Extending context models for privacy in pervasive computing environments Jadwiga Indulska The School of Information Technology and Electrical Engineering,

Slides:



Advertisements
Similar presentations
Entity Relationship Diagrams
Advertisements

Improving Learning Object Description Mechanisms to Support an Integrated Framework for Ubiquitous Learning Scenarios María Felisa Verdejo Carlos Celorrio.
Data Modeling and Database Design Chapter 1: Database Systems: Architecture and Components.
Towards a hybrid approach to context modelling, reasoning and interoperation Karen Henricksen CRC for Enterprise Distributed Systems Technology (DSTC)
ISBN Chapter 3 Describing Syntax and Semantics.
Using XACML Policies to Express OAuth Scope Hal Lockhart Oracle June 27, 2013.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 7 Data Modeling Using the Entity- Relationship (ER) Model.
Pervasive Enablement of Business Process 徐天送 2004/11/2.
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 1: Introduction to Decision Support Systems Decision Support.
Introduction to Databases Transparencies
Describing Syntax and Semantics
C++ for Engineers and Scientists Third Edition
Chapter 8 Structuring System Data Requirements
1 Pertemuan 04 MODEL RELASIONAL Matakuliah: >/ > Tahun: > Versi: >
BIS310: Week 7 BIS310: Structured Analysis and Design Data Modeling and Database Design.
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 10 Structuring.
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
Computer System Analysis Chapter 10 Structuring System Requirements: Conceptual Data Modeling Dr. Sana’a Wafa Al-Sayegh 1 st quadmaster University of Palestine.
CSE314 Database Systems Data Modeling Using the Entity- Relationship (ER) Model Doç. Dr. Mehmet Göktürk src: Elmasri & Navanthe 6E Pearson Ed Slide Set.
Lecture 2 The Relational Model. Objectives Terminology of relational model. How tables are used to represent data. Connection between mathematical relations.
Chapter 4 The Relational Model Pearson Education © 2014.
Chapter 4 The Relational Model.
Chapter 3 The Relational Model Transparencies Last Updated: Pebruari 2011 By M. Arief
Chapter 6 System Engineering - Computer-based system - System engineering process - “Business process” engineering - Product engineering (Source: Pressman,
1 Understanding Inheritance COSC 156 C++ Programming Lecture 8.
Design patterns. What is a design pattern? Christopher Alexander: «The pattern describes a problem which again and again occurs in the work, as well as.
Profiling Metadata Specifications David Massart, EUN Budapest, Hungary – Nov. 2, 2009.
DBSQL 14-1 Copyright © Genetic Computer School 2009 Chapter 14 Microsoft SQL Server.
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 20 Object-Oriented.
Chapter 3 The Relational Model. 2 Chapter 3 - Objectives u Terminology of relational model. u How tables are used to represent data. u Connection between.
Lecture 7 Integrity & Veracity UFCE8K-15-M: Data Management.
Michael Cafarella Alon HalevyNodira Khoussainova University of Washington Google, incUniversity of Washington Data Integration for Relational Web.
Exploiting Automatically Inferred Constraint-Models for Building Identification in Satellite Imagery Research funded by the AFSOR, grant numbers FA
CPET 565 Mobile Computing Systems Context-Aware Computing (2) Lecture 11 Hongli Luo Indiana University-Purdue University Fort Wayne.
CSC-682 Cryptography & Computer Security Sound and Precise Analysis of Web Applications for Injection Vulnerabilities Pompi Rotaru Based on an article.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
Metadata Models in Survey Computing Some Results of MetaNet – WG 2 METIS 2004, Geneva W. Grossmann University of Vienna.
1 Chapter 1 Introduction. 2 Introduction n Definition A database management system (DBMS) is a general-purpose software system that facilitates the process.
Copyright 2003 Scott/Jones Publishing Standard Version of Starting Out with C++, 4th Edition Chapter 13 Introduction to Classes.
© ETH Zürich Eric Lo ETH Zurich a joint work with Carsten Binnig (U of Heidelberg), Donald Kossmann (ETH Zurich), Tamer Ozsu (U of Waterloo) and Peter.
1 Introduction to Software Engineering Lecture 1.
Modeling Context Information in Pervasive Computing System Presented by Karen Henricksen, Jadwiga Indulska, and Andry Raktonirany From University of Queensland.
Automating Context-Aware Application Development Ted McFadden and Karen Henricksen CRC for Enterprise Distributed Systems Technology (DSTC) Jadwiga Indulska.
IFS310: Module 6 3/1/2007 Data Modeling and Entity-Relationship Diagrams.
1 SQL - II Data Constraints –Applying data constraints Types of data constraints –I/O constraints The PRIMARY KEY constraints The FOREIGN KEY constraints.
DBT544. DB2/400 Advanced Features Level Check Considerations Database Constraints File Overrides Object and Record Locks Trigger Programs.
The IBM Rational Publishing Engine. Agenda What is it? / What does it do? Creating Templates and using Existing DocExpress (DE) Resources in RPE Creating.
Copyright © 2006 Addison-Wesley. All rights reserved. Ambiguity in Grammars A grammar is ambiguous if and only if it generates a sentential form that has.
Chapter 9 Logical Database Design : Mapping ER Model To Tables.
CoOL: A Context Ontology Language to Enable Contextual Interoperability Thomas Strang, Claudia Linnhoff-Popien, and Korbinian Frank German Aerospace Centor.
ELEE 4303 Digital II Introduction to Verilog. ELEE 4303 Digital II Learning Objectives Get familiar with background of HDLs Basic concepts of Verilog.
Session 1 Module 1: Introduction to Data Integrity
An Ontology-based Approach to Context Modeling and Reasoning in Pervasive Computing Dejene Ejigu, Marian Scuturici, Lionel Brunie Laboratoire INSA de Lyon,
Business Rules 12 th Meeting Course Name: Business Intelligence Year: 2009.
Quality Assurance in the Presence of Variability Kim Lauenroth, Andreas Metzger, Klaus Pohl Institute for Computer Science and Business Information Systems.
1 An infrastructure for context-awareness based on first order logic 송지수 ISI LAB.
CSC3315 (Spring 2009)1 CSC 3315 Languages & Compilers Hamid Harroud School of Science and Engineering, Akhawayn University
CSCI 6315 Applied Database Systems Review for Midterm Exam I Xiang Lian The University of Texas Rio Grande Valley Edinburg, TX 78539
1 CSC103: Introduction to Computer and Programming Lecture No 17.
Introduction to Service Orientation MIS 181.9: Service Oriented Architecture 2 nd Semester,
Part 25 E2 EXPRESS/UML Walkthrough Seattle STEP October 2004.
Operational Semantics Mooly Sagiv Reference: Semantics with Applications Chapter 2 H. Nielson and F. Nielson
1 The Relational Data Model David J. Stucki. Relational Model Concepts 2 Fundamental concept: the relation  The Relational Model represents an entire.
The Context Fabric: An Infrastructure for Context-Aware Computing Jason I. Hong Group for User Interface Research, Computer Science Division University.
IT 5433 LM3 Relational Data Model. Learning Objectives: List the 5 properties of relations List the properties of a candidate key, primary key and foreign.
Getting started with Accurately Storing Data
Business System Development
SysML v2 Formalism: Requirements & Benefits
Copyright © Cengage Learning. All rights reserved.
Presentation transcript:

Extending context models for privacy in pervasive computing environments Jadwiga Indulska The School of Information Technology and Electrical Engineering, The University of Queensland

Talk outline Pervasive computing Challenges in privacy enforcement Modelling of context information Requirements for ownership definitions Capturing ownership Context schemas Privacy enforcement based on ownership Summary

Pervasive computing Relies on context information to dynamically adapt to user requirements Context information obtained from: Sensors Sensors User profiles User profiles Applications Applications Derivation mechanisms Derivation mechanisms Some types of context info can be sensitive (e.g., user location and activity) Sensitive context needs protection => privacy enforcement

Challenges in privacy enforcement Loose couplings between people and resources Often no direct link between context source and owner (e.g., camera and people captured by camera) Heterogeneous privacy requirements due to: Differences in information sensitivity Differences in information sensitivity Differences in user preferences Differences in user preferences Context-dependent changes in preferences Context-dependent changes in preferences Ownership may be context-dependent

Ownership of context information Issue of context ownership is largely ignored Context management systems either: provide no privacy support, or provide no privacy support, or assume prior organisation of information by owner assume prior organisation of information by owner Our work addresses it directly and integrates ownership information into context models Ownership is captured at level of: Object types Object types Fact types Fact types Situations Situations

Modelling of context information We use a fact-based modelling approach (CML) In approach, developers define: Entity types about which context information is represented Entity types about which context information is represented Types of context information represented (context fact types) Types of context information represented (context fact types) Sources of context information Sources of context information Quality annotations (quality metadata about facts) Quality annotations (quality metadata about facts) Dependencies between facts Dependencies between facts Various other constraints and metadata on fact types Various other constraints and metadata on fact types

Example CML model PersonActivityDevice Place engagedIn locatedAt owns canUse Organis ation ownedBy controlledBy Device Type hasType [] Profiled Sensed Temporal Uniqueness constraints []

Terminology Object type: Modelled as ellipsis in CML Modelled as ellipsis in CML Class of entity described in context information (e.g., Person) Class of entity described in context information (e.g., Person) Fact type: Modelled as role boxes in CML Modelled as role boxes in CML Relation on one or more object types (e.g., locatedAt) Relation on one or more object types (e.g., locatedAt)Object: Instance of Object type (e.g., the person Alice) Instance of Object type (e.g., the person Alice)

