A Semantic e-Wallet to Reconcile Privacy and Context Awareness Fabien L. Gandon & Norman M. Sadeh Mobile Commerce Lab. – Carnegie Mellon University.

Slides:



Advertisements
Similar presentations
Law Awareness in a Norm-regulated MAS Alberto Sardinha Gustavo Robichez de Carvalho Rodrigo Paes Pedro Cunha.
Advertisements

Dr. Leo Obrst MITRE Information Semantics Information Discovery & Understanding Command & Control Center February 6, 2014February 6, 2014February 6, 2014.
Norman Sadeh – Carnegie Mellon University – DAML PI Meeting- Feb. 13, 2002 DAML PI Meeting Status Briefing A Semantic Web Environment for Mobile Context-Aware.
Copyright 2006 Digital Enterprise Research Institute. All rights reserved. MarcOnt Initiative Tools for collaborative ontology development.
TU/e technische universiteit eindhoven Hera: Development of Semantic Web Information Systems Geert-Jan Houben Peter Barna Flavius Frasincar Richard Vdovjak.
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
Building and Analyzing Social Networks Web Data and Semantics in Social Network Applications Dr. Bhavani Thuraisingham February 15, 2013.
Managing enterprise applications as dynamic resources in corporate semantic webs an application scenario for semantic web services. Fabien Gandon, Moussa.
Distributed Artificial Intelligence and Ontology-based Systems for Knowledge Management. Fabien Gandon  Post-doc “Semantic Web Services, Context Awareness.
Proof System HY-566. Proof layer Next layer of SW is logic and proof layers. – allow the user to state any logical principles, – computer can to infer.
Understanding Metamodels. Outline Understanding metamodels Applying reference models Fundamental metamodel for describing software components Content.
ReQuest (Validating Semantic Searches) Norman Piedade de Noronha 16 th July, 2004.
Combining reactive & deliberative agents for complete ecosystems in infospheres Fabien L. Gandon Carnegie Mellon University “The diversity of resources.
Copyright © Norman Sadeh Semantic Web Technologies to Reconcile Privacy and Context Awareness Norman M. Sadeh ISRI- School of Computer Science.
Enterprise Privacy Promises and Enforcement Adam Barth John C. Mitchell.
The Semantic Web An Emerging Successor of the Web By Tim Berners-Lee, James Hendler and Ora Lassila Presentedby Veera Chandra Sekhar.
Service Broker Lesson 11. Skills Matrix Service Broker Service Broker, provides a solution to common problems with message delivery and consistency that.
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
An OWL based schema for personal data protection policies Giles Hogben Joint Research Centre, European Commission.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
What Can Do for You! Fabian Christ
Creating Business Workflow Using SharePoint Designer 2007 Presented by Tarek Ghazali IT Technical Specialist Microsoft SQL Server MVP Microsoft SQL Server.
Knowledge based Learning Experience Management on the Semantic Web Feng (Barry) TAO, Hugh Davis Learning Society Lab University of Southampton.
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
RECALL THE MAIN COMPONENTS OF KIM Functional User Interfaces We just looked at these Reference Implementation We will talk about these later Service Interface.
SAWA: An Assistant for Higher-Level Fusion and Situation Awareness Christopher J. Matheus, Mieczyslaw M. Kokar, Kenneth Baclawski, Jerzy A. Letkowski,
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
Ontologies and Lexical Semantic Networks, Their Editing and Browsing Pavel Smrž and Martin Povolný Faculty of Informatics,
Semantic Web and Policy Workshop Panel Contribution Norman M. Sadeh School of Computer Science Carnegie Mellon University Director, e-Supply Chain Management.
An Ontological Framework for Web Service Processes By Claus Pahl and Ronan Barrett.
Page 1 Alliver™ Page 2 Scenario Users Contents Properties Contexts Tags Users Context Listener Set of contents Service Reasoner GPS Navigator.
Department of computer science and engineering Two Layer Mapping from Database to RDF Martin Švihla Research Group Webing Department.
