Andrei G. Stoica and Csilla Farkas

Slides:



Advertisements
Similar presentations
Ontology-Based Computing Kenneth Baclawski Northeastern University and Jarg.
Advertisements

Operating System Security
CS570 Artificial Intelligence Semantic Web & Ontology 2
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Using the Semantic Web to Construct an Ontology- Based Repository for Software Patterns Scott Henninger Computer Science and Engineering University of.
Computer Science and Engineering 1 What these organizations have in common? American Education Services, PA United States Marine Corps / Penn State University.
MobiShare: Sharing Context-Dependent Data & Services from Mobile Sources Efstratios Valavanis, Christopher Ververidis, Michalis Vazirgianis, George C.
Chapter 1 – Introduction
Xyleme A Dynamic Warehouse for XML Data of the Web.
Semantic Web and Web Mining: Networking with Industry and Academia İsmail Hakkı Toroslu IST EVENT 2006.
Semantic Web Mobile Internet Technical Architecture Omair Javed Institute of Software Systems Tampere University of Technology.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
1 Augmenting MatML with Heat Treating Semantics Aparna Varde, Elke Rundensteiner, Murali Mani Mohammed Maniruzzaman and Richard D. Sisson Jr. Worcester.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Semantic Web Technologies Lecture # 2 Faculty of Computer Science, IBA.
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
MDC Open Information Model West Virginia University CS486 Presentation Feb 18, 2000 Lijian Liu (OIM:
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
Secure Data Architectures
Training Course 2 User Module Training Course 3 Data Administration Module Session 1 Orientation Session 2 User Interface Session 3 Database Administration.
In The Name Of God. Jhaleh Narimisaei By Guide: Dr. Shadgar Implementation of Web Ontology and Semantic Application for Electronic Journal Citation System.
Computer Science and Engineering 1 XML, RDF, Workflow Security.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
CSCE 548 Secure Software Development Web Application Security.
Data Management Kelly Clynes Caitlin Minteer. Agenda Globus Toolkit Basic Data Management Systems Overview of Data Management Data Movement Grid FTP Reliable.
The Semantic Web William M Baker
Distributed Systems: Concepts and Design Chapter 1 Pages
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
EU Project proposal. Andrei S. Lopatenko 1 EU Project Proposal CERIF-SW Andrei S. Lopatenko Vienna University of Technology
Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia.
updated CmpE 583 Fall 2008 Ontology Integration- 1 CmpE 583- Web Semantics: Theory and Practice ONTOLOGY INTEGRATION Atilla ELÇİ Computer.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
Semantic Web - an introduction By Daniel Wu (danielwujr)
Open Sources -- Intelligence The GoodThe Bad The Ugly Challenges.
Dr. Bhavani Thuraisingham August 2006 Building Trustworthy Semantic Webs Unit #1: Introduction to The Semantic Web.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
©Ferenc Vajda 1 Semantic Grid Ferenc Vajda Computer and Automation Research Institute Hungarian Academy of Sciences.
EEL 5937 Ontologies EEL 5937 Multi Agent Systems Lecture 5, Jan 23 th, 2003 Lotzi Bölöni.
Ontology-Based Computing Kenneth Baclawski Northeastern University and Jarg.
Inference Problem Privacy Preserving Data Mining.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
User Profiling using Semantic Web Group members: Ashwin Somaiah Asha Stephen Charlie Sudharshan Reddy.
Strategies for subject navigation of linked Web sites using RDF topic maps Carol Jean Godby Devon Smith OCLC Online Computer Library Center Knowledge Technologies.
Dr. Bhavani Thuraisingham September 2006 Building Trustworthy Semantic Webs Lecture #5 ] XML and XML Security.
Chapter 10. The Explorer System in Cognitive Systems, Christensen et al. Course: Robots Learning from Humans On, Kyoung-Woon Biointelligence Laboratory.
Csilla Farkas Department of Computer Science and Engineering University of South Carolina
Inference Problem Privacy Preserving Data Mining.
Semantic Interoperability in GIS N. L. Sarda Suman Somavarapu.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
The AstroGrid-D Information Service Stellaris A central grid component to store, manage and transform metadata - and connect to the VO!
Service Oriented Architecture (SOA) Prof. Wenwen Li School of Geographical Sciences and Urban Planning 5644 Coor Hall
Advanced Software Engineering Dr. Cheng
The Semantic Web By: Maulik Parikh.
Web Data and Application Security
Building Trustworthy Semantic Webs
Building Trustworthy Semantic Webs
Knowledge Management Systems
Web Engineering.
Datamining : Refers to extracting or mining knowledge from large amounts of data Applications : Market Analysis Fraud Detection Customer Retention Production.
Chapter 19: Building Systems with Assurance
IS4680 Security Auditing for Compliance
Building Trustworthy Semantic Webs
Data Provenance.
XML, distributed data, replicated data, and Security
XML and Security Csilla Farkas
A framework for ontology Learning FROM Big Data
Presentation transcript:

Andrei G. Stoica and Csilla Farkas Integrated Security Framework for Semantically Enhanced Semi-Structured Data Andrei G. Stoica and Csilla Farkas Department of Computer Science & Engineering University of South Carolina i

Overview Machine understandable data semantics: domain and context definition ontologies metadata What are the security implications? New security mechanisms? New security paradigm?

