Privacy-Preserving Ontology Publishing for EL Instance Stores Franz - - PowerPoint PPT Presentation

privacy preserving ontology publishing for el instance
SMART_READER_LITE
LIVE PREVIEW

Privacy-Preserving Ontology Publishing for EL Instance Stores Franz - - PowerPoint PPT Presentation

Privacy-Preserving Ontology Publishing for EL Instance Stores Franz Baader Francesco Kriegel Adrian Nuradiansyah Technische Universitt Dresden Published in JELIA 2019 and Submitted to Knstliche Intelligenz (KI) 2019 August 20, 2019 Adrian


slide-1
SLIDE 1

Privacy-Preserving Ontology Publishing for EL Instance Stores

Franz Baader Francesco Kriegel Adrian Nuradiansyah Technische Universität Dresden Published in JELIA 2019 and Submitted to Künstliche Intelligenz (KI) 2019 August 20, 2019

Adrian Nuradiansyah Thursday Seminar August 20, 2019 1 / 20

slide-2
SLIDE 2

Privacy-Preserving Ontology Publishing

Privacy policies Ontology

compliant

Adrian Nuradiansyah Thursday Seminar August 20, 2019 2 / 20

slide-3
SLIDE 3

Privacy-Preserving Ontology Publishing

Privacy policies Ontology

compliant

Other sources

compliant

Adrian Nuradiansyah Thursday Seminar August 20, 2019 2 / 20

slide-4
SLIDE 4

Privacy-Preserving Ontology Publishing

Privacy policies Ontology

compliant

Other sources

compliant integrated integrated not compliant

Adrian Nuradiansyah Thursday Seminar August 20, 2019 2 / 20

slide-5
SLIDE 5

Privacy-Preserving Ontology Publishing

Privacy policies Ontology

compliant

Other sources

compliant integrated integrated not compliant

Adrian Nuradiansyah Thursday Seminar August 20, 2019 2 / 20

slide-6
SLIDE 6

Privacy-Preserving Ontology Publishing

What people already did:

In (Cuenca Grau & Kostylev, 2016):

Privacy-Preserving Data Publishing Information to be published: a relational dataset with (labeled) nulls Policy is a conjunctive query. Considering three privacy properties when publishing datasets: policy-compliant, policy-safety, and optimality. Published information does not have background knowledge.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 3 / 20

slide-7
SLIDE 7

Privacy-Preserving Ontology Publishing

What people already did:

In (Cuenca Grau & Kostylev, 2016):

Privacy-Preserving Data Publishing Information to be published: a relational dataset with (labeled) nulls Policy is a conjunctive query. Considering three privacy properties when publishing datasets: policy-compliant, policy-safety, and optimality. Published information does not have background knowledge.

What we want to do:

Privacy-Preserving Ontology Publishing (PPOP) Addressed in the context of Description Logic Ontologies

Adrian Nuradiansyah Thursday Seminar August 20, 2019 3 / 20

slide-8
SLIDE 8

PPOP for EL instance stores

Starting point: EL Ontologies with role-free ABoxes (instance stores) and empty TBoxes. An ABox A is role-free if all the axioms β ∈ A are only in the form of D(a).

Adrian Nuradiansyah Thursday Seminar August 20, 2019 4 / 20

slide-9
SLIDE 9

PPOP for EL instance stores

Starting point: EL Ontologies with role-free ABoxes (instance stores) and empty TBoxes. An ABox A is role-free if all the axioms β ∈ A are only in the form of D(a). Why no TBox? For instance, in SNOMED CT → Acyclic TBox → the TBox can be reduced away Even in SNOMED, patient data are usually annotated with SNOMED concepts, not with SNOMED roles.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 4 / 20

slide-10
SLIDE 10

PPOP for EL instance stores

Starting point: EL Ontologies with role-free ABoxes (instance stores) and empty TBoxes. An ABox A is role-free if all the axioms β ∈ A are only in the form of D(a). Why no TBox? For instance, in SNOMED CT → Acyclic TBox → the TBox can be reduced away Even in SNOMED, patient data are usually annotated with SNOMED concepts, not with SNOMED roles. W.l.o.g., only one concept assertion in A speaks about one individual C1(a), C2(a) ∈ A implies (C1 ⊓ C2)(a) ∈ A Safe Ontologies

reduced

− − − − → Safe Concepts

Adrian Nuradiansyah Thursday Seminar August 20, 2019 4 / 20

slide-11
SLIDE 11

PPOP for EL instance stores

Starting point: EL Ontologies with role-free ABoxes (instance stores) and empty TBoxes. An ABox A is role-free if all the axioms β ∈ A are only in the form of D(a). Why no TBox? For instance, in SNOMED CT → Acyclic TBox → the TBox can be reduced away Even in SNOMED, patient data are usually annotated with SNOMED concepts, not with SNOMED roles. W.l.o.g., only one concept assertion in A speaks about one individual C1(a), C2(a) ∈ A implies (C1 ⊓ C2)(a) ∈ A Safe Ontologies

reduced

− − − − → Safe Concepts Information to be published for an individual a: an EL concept C Policy is a finite set of EL concepts D1, . . . , Dp, such that Di ≡ ⊤ for all i ∈ {1, . . . , p}.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 4 / 20

slide-12
SLIDE 12

Compliance, Safety, and Optimality

Given a policy P = {D1, . . . , Dp} and an EL concept C, the EL concept C ′ is

compliant with P if C ′ ⊑ Di for all i ∈ {1, . . . , p}. safe for P if C ′ ⊓ C ′′ is compliant with P for all EL-concepts C ′′ that are compliant with P.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 5 / 20

slide-13
SLIDE 13

Compliance, Safety, and Optimality

Given a policy P = {D1, . . . , Dp} and an EL concept C, the EL concept C ′ is

compliant with P if C ′ ⊑ Di for all i ∈ {1, . . . , p}. safe for P if C ′ ⊓ C ′′ is compliant with P for all EL-concepts C ′′ that are compliant with P. a P-compliant (safe) generalization of C if C ⊑ C ′ and C ′ is compliant with (safe for) P.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 5 / 20

slide-14
SLIDE 14

Compliance, Safety, and Optimality

Given a policy P = {D1, . . . , Dp} and an EL concept C, the EL concept C ′ is

compliant with P if C ′ ⊑ Di for all i ∈ {1, . . . , p}. safe for P if C ′ ⊓ C ′′ is compliant with P for all EL-concepts C ′′ that are compliant with P. a P-compliant (safe) generalization of C if C ⊑ C ′ and C ′ is compliant with (safe for) P. a P-optimal compliant (safe) generalization of C if C ′ is a P-compliant (safe) generalization of C, and there is no P-compliant (safe) generalization C ′′ of C s.t. C ′′ ⊏ C ′.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 5 / 20

slide-15
SLIDE 15

Illustration on Compliance, Safety, and Optimality

Consider a policy P = {D} specifying what information should be kept “secret” about linda D = Patient ⊓ ∃seen_by.(Doctor ⊓ ∃works_in.Cardiology) Assume information C is published about linda C = Patient ⊓ Female ⊓ ∃seen_by.(Doctor ⊓ Male ⊓ ∃works_in.Cardiology) Note C is not compliant with D, i.e., C ⊑ D.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 6 / 20

slide-16
SLIDE 16

Illustration on Compliance, Safety, and Optimality

Consider a policy P = {D} specifying what information should be kept “secret” about linda D = Patient ⊓ ∃seen_by.(Doctor ⊓ ∃works_in.Cardiology) Assume information C is published about linda C = Patient ⊓ Female ⊓ ∃seen_by.(Doctor ⊓ Male ⊓ ∃works_in.Cardiology) Note C is not compliant with D, i.e., C ⊑ D. Generalizing C to yield a compliant concept C1 = Female ⊓ ∃seen_by.(Doctor ⊓ Male ⊓ ∃works_in.Cardiology) But, C1 is not safe for D since if the attacker knows Patient(linda), then C1 ⊓ Patient ⊑ D is revealed.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 6 / 20

slide-17
SLIDE 17

Illustration on Compliance, Safety, and Optimality

Consider a policy P = {D} specifying what information should be kept “secret” about linda D = Patient ⊓ ∃seen_by.(Doctor ⊓ ∃works_in.Cardiology) Assume information C is published about linda C = Patient ⊓ Female ⊓ ∃seen_by.(Doctor ⊓ Male ⊓ ∃works_in.Cardiology) Note C is not compliant with D, i.e., C ⊑ D. Let us make it safe! C2 = Female ⊓ ∃seen_by.(Doctor ⊓ Male ⊓ ∃works_in.⊤) But, C2 is still not optimal since more information than necessary is removed.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 6 / 20

slide-18
SLIDE 18

Illustration on Compliance, Safety, and Optimality

Consider a policy P = {D} specifying what information should be kept “secret” about linda D = Patient ⊓ ∃seen_by.(Doctor ⊓ ∃works_in.Cardiology) Assume information C is published about linda C = Patient ⊓ Female ⊓ ∃seen_by.(Doctor ⊓ Male ⊓ ∃works_in.Cardiology) Note C is not compliant with D, i.e., C ⊑ D. Let us make it safe! C2 = Female ⊓ ∃seen_by.(Doctor ⊓ Male ⊓ ∃works_in.⊤) But, C2 is still not optimal since more information than necessary is removed. Make it optimal! C3 = Female ⊓ ∃seen_by.(Doctor ⊓ Male ⊓ ∃works_in.⊤) ⊓ ∃seen_by.(Male ⊓ ∃works_in.Cardiology)

Adrian Nuradiansyah Thursday Seminar August 20, 2019 6 / 20

slide-19
SLIDE 19

Characterizing Compliance

Let con(C) be the set of all atoms A or ∃r.E occurring in the top-level conjunction of C.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 7 / 20

slide-20
SLIDE 20

Characterizing Compliance

Let con(C) be the set of all atoms A or ∃r.E occurring in the top-level conjunction of C. con(C) covers con(D) iff for all F ∈ con(D), there is E ∈ con(C) such that E ⊑ F

Adrian Nuradiansyah Thursday Seminar August 20, 2019 7 / 20

slide-21
SLIDE 21

Characterizing Compliance

Let con(C) be the set of all atoms A or ∃r.E occurring in the top-level conjunction of C. con(C) covers con(D) iff for all F ∈ con(D), there is E ∈ con(C) such that E ⊑ F ⇒ Characterizing C ⊑ D.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 7 / 20

slide-22
SLIDE 22

Characterizing Compliance

Let con(C) be the set of all atoms A or ∃r.E occurring in the top-level conjunction of C. con(C) covers con(D) iff for all F ∈ con(D), there is E ∈ con(C) such that E ⊑ F ⇒ Characterizing C ⊑ D.

Compliance

C is compliant with P iff con(C) does not cover con(Di) for any i ∈ {1, . . . , p}.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 7 / 20

slide-23
SLIDE 23

Characterizing Compliance

Let con(C) be the set of all atoms A or ∃r.E occurring in the top-level conjunction of C. con(C) covers con(D) iff for all F ∈ con(D), there is E ∈ con(C) such that E ⊑ F ⇒ Characterizing C ⊑ D.

Compliance

C is compliant with P iff con(C) does not cover con(Di) for any i ∈ {1, . . . , p}.

Complexity for Compliance

Deciding whether C ′ is compliant w.r.t. P is in PTime.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 7 / 20

slide-24
SLIDE 24

Characterizing Compliance

Let con(C) be the set of all atoms A or ∃r.E occurring in the top-level conjunction of C. con(C) covers con(D) iff for all F ∈ con(D), there is E ∈ con(C) such that E ⊑ F ⇒ Characterizing C ⊑ D.

Compliance

C is compliant with P iff con(C) does not cover con(Di) for any i ∈ {1, . . . , p}.

Complexity for Compliance

Deciding whether C ′ is compliant w.r.t. P is in PTime. One optimal P-compliant generalization can be computed in ExpTime. The set of all optimal P-compliant generalizations can be computed in ExpTime.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 7 / 20

slide-25
SLIDE 25

Characterizing Safety

Assume P is redundant-free: every Di, Dj ∈ P are incomparable w.r.t. subsumption.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 8 / 20

slide-26
SLIDE 26

Characterizing Safety

Assume P is redundant-free: every Di, Dj ∈ P are incomparable w.r.t. subsumption.

Safety

C ′ is safe for P iff there is no pair of atoms (E, F) such that E ∈ con(C ′), F ∈ con(D1) ∪ . . . ∪ con(Dp) and E ⊑ F Deciding whether C ′ is safe for P is in PTime.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 8 / 20

slide-27
SLIDE 27

Characterizing Safety

Assume P is redundant-free: every Di, Dj ∈ P are incomparable w.r.t. subsumption.

Safety

C ′ is safe for P iff there is no pair of atoms (E, F) such that E ∈ con(C ′), F ∈ con(D1) ∪ . . . ∪ con(Dp) and E ⊑ F Deciding whether C ′ is safe for P is in PTime.

The Optimal P-Safe Generalization

If C ′

1, C ′ 2 are P-safe generalizations of C, then C ′ 1 ⊓ C ′ 2 is also a P-safe

generalization of C. ⇒ Optimal P-safe generalization is unique up to equivalence.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 8 / 20

slide-28
SLIDE 28

Characterizing Safety

Assume P is redundant-free: every Di, Dj ∈ P are incomparable w.r.t. subsumption.

Safety

C ′ is safe for P iff there is no pair of atoms (E, F) such that E ∈ con(C ′), F ∈ con(D1) ∪ . . . ∪ con(Dp) and E ⊑ F Deciding whether C ′ is safe for P is in PTime.

The Optimal P-Safe Generalization

If C ′

1, C ′ 2 are P-safe generalizations of C, then C ′ 1 ⊓ C ′ 2 is also a P-safe

generalization of C. ⇒ Optimal P-safe generalization is unique up to equivalence. The P-optimal safe generalization of C can be computed in ExpTime. ⇒ Requiring the computation of P-optimal compliant generalizations.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 8 / 20

slide-29
SLIDE 29

Deciding Optimality

Deciding whether C ′ a P-optimal compliant (safe) generalization of C. It can be done in ExpTime – Compute the set of all P-optimal compliant (safe) generalization of C. – Check whether C ′ belongs to the set.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 9 / 20

slide-30
SLIDE 30

Deciding Optimality

Deciding whether C ′ a P-optimal compliant (safe) generalization of C. It can be done in ExpTime – Compute the set of all P-optimal compliant (safe) generalization of C. – Check whether C ′ belongs to the set. It can be improved to coNP. Idea: Design an NP algorithm for deciding non-optimality

  • 1. Guess a lower neighbor C ′′ of C ′ subsuming C.

C ⊑ C ′′ ⊑ C ′ and there is no C ′′′ such that C ′′ ⊏ C ′′′ ⊏ C ′.

  • 2. Check whether C ′′ is a compliant (safe)-generalization of C.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 9 / 20

slide-31
SLIDE 31

Deciding Optimality

Deciding whether C ′ a P-optimal compliant (safe) generalization of C. It can be done in ExpTime – Compute the set of all P-optimal compliant (safe) generalization of C. – Check whether C ′ belongs to the set. It can be improved to coNP. Idea: Design an NP algorithm for deciding non-optimality

  • 1. Guess a lower neighbor C ′′ of C ′ subsuming C.

C ⊑ C ′′ ⊑ C ′ and there is no C ′′′ such that C ′′ ⊏ C ′′′ ⊏ C ′.

  • 2. Check whether C ′′ is a compliant (safe)-generalization of C.

The converse of lower neighbor: Upper Neighbor ⊑1 (Baader, et. al., 2018). Only polynomially many upper neighbors of EL-concepts and each of them is of polynomial size (Kriegel, 2018).

Adrian Nuradiansyah Thursday Seminar August 20, 2019 9 / 20

slide-32
SLIDE 32

Deciding Optimality

Deciding whether C ′ a P-optimal compliant (safe) generalization of C. It can be done in ExpTime – Compute the set of all P-optimal compliant (safe) generalization of C. – Check whether C ′ belongs to the set. It can be improved to coNP. Idea: Design an NP algorithm for deciding non-optimality

  • 1. Guess a lower neighbor C ′′ of C ′ subsuming C.

C ⊑ C ′′ ⊑ C ′ and there is no C ′′′ such that C ′′ ⊏ C ′′′ ⊏ C ′.

  • 2. Check whether C ′′ is a compliant (safe)-generalization of C.

The converse of lower neighbor: Upper Neighbor ⊑1 (Baader, et. al., 2018). Only polynomially many upper neighbors of EL-concepts and each of them is of polynomial size (Kriegel, 2018). The next task: computing lower neighbors!

Adrian Nuradiansyah Thursday Seminar August 20, 2019 9 / 20

slide-33
SLIDE 33

Characterizing Lower Neighbors

Lower neighbors C ′′ of C ′ can be obtained by conjoining an atom not implied by C ′ to C ′.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 10 / 20

slide-34
SLIDE 34

Characterizing Lower Neighbors

Lower neighbors C ′′ of C ′ can be obtained by conjoining an atom not implied by C ′ to C ′. Let Σ be a finite set of concept and role names. We define the set LAΣ(C ′) of lowering atoms for C ′ w.r.t. Σ.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 10 / 20

slide-35
SLIDE 35

Characterizing Lower Neighbors

Lower neighbors C ′′ of C ′ can be obtained by conjoining an atom not implied by C ′ to C ′. Let Σ be a finite set of concept and role names. We define the set LAΣ(C ′) of lowering atoms for C ′ w.r.t. Σ. LAΣ(C ′) := {A ∈ Σ ∩ NC | A ∈ con(C ′)} ∪

Adrian Nuradiansyah Thursday Seminar August 20, 2019 10 / 20

slide-36
SLIDE 36

Characterizing Lower Neighbors

Lower neighbors C ′′ of C ′ can be obtained by conjoining an atom not implied by C ′ to C ′. Let Σ be a finite set of concept and role names. We define the set LAΣ(C ′) of lowering atoms for C ′ w.r.t. Σ. LAΣ(C ′) := {A ∈ Σ ∩ NC | A ∈ con(C ′)} ∪ {∃r.D | r ∈ NR ∩ Σ, sig(D) ⊆ Σ, C ′ ⊑ ∃r.D and

Adrian Nuradiansyah Thursday Seminar August 20, 2019 10 / 20

slide-37
SLIDE 37

Characterizing Lower Neighbors

Lower neighbors C ′′ of C ′ can be obtained by conjoining an atom not implied by C ′ to C ′. Let Σ be a finite set of concept and role names. We define the set LAΣ(C ′) of lowering atoms for C ′ w.r.t. Σ. LAΣ(C ′) := {A ∈ Σ ∩ NC | A ∈ con(C ′)} ∪ {∃r.D | r ∈ NR ∩ Σ, sig(D) ⊆ Σ, C ′ ⊑ ∃r.D and C ′ ⊑ ∃r.E for all E with D ⊏1 E}

Adrian Nuradiansyah Thursday Seminar August 20, 2019 10 / 20

slide-38
SLIDE 38

Characterizing Lower Neighbors

Lower neighbors C ′′ of C ′ can be obtained by conjoining an atom not implied by C ′ to C ′. Let Σ be a finite set of concept and role names. We define the set LAΣ(C ′) of lowering atoms for C ′ w.r.t. Σ. LAΣ(C ′) := {A ∈ Σ ∩ NC | A ∈ con(C ′)} ∪ {∃r.D | r ∈ NR ∩ Σ, sig(D) ⊆ Σ, C ′ ⊑ ∃r.D and C ′ ⊑ ∃r.E for all E with D ⊏1 E}

Lemma

C ′′ is a lower neighbor of C ′ w.r.t. Σ iff there is an atom At ∈ LAΣ(C ′) such that C ′′ ≡ C ′ ⊓ At.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 10 / 20

slide-39
SLIDE 39

Example of Lower Neighbors

Example

Σ := {r, A1, A2, B1, B2, C1, C2} and C ′ := ∃r.(A1⊓A2⊓B1⊓B2) ⊓ ∃r.(A1⊓A2⊓C1⊓C2) ⊓ ∃r.(B1⊓B2⊓C1⊓C2).

Adrian Nuradiansyah Thursday Seminar August 20, 2019 11 / 20

slide-40
SLIDE 40

Example of Lower Neighbors

Example

Σ := {r, A1, A2, B1, B2, C1, C2} and C ′ := ∃r.(A1⊓A2⊓B1⊓B2) ⊓ ∃r.(A1⊓A2⊓C1⊓C2) ⊓ ∃r.(B1⊓B2⊓C1⊓C2).

if D := Ai ⊓ Bj ⊓ Ck for i, j, k ∈ {1, 2}, then ∃r.D ∈ LAΣ(C ′′).

Adrian Nuradiansyah Thursday Seminar August 20, 2019 11 / 20

slide-41
SLIDE 41

Example of Lower Neighbors

Example

Σ := {r, A1, A2, B1, B2, C1, C2} and C ′ := ∃r.(A1⊓A2⊓B1⊓B2) ⊓ ∃r.(A1⊓A2⊓C1⊓C2) ⊓ ∃r.(B1⊓B2⊓C1⊓C2).

if D := Ai ⊓ Bj ⊓ Ck for i, j, k ∈ {1, 2}, then ∃r.D ∈ LAΣ(C ′′). For all upper neighbors E of D, where E is only either Ai ⊓ Bj, Bj ⊓ Ck, or Ai ⊓ Ck, we have C ⊑ ∃r.E.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 11 / 20

slide-42
SLIDE 42

Example of Lower Neighbors

Example

Σ := {r, A1, A2, B1, B2, C1, C2} and C ′ := ∃r.(A1⊓A2⊓B1⊓B2) ⊓ ∃r.(A1⊓A2⊓C1⊓C2) ⊓ ∃r.(B1⊓B2⊓C1⊓C2).

if D := Ai ⊓ Bj ⊓ Ck for i, j, k ∈ {1, 2}, then ∃r.D ∈ LAΣ(C ′′). For all upper neighbors E of D, where E is only either Ai ⊓ Bj, Bj ⊓ Ck, or Ai ⊓ Ck, we have C ⊑ ∃r.E. C ′ ⊓ ∃r.D is a lower neighbor of C ′

Adrian Nuradiansyah Thursday Seminar August 20, 2019 11 / 20

slide-43
SLIDE 43

Example of Lower Neighbors

Example

Σ := {r, A1, A2, B1, B2, C1, C2} and C ′ := ∃r.(A1⊓A2⊓B1⊓B2) ⊓ ∃r.(A1⊓A2⊓C1⊓C2) ⊓ ∃r.(B1⊓B2⊓C1⊓C2).

if D := Ai ⊓ Bj ⊓ Ck for i, j, k ∈ {1, 2}, then ∃r.D ∈ LAΣ(C ′′). For all upper neighbors E of D, where E is only either Ai ⊓ Bj, Bj ⊓ Ck, or Ai ⊓ Ck, we have C ⊑ ∃r.E. C ′ ⊓ ∃r.D is a lower neighbor of C ′ Given C and Σ, in general, |LAΣ(C)| can be exponential in the size of C and Σ.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 11 / 20

slide-44
SLIDE 44

Example of Lower Neighbors

Example

Σ := {r, A1, A2, B1, B2, C1, C2} and C ′ := ∃r.(A1⊓A2⊓B1⊓B2) ⊓ ∃r.(A1⊓A2⊓C1⊓C2) ⊓ ∃r.(B1⊓B2⊓C1⊓C2).

if D := Ai ⊓ Bj ⊓ Ck for i, j, k ∈ {1, 2}, then ∃r.D ∈ LAΣ(C ′′). For all upper neighbors E of D, where E is only either Ai ⊓ Bj, Bj ⊓ Ck, or Ai ⊓ Ck, we have C ⊑ ∃r.E. C ′ ⊓ ∃r.D is a lower neighbor of C ′ Given C and Σ, in general, |LAΣ(C)| can be exponential in the size of C and Σ. To produce exactly the lower neighbors of C ′ that subsume C, let us generate all At ∈ LAΣ(C ′) w.r.t. Σ := sig(C), and remove the ones that do not subsume C.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 11 / 20

slide-45
SLIDE 45

Generating Lower Neighbors

But LAΣ(C ′) does not show directly how appropriate ∃r.D can be found!

Adrian Nuradiansyah Thursday Seminar August 20, 2019 12 / 20

slide-46
SLIDE 46

Generating Lower Neighbors

But LAΣ(C ′) does not show directly how appropriate ∃r.D can be found! The NP-algorithm generating exactly the elements of LAΣ(C ′) works as follows

  • 1. Choose A ∈ Σ \ con(C ′) and output A. If there is no such A, fail.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 12 / 20

slide-47
SLIDE 47

Generating Lower Neighbors

But LAΣ(C ′) does not show directly how appropriate ∃r.D can be found! The NP-algorithm generating exactly the elements of LAΣ(C ′) works as follows

  • 1. Choose A ∈ Σ \ con(C ′) and output A. If there is no such A, fail.
  • 2. Choose r ∈ NR ∩ Σ, a set {∃r.F ′

1, . . . , ∃r.F ′ k} ⊆ con(C ′), and recursively

guess F1 ∈ LAΣ(F ′

1), . . . , Fk ∈ LAΣ(F ′ k).

Adrian Nuradiansyah Thursday Seminar August 20, 2019 12 / 20

slide-48
SLIDE 48

Generating Lower Neighbors

But LAΣ(C ′) does not show directly how appropriate ∃r.D can be found! The NP-algorithm generating exactly the elements of LAΣ(C ′) works as follows

  • 1. Choose A ∈ Σ \ con(C ′) and output A. If there is no such A, fail.
  • 2. Choose r ∈ NR ∩ Σ, a set {∃r.F ′

1, . . . , ∃r.F ′ k} ⊆ con(C ′), and recursively

guess F1 ∈ LAΣ(F ′

1), . . . , Fk ∈ LAΣ(F ′ k).

If for some i, 1 ≤ i ≤ k, it fails to produce Fi ∈ LAΣ(F ′

i ), or

If C ′ ⊑ ∃r.(F1 ⊓ . . . ⊓ Fk), or If F1 ⊓ . . . ⊓ Fk has an upper neighbor E such that C ′ ⊑ ∃r.E, then fail.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 12 / 20

slide-49
SLIDE 49

Generating Lower Neighbors

But LAΣ(C ′) does not show directly how appropriate ∃r.D can be found! The NP-algorithm generating exactly the elements of LAΣ(C ′) works as follows

  • 1. Choose A ∈ Σ \ con(C ′) and output A. If there is no such A, fail.
  • 2. Choose r ∈ NR ∩ Σ, a set {∃r.F ′

1, . . . , ∃r.F ′ k} ⊆ con(C ′), and recursively

guess F1 ∈ LAΣ(F ′

1), . . . , Fk ∈ LAΣ(F ′ k).

If for some i, 1 ≤ i ≤ k, it fails to produce Fi ∈ LAΣ(F ′

i ), or

If C ′ ⊑ ∃r.(F1 ⊓ . . . ⊓ Fk), or If F1 ⊓ . . . ⊓ Fk has an upper neighbor E such that C ′ ⊑ ∃r.E, then fail. Otherwise, output ∃r.(F1 ⊓ . . . ⊓ Fk) ≡ ∃r.D.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 12 / 20

slide-50
SLIDE 50

Complexity for the Optimality Problem

Theorem

The optimality problem is in coNP for compliance and for safety in EL.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 13 / 20

slide-51
SLIDE 51

Complexity for the Optimality Problem

Theorem

The optimality problem is in coNP for compliance and for safety in EL.

We do not know if these problems are also coNP-hard. The Hypergraph Duality Problem (Dual) can be reduced to them. Given two families of inclusion-comparable sets G and H, Dual asks whether H consists exactly of the minimal hitting sets of G.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 13 / 20

slide-52
SLIDE 52

Complexity for the Optimality Problem

Theorem

The optimality problem is in coNP for compliance and for safety in EL.

We do not know if these problems are also coNP-hard. The Hypergraph Duality Problem (Dual) can be reduced to them. Given two families of inclusion-comparable sets G and H, Dual asks whether H consists exactly of the minimal hitting sets of G.

Proposition

There is a polynomial reduction of Dual to the optimality problem for compliance and safety

Adrian Nuradiansyah Thursday Seminar August 20, 2019 13 / 20

slide-53
SLIDE 53

Considering Different Attacker’s Knowledge

What we considered before: Knowledge about individuals Privacy policies Background knowledge of attackers are represented by EL concepts.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 14 / 20

slide-54
SLIDE 54

Considering Different Attacker’s Knowledge

What we considered before: Knowledge about individuals Privacy policies Background knowledge of attackers are represented by EL concepts. Background Knowledge of Attackers: FL0 or FLE concepts?

Adrian Nuradiansyah Thursday Seminar August 20, 2019 14 / 20

slide-55
SLIDE 55

Considering Different Attacker’s Knowledge

What we considered before: Knowledge about individuals Privacy policies Background knowledge of attackers are represented by EL concepts. Background Knowledge of Attackers: FL0 or FLE concepts? FL0 concepts: C, D ::= ⊤ | A | C ⊓ D | ∀r.C FLE concepts: C, D ::= ⊤ | A | C ⊓ D | ∃r.C | ∀r.D

Adrian Nuradiansyah Thursday Seminar August 20, 2019 14 / 20

slide-56
SLIDE 56

Considering Different Attacker’s Knowledge

What we considered before: Knowledge about individuals Privacy policies Background knowledge of attackers are represented by EL concepts. Background Knowledge of Attackers: FL0 or FLE concepts? FL0 concepts: C, D ::= ⊤ | A | C ⊓ D | ∀r.C FLE concepts: C, D ::= ⊤ | A | C ⊓ D | ∃r.C | ∀r.D Subsumption without general TBoxes: in FL0: PTime in FLE: NP-complete In SNOMED CT, the roles have implicit typing constraints, that may be known to an attacker.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 14 / 20

slide-57
SLIDE 57

Extending the Definition of Compliance and Safety

Let C be an EL concept, P be an EL policy, Q ∈ {∀, ∀∃}, and L∀ = FL0, L∀∃ = FLE. The LQ concept C ′ is compliant with P if C ′ ⊑ D for all D ∈ P. The EL concept C ′ is Q-safe for P if C ′ ⊓ C ′′ is compliant with P for all LQ concepts C ′′ that are compliant with P. a Q-safe generalization of C for P if C ⊑ C ′ and C ′ is Q-safe for P, an optimal Q-safe generalization of C for P if

it is a Q-safe generalization of C for P and there is no Q-safe generalization of C for P such that C ′′ ⊏ C ′.

We now focus on ∀-safety and ∀∃-safety

Adrian Nuradiansyah Thursday Seminar August 20, 2019 15 / 20

slide-58
SLIDE 58

Illustrations on ∀-Safety and ∀∃-Safety

Let us consider again D = Patient ⊓ ∃seen_by.(Doctor ⊓ ∃works_in.Cardiology) . . . and the published information C about linda C = Patient ⊓ Female ⊓ ∃seen_by.(Doctor ⊓ Male ⊓ ∃works_in.Cardiology) Note C is not compliant with D, i.e., C ⊑ D. Compute the optimal safe generalization C3 = Female ⊓ ∃seen_by.(Doctor ⊓ Male ⊓ ∃works_in.⊤) ⊓ ∃seen_by.(Male ⊓ ∃works_in.Cardiology) But then, if the attacker’s knowledge is given by an FL0 concept F1 = ∀seen_by.∀works_in.Cardiology, then C3 ⊓ F1 ⊑ D.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 16 / 20

slide-59
SLIDE 59

Illustrations on ∀-Safety and ∀∃-Safety

Let us consider again D = Patient ⊓ ∃seen_by.(Doctor ⊓ ∃works_in.Cardiology) . . . and the published information C about linda C = Patient ⊓ Female ⊓ ∃seen_by.(Doctor ⊓ Male ⊓ ∃works_in.Cardiology) Note C is not compliant with D, i.e., C ⊑ D. Compute an optimal ∀-safe generalization C4 = Male ⊓ Patient ⊓ ∃seen_by.(Doctor ⊓ Female) However, if the attacker’s knowledge is given by an FLE concept F2 = ∀seen_by.∃works_in.Cardiology, then C4 ⊓ F2 ⊑ D.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 16 / 20

slide-60
SLIDE 60

Illustrations on ∀-Safety and ∀∃-Safety

Let us consider again D = Patient ⊓ ∃seen_by.(Doctor ⊓ ∃works_in.Cardiology) . . . and the published information C about linda C = Patient ⊓ Female ⊓ ∃seen_by.(Doctor ⊓ Male ⊓ ∃works_in.Cardiology) Note C is not compliant with D, i.e., C ⊑ D. Compute an optimal ∀-safe generalization C4 = Male ⊓ Patient ⊓ ∃seen_by.(Doctor ⊓ Female) However, if the attacker’s knowledge is given by an FLE concept F2 = ∀seen_by.∃works_in.Cardiology, then C4 ⊓ F2 ⊑ D. Compute the optimal ∀∃-safe generalization C5 = Male

Adrian Nuradiansyah Thursday Seminar August 20, 2019 16 / 20

slide-61
SLIDE 61

Characterizing ∀-Safety

∀-Safety

C ′ is ∀-safe for P iff for all D ∈ P:

  • 1. if rd(D) = 0, then con(C) ∩ con(D) = ∅.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 17 / 20

slide-62
SLIDE 62

Characterizing ∀-Safety

∀-Safety

C ′ is ∀-safe for P iff for all D ∈ P:

  • 1. if rd(D) = 0, then con(C) ∩ con(D) = ∅.
  • 2. if rd(D) > 0, then there is ∃r.D′ ∈ con(D) such that
  • a. if rd(D′) = 0, then there is no concept of the form ∃r.C ′ ∈ con(C),
  • b. if rd(D′) > 0, then for all ∃r.C ′ ∈ con(C), C ′ is ∀-safe for {D′}.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 17 / 20

slide-63
SLIDE 63

Characterizing ∀-Safety

∀-Safety

C ′ is ∀-safe for P iff for all D ∈ P:

  • 1. if rd(D) = 0, then con(C) ∩ con(D) = ∅.
  • 2. if rd(D) > 0, then there is ∃r.D′ ∈ con(D) such that
  • a. if rd(D′) = 0, then there is no concept of the form ∃r.C ′ ∈ con(C),
  • b. if rd(D′) > 0, then for all ∃r.C ′ ∈ con(C), C ′ is ∀-safe for {D′}.

Complexity for ∀-Safety

Deciding whether C ′ is ∀-safe for P is in PTime. One optimal ∀-safe generalization for P can be computed in ExpTime. The set of all optimal ∀-safe generalizations for P can be computed in ExpTime. ∀-optimality is in coNP.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 17 / 20

slide-64
SLIDE 64

Characterizing ∀∃-Safety

∀∃-Safety

C is ∀∃-safe for P iff

  • 1. A ∈ con(C) for all concept names A ∈ con(D1) ∪ . . . ∪ con(Dp), and
  • 2. for all existential restrictions ∃r.D′ ∈ con(D1) ∪ . . . ∪ con(Dp), there is no

concept of the form ∃r.E ∈ con(C)

Adrian Nuradiansyah Thursday Seminar August 20, 2019 18 / 20

slide-65
SLIDE 65

Characterizing ∀∃-Safety

∀∃-Safety

C is ∀∃-safe for P iff

  • 1. A ∈ con(C) for all concept names A ∈ con(D1) ∪ . . . ∪ con(Dp), and
  • 2. for all existential restrictions ∃r.D′ ∈ con(D1) ∪ . . . ∪ con(Dp), there is no

concept of the form ∃r.E ∈ con(C)

Complexity for ∀-Safety

Given EL concepts C, C ′′ and a redundancy-free EL policy P, we can decide if C is ∀∃-safe for P, can compute the unique optimal ∀∃-safe generalization of C for P, and can decide if C ′′ is an optimal ∀∃-safe generalization of C for P in polynomial time

Adrian Nuradiansyah Thursday Seminar August 20, 2019 18 / 20

slide-66
SLIDE 66

Conclusions and Future Work

Conclusions: Define and provide characterizations for compliance, safety, and

  • ptimality in privacy-preserving ontology publishing for EL instance stores.

Computing P-optimal compliant (safe) generalizations of EL concepts. Deciding the optimality problem via computing lower neighbors of EL concepts. Considering attacker’s knowledge to be given by an FL0 or FLE concept.

Adrian Nuradiansyah Thursday Seminar August 20, 2019 19 / 20

slide-67
SLIDE 67

Conclusions and Future Work

Conclusions: Define and provide characterizations for compliance, safety, and

  • ptimality in privacy-preserving ontology publishing for EL instance stores.

Computing P-optimal compliant (safe) generalizations of EL concepts. Deciding the optimality problem via computing lower neighbors of EL concepts. Considering attacker’s knowledge to be given by an FL0 or FLE concept. ⇒ the stronger knowledge of the attacker, the more radical we need to change the

concept to make it safe

Adrian Nuradiansyah Thursday Seminar August 20, 2019 19 / 20

slide-68
SLIDE 68

Conclusions and Future Work

Conclusions: Define and provide characterizations for compliance, safety, and

  • ptimality in privacy-preserving ontology publishing for EL instance stores.

Computing P-optimal compliant (safe) generalizations of EL concepts. Deciding the optimality problem via computing lower neighbors of EL concepts. Considering attacker’s knowledge to be given by an FL0 or FLE concept. ⇒ the stronger knowledge of the attacker, the more radical we need to change the

concept to make it safe

Future Work: PPOP in EL Instance Stores w.r.t. General TBoxes PPOP in EL ABoxes Representing attacker’s knowledge with more different DLs

Adrian Nuradiansyah Thursday Seminar August 20, 2019 19 / 20

slide-69
SLIDE 69

Thank You

Adrian Nuradiansyah Thursday Seminar August 20, 2019 20 / 20