Dr. Bhavani Thuraisingham August 2006 Building Trustworthy Semantic Webs Unit #1: Introduction to The Semantic Web.
©Ferenc Vajda 1 Semantic Grid Ferenc Vajda Computer and Automation Research Institute Hungarian Academy of Sciences.
Context Awareness: From Dream to Reality Norman M. Sadeh School of Computer Science Carnegie Mellon University Research Sponsors: DARPA/DAML, IBM, Boeing,
SEMANTIC AGENT SYSTEMS Towards a Reference Architecture for Semantic Agent Systems Applied to Symposium Planning Usman Ali.
Using Several Ontologies for Describing Audio-Visual Documents: A Case Study in the Medical Domain Sunday 29 th of May, 2005 Antoine Isaac 1 & Raphaël.
A Policy Based Approach to Security for the Semantic Web Lalana Kagal, Tim Finin and Anupam Joshi.
Dr. Bhavani Thuraisingham The University of Texas at Dallas Trustworthy Semantic Webs March 25, 2011 Data and Applications Security Developments and Directions.
Exploitation of Semantic Web Technology in ERP Systems Amin Andjomshoaa, Shuaib Karim Ferial Shayeganfar, A Min Tjoa (andjomshoaa, skarim, ferial,
Introduction to Semantic Web Service Architecture ► The vision of the Semantic Web ► Ontologies as the basic building block ► Semantic Web Service Architecture.
Supporting FIPA Interoperability for Legacy Multi-Agent Systems Christos Georgousopoulos 1 Omer F. Rana 1 ( ) 2.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Vision for Semantic Web.
Of 33 lecture 1: introduction. of 33 the semantic web vision today’s web (1) web content – for human consumption (no structural information) people search.
CoOL: A Context Ontology Language to Enable Contextual Interoperability Thomas Strang, Claudia Linnhoff-Popien, and Korbinian Frank German Aerospace Centor.
1 Open Ontology Repository initiative - Planning Meeting - Thu Co-conveners: PeterYim, LeoObrst & MikeDean ref.:
An Ontology-based Approach to Context Modeling and Reasoning in Pervasive Computing Dejene Ejigu, Marian Scuturici, Lionel Brunie Laboratoire INSA de Lyon,
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
NSF Cyber Trust Annual Principal Investigator Meeting September 2005 Newport Beach, California UMBC an Honors University in Maryland Trust and Security.
CIMA and Semantic Interoperability for Networked Instruments and Sensors Donald F. (Rick) McMullen Pervasive Technology Labs at Indiana University
Event-Based Model for Reconciling Digital Entities Ahmet Fatih Mustacoglu Ahmet E. Topcu Aurel Cami Geoffrey C. Fox Indiana University Computer Science.
Selected Semantic Web UMBC CoBrA – Context Broker Architecture  Using OWL to define ontologies for context modeling and reasoning  Taking.
MTA SZTAKI Department of Distributed Systems Hogyan mixeljünk össze webszolgáltatásokat, ontológiákat és ágenseket? Micsik András.
A Multi-Agent and Service-Oriented Architecture for Developing Integrated and Intelligent WBES Computing and Information Systems Oscar Lin Peter Holt.
1 Web Services for Semantic Interoperability and Integration Tim Finin University of Maryland, Baltimore County Dagstuhl, 20 September 2004
Versatile Information Systems, Inc International Semantic Web Conference An Application of Semantic Web Technologies to Situation.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Policy Systems Presented By: John Paul Dunning Usable Security – CS.
Architecture Ecosystem SIG March 2010 Update Jacksonville FL.
XML and Distributed Applications By Quddus Chong Presentation for CS551 – Fall 2001.
Secure Access and Mobility Jason Kunst, Technical Marketing Engineer March 2016 Location Based Services with Mobility Services Engine ISE Location Services.
AGENT SERVICES FRAMEWORK FOR HANDHELD DEVICES SUPERVISOR: DR MUHAMMAD ASLAM Domain: Artificial Intelligence(AI) Muhammad Ali (09-MS-CE-11),
Kundan Singh Venkatesh Oct 2013
A Context Framework for Ambient Intelligence
Wsdl.
Web Services for Semantic Interoperability and Integration
Analyzing and Securing Social Networks
Introduction to the Semantic Web example applications
AGENT FRAMEWORK By- Arpan Biswas Rahul Gupta.
Presentation transcript:

A Semantic e-Wallet to Reconcile Privacy and Context Awareness Fabien L. Gandon & Norman M. Sadeh Mobile Commerce Lab. – Carnegie Mellon University

Mobile Commerce Lab. CMU / 2Motivations Pervasive Computing −Multiple sources of contextual information e.g. calendar, location tracking, organizational info, pref. Virtual Enterprise Collaboration −Selectively sharing of information with prospective and actual customers and suppliers e.g. collaborative design, supplier evaluation, available-to- promise/capable-to-promise information, order tracking Rather than exposing all these resources as individual semantic web services, organizations and individuals will want to have unified gateways to their information… “e-Wallets” to allow resource identification & enforce confidentiality logic

Mobile Commerce Lab. CMU / 3 Vision - myCampus Campus as “everyday life microcosm” Enhance campus life through context-aware services accessible over a WLAN Approach: −Involve stakeholders in the design −Semantic Web and agent technologies A growing collection of context-aware agents that: −Users can pull into their own personal environment −Customize themselves through automated identification and access of relevant contextual resources

Mobile Commerce Lab. CMU / 4 FIPA ACL messages and OWL Content JADE platform User Interaction Agent Directory Facilitator Agent (FIPA) Agent Management Agent (FIPA) e-Wallet Manager Agent Ontologist Agent Task-Specific Agents

Mobile Commerce Lab. CMU / 5 Directory Facilitator Agent (FIPA) Agent Management Agent (FIPA) e-Wallet Manager Agent Ontologist Agent Task-Specific Agents FIPA ACL messages and OWL Content JADE platform User Interaction Agent behavior Servlet Tomcat server HTTP Request session

Mobile Commerce Lab. CMU / 6 e-Wallet Manager Agent Ontologist Agent Task-Specific Agents FIPA ACL messages and OWL Content JADE platform User Interaction Agent Directory Facilitator Agent (FIPA) Yellow Pages Type Service Owner … White Pages Name Address … Agent Management Agent (FIPA) HTTP Request

Mobile Commerce Lab. CMU / 7 Directory Facilitator Agent (FIPA) Agent Management Agent (FIPA) Task-Specific Agents FIPA ACL messages and OWL Content JADE platform User Interaction Agent HTTP Request e-Wallet Manager Agent Ontologist Agent XSLT edition Ontologies visualization download

Mobile Commerce Lab. CMU / 8 Directory Facilitator Agent (FIPA) Agent Management Agent (FIPA) FIPA ACL messages and OWL Content User Interaction Agent HTTP Request e-Wallet Manager Agent Ontologist Agent Task-Specific Agents JADE platform

Mobile Commerce Lab. CMU / 9 Directory Facilitator Agent (FIPA) Agent Management Agent (FIPA) Ontologist Agent Task-Specific Agents FIPA ACL messages and OWL Content JADE platform User Interaction Agent e-Wallet Manager Agent JESS XSLT OWL (ontologies, annotations) Rules (definitions, services, privacy) Queries edition results

Mobile Commerce Lab. CMU / 10e-Wallet Each user has a semantic e-Wallet −Automated identification and access of a user’s personal resources subject to privacy preferences −Personal resources implemented as semantic Web services Needs for procedural knowledge i.e. rules −Resource identification rules −Privacy / confidentiality rules Access Control rules e.g. “Only my colleagues can see my location” Obfuscation rules e.g. “My colleagues can only see the building I am in but not the actual room” Note: The same concept applies to virtual organizations and B2B scenarios

e- Asserting elementary needs for authorized information Pre-check access rights Post-check access rights Fetch useful static knowledge Application of obfuscation rules Query context assertion Query Assertion of authorized knowledge Result Call relevant external services Example: Query from John inquiring about Mary’s location Step-1 The sender of the query is John. Step-2 The query requires finding Mary’s location. Step-3 (a) Is John allowed to see Mary’s location given what we currently know? (b) Checking Mary’s privacy/confidentiality preferences, e.g.: Only her colleagues can see her location – and only when she is on campus. (c) Is John a colleague of Mary? Yes. Step-4 No action in this example. Step-5 Finding Mary’s location by accessing some location tracking functionality or looking in her calendar. Step-6 Is Mary on campus? Yes. Step-7 Checking Mary’s obfuscation rules e.g. Mary is only willing to disclose the building she is in but not the specific room. Step-8 “Mary is in Smith Hall”.

Mobile Commerce Lab. CMU / 12 privacy query answer Design of an e-Wallet Three-layer architecture: security through typing −Core knowledge: static & dynamic knowledge of user −Service Layer: invoke external sources of knowledge - web services and personal resources −Privacy layer: enforce privacy rules on external requests - access control & obfuscation −Backward chaining migration: privacy rules, service rules, static migration rules service Core Know- ledge (deftemplate authorized_triple (slot predicate (default "")) (slot subject (default "")) (slot object (default "")) ) (deftemplate authorized_triple (slot predicate (default "")) (slot subject (default "")) (slot object (default "")) ) (deftemplate service_triple (slot predicate (default "")) (slot subject (default "")) (slot object (default "")) ) (deftemplate service_triple (slot predicate (default "")) (slot subject (default "")) (slot object (default "")) ) (deftemplate triple (slot predicate (default "")) (slot subject (default "")) (slot object (default "")) ) (deftemplate triple (slot predicate (default "")) (slot subject (default "")) (slot object (default "")) )

Mobile Commerce Lab. CMU / 13 privacy query answer e- Design of an e-Wallet Three-layer architecture: security through typing −Core knowledge: static & dynamic knowledge of user −Service Layer: invoke external sources of knowledge - web services and personal resources −Privacy layer: enforce privacy rules on external requests - access control & obfuscation −Backward chaining migration: privacy rules, service rules, static migration rules Asserting elementary needs for authorized information Pre-check access rights Post-check access rights Fetch useful static knowledge Application of obfuscation rules Query context assertion Query Assertion of authorized knowledge Result Call relevant external services service Core Know- ledge

Mobile Commerce Lab. CMU / 14 e-Wallet and representation needs Static assertional knowledge: −User’s static profile: OWL annotations. −Static contextual knowledge: OWL annotations. Dynamic assertional knowledge: −User’s dynamic profile: Rules in (R)OWL to update profile Result: entailed facts −Dynamic contextual knowledge: Rules in (W)OWL to identify and invoke web services Result: facts returned by the web service −Security and privacy Rules in (S)OWL to grant access and obfuscate Result: authorized facts for query solving Ontologies in OWL.

Mobile Commerce Lab. CMU / 15 Summary on the e-Wallet implementation OWL Meta-model in CLIPS OWL Meta-model in CLIPS Ontology in OWL Ontology in OWL Annotation in OWL Annotation in OWL Rule in (R)OWL Rule in (R)OWL Services in (W)OWL Services in (W)OWL Privacy in (S)OWL Privacy in (S)OWL Query in (Q)OWL Query in (Q)OWL Ontology stylesheet Ontology stylesheet & Annotation stylesheet Annotation stylesheet & Rule stylesheet Rule stylesheet & Service stylesheet Service stylesheet & Privacy stylesheet Privacy stylesheet & Query stylesheet Query stylesheet & Ontology in CLIPS Ontology in CLIPS Annotation in CLIPS Annotation in CLIPS Rule in CLIPS Rule in CLIPS Service rule in CLIPS Service rule in CLIPS Privacy rule in CLIPS Privacy rule in CLIPS Query rules in CLIPS Query rules in CLIPS XSLT Engine Result in OWL Result in OWL JESS

Mobile Commerce Lab. CMU / 16 e-Wallet semantic engine RDF Triple model RDFS & OWL meta-model (e.g., symmetry of properties) (deftemplate triple "Template representing a RDF triple" (slot predicate (default "")) (slot subject (default "")) (slot object (default "")) ) (deftemplate triple "Template representing a RDF triple" (slot predicate (default "")) (slot subject (default "")) (slot object (default "")) ) Triple: (predicate, subject, object) SymmetricProperty SymmetricProperty (triple (predicate " (subject " (object " ) (defrule symmetry (declare (salience 100)) (triple (predicate " (subject ?p) (object " (triple (predicate ?p) (subject ?x) (object ?y)) => (assert (triple (predicate ?p) (subject ?y) (object ?x))) ) (triple (predicate " (subject " (object " ) (defrule symmetry (declare (salience 100)) (triple (predicate " (subject ?p) (object " (triple (predicate ?p) (subject ?x) (object ?y)) => (assert (triple (predicate ?p) (subject ?y) (object ?x))) )

Mobile Commerce Lab. CMU / 17 e-Wallet semantic engine Ontologies: (e.g., declare person, location, etc.) Annotations: (e.g., Mary is in Smith Hall, etc.) Available online with XSLT translation stylesheets (triple (predicate " (subject " (object " )... (triple (predicate " (subject " (object " )... (triple (predicate " (subject " (object " )... (triple (predicate " (subject " (object " )...

Mobile Commerce Lab. CMU / 18 e-Wallet semantic engine Rules: (e.g., when in I am in a meeting I am busy) Meeting means busy Meeting means busy (defrule Meeting-means-busy... (triple (predicate " (subject ?person) (object ?activity)) (triple (predicate " ") (subject ?activity) (object " ") ) =>...(assert (triple (predicate " (subject ?person)(object " ") (defrule Meeting-means-busy... (triple (predicate " (subject ?person) (object ?activity)) (triple (predicate " ") (subject ?activity) (object " ") ) =>...(assert (triple (predicate " (subject ?person)(object " ")

Mobile Commerce Lab. CMU / 19 Service rules provide location for IP Address &variable;#ip GetLocation &variable;#ip provide location for IP Address &variable;#ip GetLocation &variable;#ip (defrule provide-location-for-IP-Address (declare (salience 50)) … (need-dynamic_triple (predicate " (subject ?entity) (object ?location) ) … => (call-web-service " qname " " " (…) " ip " ?ip) ) (defrule provide-location-for-IP-Address (declare (salience 50)) … (need-dynamic_triple (predicate " (subject ?entity) (object ?location) ) … => (call-web-service " qname " " " (…) " ip " ?ip) )

Mobile Commerce Lab. CMU / 20 Privacy rules people can only know I am on or off campus people can only know I am on or off campus Privacy rule: grant access to location when on campus but obfuscate precision truth

Mobile Commerce Lab. CMU / 21Query (defrule query (declare (salience 0)) … (authorized_triple (predicate " (subject " (object ?location)) => (store-result location ?location) ) (defrule query (declare (salience 0)) … (authorized_triple (predicate " (subject " (object ?location)) => (store-result location ?location) ) Query context assertion: query sent by John Query rule definition −Body: request for authorized triples −Head: storage & pretty printing function (triple (predicate " (subject "") (object " )... (triple (predicate " (subject "") (object " )...

Mobile Commerce Lab. CMU / 22 Directory Facilitator Agent (FIPA) Agent Management Agent (FIPA) Ontologist Agent Task-Specific Agents FIPA ACL messages and OWL Content JADE platform User Interaction Agent HTTP Request e-Wallet Manager Agent JESS XSLT OWL (ontologies, annotations) Rules (definitions, services, privacy) Queries edition results

Mobile Commerce Lab. CMU / 23 Concluding remarks Rather than directly publishing Web services, individuals and organizations will often want to expose a unified front-end (“e-Wallet”) that: −Enforces automated resource identification logic −Enforces privacy/confidentiality (access & obfuscation) Implementation: −Multi-layer reasoning engine that distinguishes between different types of knowledge (core k., service invocation k., k. sanitized following application of confidentiality rules) −OWL & rule extension (essentially Horn clauses & variables) and rule editor Validation with students accessing context-aware agents on CMU’s campus

Source: Q&A Fabien L. Gandon Norman M. Sadeh