XML Language High-level application messaging Used for storage application reduces computation overhead uniform access Base for semantic orientated languages - RDF, DAML Increased popularity

Semantic Tools The information process is augmented with a semantic layer. Infrastructure allows computers to reason about data meaning. Computers exchange information transparently on behalf of the user. Implications Intelligent high-volume processing

Security Setup Increased Connectivity + Extensive XML support + Semantic Infrastructure = New Security Threats Established Security Models do not address this dimension: Indirect disclosure Undesired Inference Available inference models difficult to transfer from database security open domains

Related Work Document Instance Security XML Access Control Models Digital Signatures Encryption XML Access Control Models Security labels assignment Multi-level XML Security Extensions from Database Security

Problems? Semantic correlations ignored Inconsistent reply Indirect unauthorized disclosure

Example View over UC data medicalFiles <medicalFiles> UC <countyRec> S <patient> S <name>John Smith </name> UC <phone>111-2222</phone> S </patient> <physician>Jim Dale </physician> UC </countyRec> <milBaseRec> TS <name>Harry Green</name> UC <phone>333-4444</phone> S <physician>Joe White </physician> UC <milTag>MT78</milTag> TS </milBaseRec> </medicalFiles> countyRec milBaseRec physician Jim Dale physician Joe White milTag MT78 patient patient name John Smith phone 111-2222 name Harry Green phone 333-4444 View over UC data

Inference Set of data + associations derive the target data Traditionally a human task At the limit, infer any target given enough related data and metadata.

Problems? If the inference target is confidential information Security Violation

Example Simulation Exploitation Using Open Source Information: Objective: US Government would like to share a limited simulation software with friendly countries. Can this software be used to explore the capabilities of US weaponry? Can sufficient information be found from public sources to create such simulation?

Example Findings: Most of the information needed for the simulation was available on the Internet. Needed human aid to combine available information

Proposed Solution What do we do? XML Views Considering Semantic Dimension. do not disclose more information (including structure of the document). cover stories. Web Inference make sure the information we publish does not lead to our confidential data.

Proposed Solution XML Access Control Global Disclosure Control semantic consistent reply prevent illegal inference from query reply (cover stories). Global Disclosure Control detect and prevent a set of undesired inferences using public Internet data in correlation with public local data

Global Data Privacy Control Security Engine Local Organization Access Control Corrective Measures Request SecView Local XML Database Interface Module Return Oxsegin Update Local Ontology Upload Global Data Privacy Control Local Data Internet Data

Secure XML Views Builds secure & semantic consistent single security level partial views Minimum Semantic Conflict Graph avoids semantic conflicts Multi-Plane DTD Graph MPG structural relationships between tags Andrei Stoica, Csilla Farkas. “Secure XML Views”, In Proc. of IFIP 2002

Example DTD Graph MSCG medicalFiles name phone countyRec milBaseRec emrgRec physician patient milTag physician name phone

Oxsegin Inference Engine Security Violations Corrective Measures Local Classified Database Inference Engine Local Public Database Security Violations Internet Databases Corrective Measures

Corrective Measures Local Public Data Remove information Release misleading information Internet Public Data Target desirable inference results

Inference Engine Replicated Data Inf. Violation Prob. Coef. Pointers Public+Local Database Local Classified Database Violation Pointers Prob. Coef. Correlated Data Inf. Inf. Struct Ontology

Replicated Data Inference Identifies replicated information under different security classifications Violation Pointer = similar units of data at different security levels Inference is guided by inference structures built on ontology concept hierarchy Andrei Stoica, Csilla Farkas. “Ontology guided XML Security Engine”, In Journal of Intelligent Information Systems, to appear.

Replicated Data Inference Inf. Tree Ontology Public Data file Classified Data file  A Patriot Freq. N0 M1 B B C ,  M2 M4 M3 N1 N2 D E PAC-2 Freq. PAC-3 Freq. PAC-2 Freq. PAC-3 Freq. M7 M7 N5 N5 N6 N7 Scientific data on radar components Missiles Tracking Systems Confidence Level (M7,N5) = ƒ (,,,)

Correlated Data Inference Identifies sensitive data in the public domain (relative to a given classified database – usually the local database). Inference guidance: Ontology concept hierarchy Structural similarity of public data Csilla Farkas, Andrei Stoica. “Correlated Data Inference, Ontology Guided XML Security Engine”, In Proc of IFIP 2003.

Correlated Data Inference Features of similarity: Levels of abstraction for each node Distance of associated nodes from association root Similarity of the distances Length of the distance Similarity of sub-trees originating from correlated nodes

Correlated Data Inference Association similarity: Distance of each node from the association root Difference of the distance of the nodes from the association root Similarity of the sub-trees originating at nodes Air show address fort address fort

Correlated Data Inference Object[]. waterSource :: Object basin :: waterSource place :: Object district :: place address :: place base :: Object fort :: base fort address basin district ? base Water source

Correlated Data Inference Object[]. waterSource :: Object basin :: waterSource place :: Object district :: place address :: place base :: Object fort :: base place base Public address fort Public district basin Water Source Water source base Confidential

Summary Secure XML Views provide semantic consistent query reply and cover stories. Oxegin architecture and methods detect undesired inferences Structural similarity Semantic concept hierarchy Confidence in derived inferences

Next Class Stream data