Semantics for Privacy and Context Tim Finin University of Maryland, Baltimore County Joint work with Anupam Joshi, Prajit Das, Primal Pappachan, Eduado.

Slides:



Advertisements
Similar presentations
Improving Learning Object Description Mechanisms to Support an Integrated Framework for Ubiquitous Learning Scenarios María Felisa Verdejo Carlos Celorrio.
Advertisements

The Internet and the Web
DELOS Highlights COSTANTINO THANOS ITALIAN NATIONAL RESEARCH COUNCIL.
Ellucian Mobile: Don’t text and drive, kids!
MobiShare: Sharing Context-Dependent Data & Services from Mobile Sources Efstratios Valavanis, Christopher Ververidis, Michalis Vazirgianis, George C.
Building Enterprise Applications Using Visual Studio ®.NET Enterprise Architect.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
Building Robust and Automatic Authentication Systems with Activity- Based Personal Questions Mentor: Danfeng Yao Anitra Babic Chestnut Hill College Computer.
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 1: Introduction to Decision Support Systems Decision Support.
Top 10 Strategic Technology Trends for 2013 A Channel Partners Slide Show … as highlighted at.
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Norman SecureSurf Protect your users when surfing the Internet.
Smart Learning Services Based on Smart Cloud Computing
OWASP Mobile Top 10 Why They Matter and What We Can Do
Semantics for Big Data (,) Security and Privacy Tim Finin and Anupam Joshi University of Maryland, Baltimore County Baltimore MD NSF Workshop on Big Data.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
By Mihir Joshi Nikhil Dixit Limaye Pallavi Bhide Payal Godse.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Anupam Joshi and Tim Finin Ebiquity UMBC
Semantic Web outlook and trends May The Past 24 Odd Years 1984 Lenat’s Cyc vision 1989 TBL’s Web vision 1991 DARPA Knowledge Sharing Effort 1996.
Tim Finin University of Maryland, Baltimore County Joint work with Anupam Joshi, Laura Zavala, Radhika Dharurkar, Pramod Jagtap, Dibyajyoti Ghosh and Amey.
An approach to Intelligent Information Fusion in Sensor Saturated Urban Environments Charalampos Doulaverakis Centre for Research and Technology Hellas.
Intelligent Agents Meet the Semantic Web in Smart Spaces Harry Chen,Tim Finin, Anupam Joshi, and Lalana Kagal University of Maryland, Baltimore County.
Tables to Linked Data Zareen Syed, Tim Finin, Varish Mulwad and Anupam Joshi University of Maryland, Baltimore County
Database System Concepts and Architecture
Tim Finin University of Maryland, Baltimore County 29 January 2013 Joint work with Anupam Joshi, Laura Zavala and our students SRI Social Media Workshop.
Requirements Review – July 21, Requirements for CMS Patricia McBride July 21, 2005.
Atomate It! End-user Context- Sensitive Automation using Heterogeneous Information Sources on the Web Max Van Kleek et el. MIT Presented by Sangkeun Lee,
UMBC iConnect Audumbar Chormale, Dr. A. Joshi, Dr. T. Finin, Dr. Z. Segall.
The Ubiquitous Web as a model to lead our environment to its full potential Juan Ignacio Vazquez, Joseba Abaitua, Diego López de Ipiña W3C Workshop on.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
Semantics for Cybersecurity and Privacy Tim Finin, UMBC Joint work with Anupam Joshi, Karuna Joshi, Zareen Syed andmany UMBC graduate students
Future Learning Landscapes Yvan Peter – Université Lille 1 Serge Garlatti – Telecom Bretagne.
Page 1 Alliver™ Page 2 Scenario Users Contents Properties Contexts Tags Users Context Listener Set of contents Service Reasoner GPS Navigator.
MyActivity: A Cloud-Hosted Ontology-Based Framework for Human Activity Querying Amin BakhshandehAbkear Supervisor:
Exploitation of Semantic Web Technology in ERP Systems Amin Andjomshoaa, Shuaib Karim Ferial Shayeganfar, A Min Tjoa (andjomshoaa, skarim, ferial,
Laura Zavala, Radhika Dharurkar, Pramod Jagtap, Tim Finin, Anupam Joshi and Amey Sane University of Maryland, Baltimore County AAAI Workshop on Activity.
Chapter 2 Securing Network Server and User Workstations.
Human Tracking System Using DFP in Wireless Environment 3 rd - Review Batch-09 Project Guide Project Members Mrs.G.Sharmila V.Karunya ( ) AP/CSE.
© 2010 Health Information Management: Concepts, Principles, and Practice Chapter 5: Data and Information Management.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Vision for Semantic Web.
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
Security Analytics Thrust Anthony D. Joseph (UCB) Rachel Greenstadt (Drexel), Ling Huang (Intel), Dawn Song (UCB), Doug Tygar (UCB)
Tim Finin University of Maryland, Baltimore County UMBC HON 300 / CMSC491, Spring 2012 Joint work with Anupam Joshi, Laura Zavala, Radhika Dharurkar, Pramod.
Temporal Ontology Shervin Daneshpajouh ce.sharif.edu/~daneshpajouh.
Issues in Ontology-based Information integration By Zhan Cui, Dean Jones and Paul O’Brien.
Computational Policies in a Need to Share Environment Tim Finin University of Maryland, Baltimore County SemGrail workshop, Redmond WA, 21 June 2007.
Role Of Network IDS in Network Perimeter Defense.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Making Software Agents Smarter Tim Finin University of Maryland, Baltimore County ICAART 2010, 22 January 2010
CISC 849 : Applications in Fintech Vaishnavi Gandra Dept of Computer & Information Sciences University of Delaware Extracting Cybersecurity Related Linked.
GoRelations: an Intuitive Query System for DBPedia Lushan Han and Tim Finin 15 November 2011
Getting Started Telligent or SharePoint (or Hybrid)?
1 Security and Dependability Organizational Patterns - A Proof of Concept Demo for SERENITY A. Saidane, F. Dalpiaz, V.H. Nguyen, F. Massacci.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Ray Chambers My Digital Story Independent Learning Helping students flip the learning and control the outcome they want. Start Collaboration Helping students.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
 GEETHA P.  Originally coined by Tim O’Reilly Publishing Media  Second generation of services available on www.  Lets people collaborate and share.
Anupam Joshi University of Maryland, Baltimore County Joint work with Tim Finin and several students Computational/Declarative Policies.
Building Enterprise Applications Using Visual Studio®
Chapter 10: Web Basics.
FaceBlock: Semantic Context-Aware Privacy for Mobile Devices
Secure Software Confidentiality Integrity Data Security Authentication
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Mobile, Collaborative and Context-Aware Systems
Wikitology Wikipedia as an Ontology
Presentation transcript:

Semantics for Privacy and Context Tim Finin University of Maryland, Baltimore County Joint work with Anupam Joshi, Prajit Das, Primal Pappachan, Eduado Mena and Roberto Yus

The plot outline Today’s focus on big data requires semantics → Variety → Need for integration & fusion → Must understand data semantics → Use semantic languages & tools (reasoners, ML) → Have shared ontologies & background knowledge Relevance to privacy and security – Protect personal information, esp. in mobile/IOT – Understanding and using context is often useful if not critical – Security relevant as as intrusions lead to loss of privacy

Use Case Examples We’ve used semantic technologies in support of assured information tasks including – Representing & enforcing information sharing policies – Negotiating for cloud services respecting organizational constraints (e.g., data privacy, location, …) – Modeling context for mobile users and using this to manage information sharing – Acquiring, using and sharing knowledge for situationally-aware intrusion detection systems Key technologies include Semantic Web languages (OWL, RDF) and tools and information extraction from text

Context-Aware Privacy & Security Smart mobile devices know a great deal about their users, including their current context Sensor data, , calendar, social media, … Acquiring & using this knowledge helps them provide better services Context-aware policies can be used to limit information sharing as well as to control the actions and information access of mobile apps Sharing context with other users, organizations and service providers can also be beneficial Context is more than time and GPS coordinates We’re in a two-hour budget meeting at X with A, B and C We’re in a impor- tant meeting We’re busy

Simple Context Ontology Light-weight, upper level context OWL ontology Centered around the concepts for: users, conceptual places, geo- places, activities, roles, space, and time Conceptual places such as at work and at home Activities occur at places & involve users filling roles LOD resources provide background knowledge

Context / situation recognition Train Classifiers Decision Trees Naïve Bayes SVM Feature Vector Time, Noise level in db (avg, min, max), accel 3 axis (avg, min, max, magnitude, wifis, … Train HMM models

Context-aware Privacy Policies We use declarative policies that can access the user’s profile and context model for privacy and security One use is to control what information we share with whom and in what context Another is to control the actions that an app can take (e.g., enable camera, access SD card) depending on the context A third is to obfuscate some shared information (e.g., location)

Context-aware Policies for Sharing Android's policies are limited Privacy controls in existing applications are limited – Friends Only and Invisible restrictions common – Not context-dependent but static and pre- determined Controls to share other data largely non-existent

Context-aware Policies for Sharing Android's policies are very limited Privacy controls in existing location sharing applications are limited – Friends Only and Invisible restrictions common – Not context-dependent but static and pre- determined Controls to share other data largely non-existent Static Information Aspects of Context Generalization of Context Temporal Restrictions Context Restrictions Requester’s Context

Location Generalization GeoNames spatial containment knowledge from the LOD cloud is used when populating the KB – Share my location with manager on weekdays from 9am-5pm User’s exact location in terms of GPS co-ordinates is shared The user may prohibit sharing GPS co-ordinates but permit sharing city-level location – Share my building-wide location with co workers not in my team on weekdays from 9am-5pm – Do not share location on weekends.

