED, patient data are usually annotated with SNOMED concepts, not with SNOMED roles. W.l.o.g., only one concept assertion in A speaks about one individual C 1 ( a ) , C 2 ( a ) ∈ A implies ( C 1 ⊓ C 2 )( a ) ∈ A reduced Safe Ontologies − − − − → Safe Concepts Information to be published for an individual a : an EL concept C Policy is a finite set of EL concepts D 1 , . . . , D p , such that D i �≡ ⊤ for all i ∈ { 1 , . . . , p } . Adrian Nuradiansyah Thursday Seminar August 20, 2019 4 / 20

  12. Compliance, Safety, and Optimality Given a policy P = { D 1 , . . . , D p } and an EL concept C , the EL concept C ′ is compliant with P if C ′ �⊑ D i for all i ∈ { 1 , . . . , p } . safe for P if C ′ ⊓ C ′′ is compliant with P for all EL -concepts C ′′ that are compliant with P . Adrian Nuradiansyah Thursday Seminar August 20, 2019 5 / 20

  13. Compliance, Safety, and Optimality Given a policy P = { D 1 , . . . , D p } and an EL concept C , the EL concept C ′ is compliant with P if C ′ �⊑ D i for all i ∈ { 1 , . . . , p } . safe for P if C ′ ⊓ C ′′ is compliant with P for all EL -concepts C ′′ that are compliant with P . a P -compliant (safe) generalization of C if C ⊑ C ′ and C ′ is compliant with (safe for) P . Adrian Nuradiansyah Thursday Seminar August 20, 2019 5 / 20

  14. Compliance, Safety, and Optimality Given a policy P = { D 1 , . . . , D p } and an EL concept C , the EL concept C ′ is compliant with P if C ′ �⊑ D i for all i ∈ { 1 , . . . , p } . safe for P if C ′ ⊓ C ′′ is compliant with P for all EL -concepts C ′′ that are compliant with P . a P -compliant (safe) generalization of C if C ⊑ C ′ and C ′ is compliant with (safe for) P . a P -optimal compliant (safe) generalization of C if C ′ is a P -compliant (safe) generalization of C , and there is no P -compliant (safe) generalization C ′′ of C s.t. C ′′ ⊏ C ′ . Adrian Nuradiansyah Thursday Seminar August 20, 2019 5 / 20

  15. Illustration on Compliance, Safety, and Optimality Consider a policy P = { D } specifying what information should be kept “secret” about linda D = Patient ⊓ ∃ seen _ by . ( Doctor ⊓ ∃ works _ in . Cardiology ) Assume information C is published about linda C = Patient ⊓ Female ⊓ ∃ seen _ by . ( Doctor ⊓ Male ⊓ ∃ works _ in . Cardiology ) Note C is not compliant with D , i.e., C ⊑ D . Adrian Nuradiansyah Thursday Seminar August 20, 2019 6 / 20

  16. Illustration on Compliance, Safety, and Optimality Consider a policy P = { D } specifying what information should be kept “secret” about linda D = Patient ⊓ ∃ seen _ by . ( Doctor ⊓ ∃ works _ in . Cardiology ) Assume information C is published about linda C = Patient ⊓ Female ⊓ ∃ seen _ by . ( Doctor ⊓ Male ⊓ ∃ works _ in . Cardiology ) Note C is not compliant with D , i.e., C ⊑ D . Generalizing C to yield a compliant concept C 1 = Female ⊓ ∃ seen _ by . ( Doctor ⊓ Male ⊓ ∃ works _ in . Cardiology ) But, C 1 is not safe for D since if the attacker knows Patient ( linda ) , then C 1 ⊓ Patient ⊑ D is revealed. Adrian Nuradiansyah Thursday Seminar August 20, 2019 6 / 20

  17. Illustration on Compliance, Safety, and Optimality Consider a policy P = { D } specifying what information should be kept “secret” about linda D = Patient ⊓ ∃ seen _ by . ( Doctor ⊓ ∃ works _ in . Cardiology ) Assume information C is published about linda C = Patient ⊓ Female ⊓ ∃ seen _ by . ( Doctor ⊓ Male ⊓ ∃ works _ in . Cardiology ) Note C is not compliant with D , i.e., C ⊑ D . Let us make it safe ! C 2 = Female ⊓ ∃ seen _ by . ( Doctor ⊓ Male ⊓ ∃ works _ in . ⊤ ) But, C 2 is still not optimal since more information than necessary is removed. Adrian Nuradiansyah Thursday Seminar August 20, 2019 6 / 20

  18. Illustration on Compliance, Safety, and Optimality Consider a policy P = { D } specifying what information should be kept “secret” about linda D = Patient ⊓ ∃ seen _ by . ( Doctor ⊓ ∃ works _ in . Cardiology ) Assume information C is published about linda C = Patient ⊓ Female ⊓ ∃ seen _ by . ( Doctor ⊓ Male ⊓ ∃ works _ in . Cardiology ) Note C is not compliant with D , i.e., C ⊑ D . Let us make it safe ! C 2 = Female ⊓ ∃ seen _ by . ( Doctor ⊓ Male ⊓ ∃ works _ in . ⊤ ) But, C 2 is still not optimal since more information than necessary is removed. Make it optimal ! C 3 = Female ⊓ ∃ seen _ by . ( Doctor ⊓ Male ⊓ ∃ works _ in . ⊤ ) ⊓ ∃ seen _ by . ( Male ⊓ ∃ works _ in . Cardiology ) Adrian Nuradiansyah Thursday Seminar August 20, 2019 6 / 20

  19. Characterizing Compliance Let con ( C ) be the set of all atoms A or ∃ r . E occurring in the top-level conjunction of C . Adrian Nuradiansyah Thursday Seminar August 20, 2019 7 / 20

  20. Characterizing Compliance Let con ( C ) be the set of all atoms A or ∃ r . E occurring in the top-level conjunction of C . con ( C ) covers con ( D ) iff for all F ∈ con ( D ) , there is E ∈ con ( C ) such that E ⊑ F Adrian Nuradiansyah Thursday Seminar August 20, 2019 7 / 20

  21. Characterizing Compliance Let con ( C ) be the set of all atoms A or ∃ r . E occurring in the top-level conjunction of C . con ( C ) covers con ( D ) iff for all F ∈ con ( D ) , there is E ∈ con ( C ) such that E ⊑ F ⇒ Characterizing C ⊑ D . Adrian Nuradiansyah Thursday Seminar August 20, 2019 7 / 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend