I.H. TorosluESSW Workshop Budapest May 20, 20031 A Semantic based Privacy Framework for Web Services Arif Tumer, Asuman Dogac, Hakki Toroslu Middle East.

Slides:



Advertisements
Similar presentations
Advanced Metadata Usage Daan Broeder TLA - MPI for Psycholinguistics / CLARIN Metadata in Context, APA/CLARIN Workshop, September 2010 Nijmegen.
Advertisements

Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
Interoperability of Distributed Component Systems Bryan Bentz, Jason Hayden, Upsorn Praphamontripong, Paul Vandal.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
A SLA evaluation Methodology in Service Oriented Architectures V.Casola, A.Mazzeo, N.Mazzocca, M.Rak University of Naples “Federico II”, Italy Second University.
A Context Framework for Ambient Intelligence. Context servers Motivation interoperable Machine processable Security & privacy.
© 2004 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Adding Organizations and Roles as Primitives to the JADE Framework NORMAS’08 Normative Multi Agent Systems, Matteo Baldoni 1, Valerio Genovese 1, Roberto.
An Application-led Approach for Security-related Research in Ubicomp Philip Robinson TecO, Karlsruhe University 11 May 2005.
The RDF meta model: a closer look Basic ideas of the RDF Resource instance descriptions in the RDF format Application-specific RDF schemas Limitations.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Distributed Collaborations Using Network Mobile Agents Anand Tripathi, Tanvir Ahmed, Vineet Kakani and Shremattie Jaman Department of computer science.
Filename\location Agent Mediated Electronic Commerce Dr. Chris Preist HP Labs.
Processing of structured documents Spring 2003, Part 6 Helena Ahonen-Myka.
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
WELCOME TO UNIT 7 Customer Service MT 221 Marilyn Radu, Instructor.
XForms: A case study Rajiv Shivane & Pavitar Singh.
WMS systems manage and coordinate several independent subtasks. The coordination problems get even more serious when the subtasks are performed on separate.
Web Policy Zeitgeist Panel SWPW 2005 – Galway, Ireland Piero Bonatti, November 7th, 2005.
Configuration Management Issues in IHE Asuman Dogac, SRDC, METU, Turkey
Interoperability in Information Schemas Ruben Mendes Orientador: Prof. José Borbinha MEIC-Tagus Instituto Superior Técnico.
A. Dogac Grenoble Ecole de Management MEDFORIST Workshop1 Semantics of Web Services Asuman Dogac Middle East Technical University Software R&D Center Ankara,
Mobile Topic Maps for e-Learning John McDonald & Darina Dicheva Intelligent Information Systems Group Computer Science Department Winston-Salem State University,
Spoken dialog for e-learning supported by domain ontologies Dario Bianchi, Monica Mordonini and Agostino Poggi Dipartimento di Ingegneria dell’Informazione.
A GENERIC PROCESS FOR REQUIREMENTS ENGINEERING Chapter 2 1 These slides are prepared by Enas Naffar to be used in Software requirements course - Philadelphia.
World Class Standards WG8 presentation of current Subscription Management Activities TISPAN WG8 – 3GPP SA#5 Joint meeting Sophia Antipolis, May14th - 15.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
TripCom: Development of a patient summary at European level E. Della Valle, D. Cerizza, D. Foxvog, R. Krummenacher, L. J. B. Nixon, E.
10/18/20151 Business Process Management and Semantic Technologies B. Ramamurthy.
(Business) Process Centric Exchanges
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Distributed Information Retrieval Using a Multi-Agent System and The Role of Logic Programming.
 Copyright 2005 Digital Enterprise Research Institute. All rights reserved. Semantic Web Services enabled B2B Integration Kotinurmi,Vitvar,
Page 1 WWRF Briefing WG2-br2 · Kellerer/Arbanowski · · 03/2005 · WWRF13, Korea Stefan Arbanowski, Olaf Droegehorn, Wolfgang.
sec1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: TGa_Proposal_Antonio_Izquierdo (Protecting the Information Service.
An Ontological Framework for Web Service Processes By Claus Pahl and Ronan Barrett.
1 CS 502: Computing Methods for Digital Libraries Lecture 19 Interoperability Z39.50.
Dr. Bhavani Thuraisingham August 2006 Building Trustworthy Semantic Webs Unit #1: Introduction to The Semantic Web.
OASIS Symposium 4/04 Registry : Reliable Infrastructure Role of Registry : Reliable Infrastructure Carl Mattocks CEO CHECKMi Infrastructure Project Background.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Chapter 15 Introduction to PL/SQL. Chapter Objectives  Explain the benefits of using PL/SQL blocks versus several SQL statements  Identify the sections.
Group-oriented Modelling Tools with Heterogeneous Semantics Niels Pinkwart COLLIDE Research Group University of Duisburg, Germany.
June 15, 2009GITB Open Meeting, Brussels1 GITB Alternative Architectures and Business Models CEN/ISSS eBIF Global eBusiness Interoperability Test Bed Methodologies.
What’s MPEG-21 ? (a short summary of available papers by OCCAMM)
Introduction to Semantic Web Service Architecture ► The vision of the Semantic Web ► Ontologies as the basic building block ► Semantic Web Service Architecture.
Ontology Mapping in Pervasive Computing Environment C.Y. Kong, C.L. Wang, F.C.M. Lau The University of Hong Kong.
Semantics in Peer-to- Peer and Grid Computing 5/04 Enabling Semantic Grid Computing with ebXML Carl Mattocks CHECKMi compendium
Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi.
The RDF meta model Basic ideas of the RDF Resource instance descriptions in the RDF format Application-specific RDF schemas Limitations of XML compared.
CoOL: A Context Ontology Language to Enable Contextual Interoperability Thomas Strang, Claudia Linnhoff-Popien, and Korbinian Frank German Aerospace Centor.
© 2007 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
1 Copyright © International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Web Services Architecture Presentation for ECE8813 Spring 2003 By: Mohamed Mansour.
Doc.: IEEE /0371r0 Submission May 2005 S. McCann & E. Hepworth, Siemens Roke ManorSlide 1 IEEE 802 Architecture Issues Notice: This document has.
Chapter : 9 Architectural Design
The smart objects: towards a new model of collaboration Gianfranco E. Modoni Institute of Industrial Technologies and Automation - National Research Council.
Rendering XML Documents ©NIITeXtensible Markup Language/Lesson 5/Slide 1 of 46 Objectives In this session, you will learn to: * Define rendering * Identify.
World Wide Web has been created to share the text document across the world. In static web pages the requesting user has no ability to interact with the.
Anupam Joshi University of Maryland, Baltimore County Joint work with Tim Finin and several students Computational/Declarative Policies.
Context-Aware Middleware for Resource Management in the Wireless Internet US Lab 신현정.
SERVICE ANNOTATION WITH LEXICON-BASED ALIGNMENT Service Ontology Construction Ontology of a given web service, service ontology, is constructed from service.
A Context Framework for Ambient Intelligence
Processes and threads.
Securing Home IoT Environments with Attribute-Based Access Control
AGENT FRAMEWORK By- Arpan Biswas Rahul Gupta.
Business Process Management and Semantic Technologies
Distributed Digital Rights Management
Presentation transcript:

I.H. TorosluESSW Workshop Budapest May 20, A Semantic based Privacy Framework for Web Services Arif Tumer, Asuman Dogac, Hakki Toroslu Middle East Technical University Ankara Turkey

I.H. Toroslu ESSW Workshop Budapest May 20, /32 The aim Exploiting semantics for protecting user's privacy when accessing the Web services The proposed framework  Allows Web services to declare their input parameters as Mandatory or Optional  Allows users declare their privacy preferences as Free, Limited, or NotGiven on the basis of a domain specific service ontology  Aim: To provide an agreement that suitable to both parties

I.H. Toroslu ESSW Workshop Budapest May 20, /32 An Example Class Hierarchy for Travel Domain With User Preferences DAML-S Service TravelService Transportation AccommodationEntertainment AirTransportationLandTransferSeaTransfer Reserve BuyTicket

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Specifying Data Requests of Web Services An Example: Transportion Web Service Input Parameters: (Name, Mobile.Phone, Home.Phone, Address, Age) These properties are defined as the sub property of DAML-S inputParameter MandatoryOptional

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Specifying Data Requests of Web Services An Example: Transportation Service Input Parameters (Name, Mobile.Phone, Home.Phone, Address, Age) Conditional Rule: If Mandatory Mobile.Phone number is not given then Address is Mandatory MandatoryOptional

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Specifying Data Requests of Web Services 1. The input parameters of the service 2. The declaration of how essential the input parameter is for the service to execute (mandatory, optional) 3. The rules requesting alternate data elements if a mandatory piece of information is not provided by the user

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Specifying Data Requests of Web Services Associate necessity levels on input parameters of Web services  Mandatory: Input element is crucial for the service  Optional: Non-existence of the element does not hinder the enactment of the service

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Conditional Statements Alternatives handled via Conditional Statements  Describe alternative input parameters with associated necessities anticipating that a crucial element may not be released by the user (e.g., mobile phone number)  Condition: List of Mandatory elements  Action: Set of new/altered input parameters that may be introduced when the elements in the Condition are not released

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Conditional Statements

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Describing User’s Privacy Preferences Describe the permission levels for User’s Context Data Defined in Two Dimensions  Context Ontology  Service Ontologies Basic Properties:  Permission definitions associated with a service node is applicable to all service nodes below this node in the service ontology  Specialized definitions override general ones

I.H. Toroslu ESSW Workshop Budapest May 20, /32 An Example Class Hierarchy for Travel Domain With User Preferences DAML-S Service TravelService Transportation AccommodationEntertainment AirTransportationLandTransferSeaTransfer Reserve BuyTicket Free = { CreditCardNo } Free = { Name } NotGiven = { Mobile.Phone } Limited = { Address } Free = { Home.Phone } Limited = { Age }

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Describing User’s Privacy Preferences (Cont’d) Collection of Privacy Rule Set associated with nodes in the service ontology Associated permissions with context ontology on various levels Provide different permission levels  Free: Element is provided  NotGiven: Element is not released  Limited: Element is provided if only it is mandatory for service enactment

I.H. Toroslu ESSW Workshop Budapest May 20, /32 An Example Set of Privacy Rules

I.H. Toroslu ESSW Workshop Budapest May 20, /32 General Architecture Privacy Preferences of a user associated with nodes in a service ontology User’s Context Data Context Server Service Ontology Input Parameters of a services as mandatory or optional elements as well as conditional request statements Service Registry User Agent

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Rule Extraction Process Determine permission levels for input parameters of a service based on the service node Steps in Rule Extraction  Generation of Temporary Service Graph  1 st Phase – Upwards Traversal At each node, extract rules related with the input parameters Request the rules from parent service nodes for undetermined data elements  2 nd Phase – Downwards Traversal For each element with undetermined permission, receive rule from parents Determine the final rule based on permission level priority Push rules downwards in the hierarchy

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Rule Extraction Process (Cont’d) At each service node, only privacy rules requested by the child nodes are extracted Atomic permission levels are collected at the service’s node at the end of 2 nd Phase

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Negotiation Process Comparison of service’s input parameters and their necessities with user’s privacy preferences Aim: To provide an agreement that complies with both parties Basic Properties:  Mandatory elements must be released by the user  Optional elements are included if released freely  Conditional Statements may provide alternative requests when a mandatory element is not provided Release mandatory necessity on the element Introduce new requests (alternative input parameters)

I.H. Toroslu ESSW Workshop Budapest May 20, /32 An Example Scenario Interaction with a service of “BuyTicket” node type Mandatory input parameters: Name, Mobile.Phone, CreditCardNo Optional input parameters: Age, Address Alternatively, if the user provides her address (mandatory) and home number (optional), she does not need to release her mobile number

I.H. Toroslu ESSW Workshop Budapest May 20, /32 An Example Scenario (Cont’d) User’s Privacy Preferences  For BuyTicket service node: CreditCardNo is provided Freely  For Transportation service node: Mobile.Phone and CreditCardNo are NotGiven Address is provided Limitedly Name released Freely  For Travel service node: Age is given in a Limited fashion Home.Phone is Free

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Example: Temporary Service Graph DAML-S Service TravelService Transportation AirTransportation BuyTicket Generation of this graph is initiated with the node of the interacting service, BuyTicket Presents the nodes of which, the associated rules will be process to extract user’s privacy preferences

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Example: Rule Extraction – Phase 1 DAML-S Service TravelService Transportation AirTransportation BuyTicket Needs = { Name, Mobile.Phone, Home.Phone, Address, Age } Free = { CreditCardNo }

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Example: Rule Extraction – Phase 1 DAML-S Service TravelService Transportation AirTransportation BuyTicket Needs = { Name, Mobile.Phone, Home.Phone, Address, Age } Free = { CreditCardNo } Needs = { Home.Phone, Age } Free = { Name } NotGiven = { Mobile.Phone } Limited = { Address }

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Example: Rule Extraction – Phase 1 DAML-S Service TravelService Transportation AirTransportation BuyTicket Needs = { Name, Mobile.Phone, Home.Phone, Address, Age } Free = { CreditCardNo } Needs = { Home.Phone, Age } Free = { Name } NotGiven = { Mobile.Phone } Limited = { Address } Needs = { } Free = { Home.Phone } Limited = { Age }

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Example: Rule Extraction – Phase 2 DAML-S Service TravelService Transportation AirTransportation BuyTicket Needs = { Name, Mobile.Phone, Home.Phone, Address, Age } Free = { CreditCardNo } Needs = { Home.Phone, Age } Free = { Name } NotGiven = { Mobile.Phone } Limited = { Address } Free = { Home.Phone } Limited = { Age }

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Example: Rule Extraction – Phase 2 DAML-S Service TravelService Transportation AirTransportation BuyTicket Needs = { Name, Mobile.Phone, Home.Phone, Address, Age } Free = { CreditCardNo } Free = { Name, Home.Phone } NotGiven = { Mobile.Phone } Limited = { Address, Age } Free = { Home.Phone } Limited = { Age }

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Example: Rule Extraction – Phase 2 DAML-S Service TravelService Transportation AirTransportation BuyTicket Free = { CreditCardNo, Name, Home.Phone } NotGiven = { Mobile.Phone } Limited = { Address, Age } Free = { Name, Home.Phone } NotGiven = { Mobile.Phone } Limited = { Address, Age } Free = { Home.Phone } Limited = { Age }

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Example: Negotiation User’s Privacy Preferences based on the service node  Free = { Name, Home.Phone, CreditCardNo }  Limited = { Age, Address }  NotGiven = { Mobile.Phone } Mandatory input parameter Mobile.Phone is not provided hence conditional statement is triggered. Alternative input parameters are introduced. Finalized input parameters  Mandatory = { Name, CreditCardNo, Address }  Optional = { Age, Home.Phone }

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Example: Negotiation (Cont’d) The input parameters included in the agreement  Mandatory elements that are provided Freely or Limitedly  Optional elements that are provided Freely Result of Negotiation  Mandatory = { Name, CreditCardNo, Address }  Optional = { Home.Phone } Age is removed as it is provided in a Limited fashion

I.H. Toroslu ESSW Workshop Budapest May 20, /32 The Advantages of the Proposed Approach Less effort from user’s side:  The privacy preferences are declared for a group of services (less effort from user’s side)  A user may declare the same policy for several different service groups  The privacy preferences at the upper level classes are inherited by lower level service classes Flexibility  Web services declare alternate data requests if a mandatory input is not given by the user Interoperability  Declaring the user preferences based on a standard service ontology like DAML-S helps with the interoperability problem

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Future Work Web services need to know more than user preferences A “user context” that includes any information that can be used to characterize the user and her situation Hence user context should include user's local data obtained through sensors As well as any data stored about the user such as those stored in Customer Relationship Management (CRM) systems to make effective use of Web services

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Future Work This context information should be available to any authorized agent at any time, any where in a secure manner This necessitates developing globally accessible, secure “context servers” However, some of the data can be distributed over several heterogeneous repositories Since these devices accept input in different mark up languages; the context server needs to recognize the device and provide the information in the format that can be accepted by the device

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Future Work User context should be available in a format that is machine processable and interoperable. In this respect developing a user context ontology is essential

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Future Work Yet all this will make privacy a graver concern for users There is a need for trusted authorities for delivering user context to authorized requestors in a secure manner

I.H. Toroslu ESSW Workshop Budapest May 20, /32 Thank you for your attention!