Location Generalization GeoNames spatial containment knowledge from the LOD cloud is used when populating the KB – Share my location with teachers on weekdays from 9am-5pm User’s exact location in terms of GPS co-ordinates is shared The user may prohibit sharing GPS co-ordinates but permit sharing city-level location – Share my building-wide location with teachers on weekdays from 9am-5pm

Activity Generalization – Share my activity with friends on weekends User’s current activity shared with friends on weekends Share more generalized activity rather that precise confidential project meeting => Office Meeting => Working => Busy, Date => Meeting Friends – User clearly needs to obfuscate certain pieces of activity information to protect her context info – Share my public activity with friends on weekends Public is a visibility option

Activity Generalization – Share my activity with friends on weekends User’s current activity shared with friends on weekends Share more generalized activity rather that precise confidential project meeting => Working, Date => Meeting – User clearly needs to obfuscate certain pieces of activity information to protect her context info – Share my public activity with friends on weekends Public is a visibility option

Context-aware power management Maintaining context model uses power We empirically determine power usage for a phone’s sensors and use this for optimization

Context-aware power management Maintaining the context model use power We developed an accurate power models for a phone’s sensors and use this for optimization When updating context model 1. Only enable sensors required by policy, reuse recent sensor readings whenever appropriate e.g., disable GPS sensor when at home in evening 2. Prefer sensors with lower energy footprint or already in use when several available e.g., Choose Wifi to GPS for location at office during day 3.Reorder rule conditions to reduce energy use e.g., Check conditions requiring no sensor access first When updating context model 1. Only enable sensors required by policy, reuse recent sensor readings whenever appropriate e.g., disable GPS sensor when at home in evening 2. Prefer sensors with lower energy footprint or already in use when several available e.g., Choose Wifi to GPS for location at office during day 3.Reorder rule conditions to reduce energy use e.g., Check conditions requiring no sensor access first

Collaborative Context Sharing Like Blanche DuBois, we have always depended on the kindness of strangers We are cooperative & ask one another for info. – Stanger on the street: Does this bus go to the aquarium? – Random classmate in next seat: When is HW6 due? Devices can use ad hoc networks (e.g., Bluetooth) to query nearby devices for desired information Each device uses a policy for what triples it’s willing to share with whom in what context  Mobile Ad Hoc Knowledge Network

Collaboratively Constructed Contexts A co-located group of devices can collaborate to share some context information – Exploit their different sensors and context detection/modeling capabilities – Consensus modeling can improve accuracy and overcome errors & malicious misinformation Policies and context determine what to share with whom and in what context We’ve designed an approach to detect/create groups and share information and used an Android prototype for simple evaluations

Collaborative Context Use Case Four GCC students with five devices in GCC library. All what to know where they are and what they’re doing

Collaborative Context Use Case Abed, Annie & Jeff are in a study group. Jeff has a phone and tablet. Pierce just happens to be there.

Collaborative Context Use Case Jeff’s phone knows it in room 7 and that he’s talking; Annie’s tablet think’s she’s at home.

Context Sharing With help from context synthesizers, participants can have an appropriate consensus model Study group (Abed, Annie, Jeff): “study group about Spanish, duration of one hour, partici- pants: Jeff, Abed, Annie” In room (all): “in study room 7, in Greendale Community College, temp: 25 o C, lights on” Jeff's devices: + "heart_rate:70bpm"

Context Ontology Assume devices use a shared, ontology for context Prototype uses JFact for DL reasoning on Android devices

Architecture Context providers have information to share Context synthesizers integrate, de-conflict & enrich data Prototype uses secure communication over Bluetooth

Context Groups Context synthesizer recognizes groups and creates default groups Predefined (e.g., ACM student chapter) Default groups created for identity, location and activity Provider’s own policies control what is shared with a group

Context integration and reconciliation coments

Faceblock Click image to play 80 second video or go to YoutubeYoutube

Conclusion Google’s new slogan: things, not strings We can construct context models in semantic languages using data from sensors, calendars and other sources Semantic policies for information sharing can manage what is shared with whom and in what context Additional protocols and infrastructure will permit dynamic collaborative context models