Situation: Describes context at higher level than facts Describes context at higher level than facts Defined using variation of predicate logic Defined using variation of predicate logic Expresses conditions on context Expresses conditions on context Evaluates to truth value (true, false, or unknown) Evaluates to truth value (true, false, or unknown) E.g., E.g., Terminology (cont.) MeetingInProgress(room):  person locatedAt[person, room] engagedIn[person, meeting]

Requirements for ownership definitions Context models instantiated as large fact bases => ownership must be scalable Ownership must be definable at: organisational level organisational level individual level individual level Ownership must be context-dependent Owners of context information should have access at all times Context ownership (potentially) shared by multiple entities

Capturing ownership Ownership expressed through SQL-like context schema Our approach has clear benefits: Context can be owned by multiple entities Context can be owned by multiple entities Ownership can be context dependent Ownership can be context dependent Ownership supported on: Object types Object types Fact types Fact types Situations Situations

Ownership of object types 3 classes of ownership for objects types: First class (capable of owning) First class (capable of owning) Second class (can be owned) Second class (can be owned) Third class (never have owners) Third class (never have owners) E.g., a person (first class) owns a laptop (second class), which has a device type (third class) Default ownership of a context fact is defined as the union of the owners of objects participating in roles

Object type classes PersonActivityDevice Place engagedIn locatedAt owns canUse Organis ation ownedBy controlledBy Device Type hasType [] 1 st Class 2 nd Class 3 rd Class

Ownership of fact types Can override default fact ownership by defining ownership explicitly on fact types Facts may have 0, 1 or multiple owners 0 owners: Can be accessed by anyone Can be accessed by anyone No privacy preferences applied No privacy preferences applied 1, multiple owners: Always accessible to owners Always accessible to owners Disclosed according to preferences of all owners Disclosed according to preferences of all owners

Ownership of situations Situations are defined in terms of context facts and logical connectives (and, or, not, exists, forall) Evaluating ownership on each fact is expensive! Assigning ownership to entire situation is cheaper Situations can be: Unowned Unowned Owned by 1 entity Owned by 1 entity Owned by multiple entities Owned by multiple entities

Context schemas Loosely based on SQL Alternative textual format for modelling context Defines object types in domain Fact types defined in terms of object types Situations defined in terms of fact types Used as input for schema compiler which can be hooked up to tools for generating various outputs (e.g., model- specific helper classes for context manipulation) Can be extended with ownership information

First class objects Tagged “ FIRST CLASS ” Tagged “ FIRST CLASS ” e.g., FIRST CLASS Person e.g., FIRST CLASS Person Second class objects Tagged “ SECOND CLASS ” Tagged “ SECOND CLASS ” Must also be “ OWNED BY ” a first class object Must also be “ OWNED BY ” a first class object Ownership may be context-dependent, e.g., Ownership may be context-dependent, e.g., Third class Objects Tagged “THIRD CLASS” Tagged “THIRD CLASS” e.g, THIRD CLASS DeviceType e.g, THIRD CLASS DeviceType Object type declarations SECOND CLASS Device OWNED BY SELECT person FROM Using WHERE using.device = Device

Fact type declarations Fact types declared separately Declaration includes: Object types participating in fact type roles Optional ownership information (default ownership is assumed if not present) For example: CREATE SENSED FACT TYPE locatedAt( Person person KEY, Place place ALTROLE ) OWNED BY person

Situation declarations CREATE SITUATION Engaged(device)… OWNED BY SELECT person FROM owns WHERE owns.device = device UNION SELECT organisation FROM ownedBy WHERE ownedBy.device = device Example situation ownership definition:

Privacy enforcement based on ownership Modelling ownership is a first step towards enforcing privacy However, also require information about owners’ privacy requirements We express these requirements using our previously defined model for context-dependent preferences

Privacy enforcement based on ownership (cont.) Privacy preferences contain: A scope statement (listing activation conditions) A scope statement (listing activation conditions) A scoring expression (oblige or prohibit) A scoring expression (oblige or prohibit) Scope statement can contain the following variables: Requester Requester Owner Owner Purpose Purpose Fact type or situation Fact type or situation Fact type attributes OR situation variables Fact type attributes OR situation variables We are developing an access control scheme that incorporates our ownership and preference models We are developing an access control scheme that incorporates our ownership and preference models

Summary Sensitive context information requires privacy enforcement One of the challenges is in first determining ownership of context information We support ownership declarations as an extension to context models Ownership declarations can be defined at three levels: Object level Object level Fact type level Fact type level Situation level Situation level Ownership information can be combined with context- dependent privacy preferences to provide access control for pervasive computing environments