Intrusion Detection Systems Current intrusion detection systems poor for zero-day and “low and slow” attacks, and APTs Sharing Information from heterogeneous data sources can provide useful information even when an attack signature is unavailable Implemented prototypes that integrate and reason over data from IDSs, host and network scanners, and text at the knowledge level We’ve established the feasibility of the approach in simple evaluation experiments

From dashboards & watchstanding (Simple) Analysis

Threat/Vulnerability Alert Knowledge Base ReasonerOntology Domain Expert Knowledge RDFS Knowledge Web Text Sources (Blogs, Forums, Feeds) Entity/Concept Extractor Named Entities Security Vulnerability Entities Extractor Security Vulnerability Terms IDS/IPS sensors Reports and Logs Host Based Activity Monitor Host Activity Logs Network Activity Monitor Network Activity Logs Hardware Security Sensors Security Logs System Architecture 2

… to situational awareness Non Traditional “Sensors” Traditional Sensors Facts / Information Context/Situation Rules Policies Analytics Alerts Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 …. [ a IDPS:text_entity; IDPS:has_vulnerability_term "true"; IDPS:has_security_exploit "true"; IDPS:has_text “Internet Explorer"; IDPS:has_text “arbitrary code "; IDPS:has_text "remote attackers".] [ a IDPS:system; IDPS:host_IP " ”.] [ a IDPS:scannerLog IDPS:scannerLogIP " "; …] [ a IDPS:gatewayLog IDPS:gatewayLogIP " "; …] [ IDPS:scannerLog IDPS:hasBrowser ?Browser IDPS:gatewayLog IDPS:hasURL ?URL ?URL IDPS:hasSymantecRating “unsafe” IDPS: scannerLog IDPS:hasOutboundConnection “true” IDPS:WiresharkLog IDPS:isConnectedTo ?IPAddress ?IPAddress IDSP:isZombieAddress “true”] => [IDPS:system IDPS:isUnderAttack “user-after-free vulnerability” IDPS:attack IDPS:hasMeans “Backdoor” IDPS:attack IDPS:hasConsequence “UnautorizedRemoteAccess”]

Maintaining the vulnerability KB Our approach requires us to keep the KB of software products and known or suspected vulnerabilities and attacks up to date Resources like NVD are great, but tapping into text can enrich their info and give earlier warn-ings of problems CVE disclosed (01/14/13) Vendor deploys software Attacker finds vuln. & exploits it (01/10/13) Exploit reported in mailing list (01/10/13) Vuln. reported in NVD RSS feed Analysis Vuln. Analyzed & included in NVD feed (02/16/2013) Vendor Analysis Threat disclosed in vendor bulletin (03/04/2013) Patch development Patch released (Critical Patch Update) (06/18/2013) Resolution System update

Information extraction from text CVE Buffer overflow in msvcrt.dll in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted media file, aka ”Msvcrt.dll Buffer Overflow Vulnerability.” ebqids:hasMean s Identify relationships e/Buffer_overflow Link concepts to entities ows_7 ebqids:affectsProduct We use information extraction techniques to identify entities, relations and concepts in security related text These are mapped to terms in our ontology and the DBpedia LOD KB (based on Wikipedia) Google’s slogan: “Things, not strings”

Security Bulletins Blogs Maintaining the vulnerability KB Unstructured Data (Vuln. Summaries) Entity & Concept Spotter Extracted Concepts Web Text Triple Store NVD dataset Structured Data (XML) IDS Ontology Linked Cybersecurity Data Consumers Linking & Mapping Entities RDF Generation

Populating KBs from Text Kelvin is a system for populating KBs with entities and relations extracted from text – Developed at JHU Human Language Technology Center of Excellence – E.g., extracts 300K entities and 3M relations from 50K newswire articles Supports analytics at KB level: inference, proba- bilistic reasoning, entities linking across KBs, … Top system in 2012 & 2013 NIST Text Analytics Conference Coldstart KBP task evaluations

Faceblock Ontology Faceblock’s (OWL) ontology lets one to write context policy rules using predefined activity and place types

Faceblock Ontology Faceblock’s (OWL) ontology lets one to write context policy rules using predefined activity and place types

Faceblock Protocols User device maintains context, reasons with policy rules and informs glass devices of Faceblock property: True or Fase

Taming Wild Big Data WBD is structured or semi-structured data for which we lack schema-level understanding – e.g, raw tables, graphs, xml, logs Developed tools to generate semantic data from background ontologies & KBs, e.g. for clinical trial tables It’s harder when the domain is not even known. We’re developing systems that use large background KBs (e.g., Google’s Freebase) to predict types/subtypes of data instances