Trustworthy Semantic Webs Bhavani Thuraisingham The University of Texas at Dallas June 14, 2007.

Slides:



Advertisements
Similar presentations
Policy based Cloud Services on a VCL platform Karuna P Joshi, Yelena Yesha, Tim Finin, Anupam Joshi University of Maryland, Baltimore County.
Advertisements

SmartER Semantic Cloud Sevices Karuna P Joshi University of Maryland, Baltimore County Advisors: Dr. Tim Finin, Dr. Yelena Yesha.
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Building Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Semantic web technologies for secure interoperability and.
1 Confidentiality and Trust Management in a Coalition Environment Lecture #11 Dr. Bhavani Thuraisingham February 13, 2008 Data and Applications Security.
Trustworthy Semantic Webs Dr. Thuraisingham The University of Texas at Dallas December 2008.
Evaluation and Testbed Development Bhavani Thuraisingham The University of Texas at Dallas Jim Massaro and Ravi Sandhu.
Data Management Information Management Knowledge Management Data and Applications Security Challenges Bhavani Thuraisingham October 2006.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University.
Semantic Access Control Ashraful Alam Dr. Bhavani Thuraisingham.
Secure and Selective Authentication and Access Control of XML Documents Bhavani Thuraisingham April 8, 2009 Lecture #22.
Dr. Bhavani Thuraisingham February 2010 Building Trustworthy Semantic Webs Lecture #14 : OWL (Web Ontology Language) and Security.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.
Dr. Bhavani Thuraisingham August 2006 Building Trustworthy Semantic Webs Unit #1: Introduction to The Semantic Web.
DAGIS : Automatic Discovery of Geospatial Information Services Ashraful Alam Ganesh Subbiah Dr. Bhavani Thuraisingham Dr. Latifur Khan.
Dr. Bhavani Thuraisingham The University of Texas at Dallas Trustworthy Semantic Webs March 25, 2011 Data and Applications Security Developments and Directions.
Introduction to Semantic Web Service Architecture ► The vision of the Semantic Web ► Ontologies as the basic building block ► Semantic Web Service Architecture.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Vision for Semantic Web.
Trustworthy Semantic Webs Prof. Bhavani Thuraisingham The University of Texas at Dallas Collaborators: Profs. Latifur Khan Prof. Murat Kantarcioglu Prof.
Dr. Bhavani Thuraisingham September 2006 Building Trustworthy Semantic Webs Lecture #5 ] XML and XML Security.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Inference Problem - I September.
Dr. Bhavani Thuraisingham September 24, 2008 Building Trustworthy Semantic Webs Lecture #9: RDF and RDF Security.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #24 Semantic Web and Security.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Policies January 28,
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #3 Access Control in Data.
Dr. Bhavani Thuraisingham September 18, 2006 Building Trustworthy Semantic Webs Lecture #9: Logic and Inference Rules.
Dr. Bhavani Thuraisingham January 14, 2011 Building Trustworthy Semantic Webs Lecture #1: Introduction to Trustworthy Semantic Web.
Geospatial Semantic Web Interim (2.5 months) Progress Review for Phase 1 Dr. Bhavani Thuraisingham (Computer Science) Dr. Latifur Khan (Computer Science)
Trustworthy Semantic Web Dr. Bhavani Thuraisingham The University of Texas at Dallas Inference Problem March 4, 2011.
Secure Geospatial and Sensor Semantic Webs for Crime Analysis and Border Security Prof. Bhavani Thuraisingham, PhD Prof. Latifur Khan, PhD Mr. Alam Ashraful.
Information Operation across Infospheres Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Inference Problem - I.
Secure Knowledge Management and Trustworthy Semantic Web Technologies Dr. Bhavani Thuraisingham The University of Texas at Dallas December 2008.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #19 Digital Libraries, Semantic.
Semantic Geospatial Data Exchange & Access Control Ashraful Alam Bhavani Thuraisingham Ganesh Subbiah Latifur Khan.
Trustworthy Semantic Webs Building Geospatial Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas October 2006 Presented at OGC Meeting,
Data and Applications Security
Building Trustworthy Semantic Webs
Building Trustworthy Semantic Webs
Data and Applications Security
Policy based Cloud Services on a VCL platform
Data and Applications Security Developments and Directions
Information and Security Analytics
Lecture #6: RDF and RDF Security Dr. Bhavani Thuraisingham
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Webs
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Access Control in Data Management Systems
Trustworthy Semantic Web
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security
Presentation transcript:

Trustworthy Semantic Webs Bhavani Thuraisingham The University of Texas at Dallas June 14, 2007

Outline My origins –Security constraint processing for MLS/DBMS for Inference Problem ( ) –Tim Berners Lee’s Vision for Semantic Web (late 1990s) –XML Security research with U of Milan –NSF/EU Workshop October 2001 Where am I now?: Trustworthy Semantic Webs –Beyond XML Security (Texas Enterprise Funds) –Secure Geospatial semantic web (Raytheon Corporation) –Application: Assured Information Sharing (US Air Force) References –A semantic web primer: Antoniou and van Harmlen, MIT Press 2003 –Building trustworthy semantic webs, Thuraisingham, CRC Press (Taylor and Francis), 2007 (to appear)

Collaborators Honeywell/MITRE (Lock Data Views and Security Constraint Processing, ) –Pat Dwyer, Paul Stachour, Harvey Rubinovitz, Marie Collins U. of Milan (XML Security, ) –Profs. Elisa Bertino, Elena Ferrari, Barbara Carminati University of Texas at Dallas (2004-Present) –Prof. Latifur Khan and Students (Inference Control, Secure geospatial semantic web) George Mason University (Assured Information Sharing, 2004-Present) –Prof. Ravi Sandhu University of Maryland Baltimore County (Policy Reasoning, 2006-Present) –Profs Tim Finin, Anupam Joshi, Yelena Yesha MIT (Policy reasoning, 2007-Present) –Dr. Lalana Kagal

Security Constraints (Policies) Late 1980s/Early 1990s Honeywell/MITRE research funded by AFRL, SPAWAR, CECOM Simple Constraint: Mission attribute of SHIP is Secret Content-based constraint: If relation MISSION contains information about missions in Europe, then MISSION is Secret Association-based Constraint: Ship’s location and mission taken together is Secret; individually each attribute is Unclassified Release constraint: After X is released Y is Secret Aggregate Constraint: Ten or more tuples taken together is Secret Dynamic Constraint: After the Mission is completed, information about the mission is Unclassified Logical Constraint: A Implies B; therefore if B is Secret then A must be at least Secret

Enforcement of Security Constraints ( ) User Interface Manager Constraint Manager Security Constraints Query Processor: Constraints during query and release operations Update Processor: Constraints during update operation Database Design Tool Constraints during database design operation MLS Database MLS/DBMS

Challenges Final report to Army around 1996 How do you specify the policies –Very difficult task –DoD Policies are very complex Reasoning about policies –Datalog based systems have performance problems –Need more complex reasoning strategies Inference problem is unsolvable –1990 Computer Security Foundations Workshop (Thuraisingham) One can always make unauthorized inferences by using real world knowledge –How long do you keep the history; how do you represent the real world data

From Today’s Web to the Semantic Web Berners Lee’s Vision in the late 1990s Today’s web –High recall, low precision: Too many web pages resulting in searches, many not relevant –Results sensitive to vocabulary: Different words even if they mean the same thing do not results in same web pages –Results are single web pages not linked web pages Tomorrow’s web –Machine understandable web pages –Activities on the web such as searching with little or no human intervention –Technologies for knowledge management, e-commerce, interoperability] –Retrieving appropriate web pages, sensitive to vocabulary

Potential Applications Knowledge Management –Organizing knowledge, automated tools for maintaining knowledge, question answering, querying multiple documents E-Business –Develop software agents that can interpret privacy requirements, pricing and product information and display timely and correct information; provide information about the reputation of shops; negotiation on behalf of the user Other: web services, interoperability, data management, digital libraries

Layered Approach: Tim Berners Lee’s Technology Stack

XML Security (jointly with U of Milan ) Credentials in XML Alice Brown University of X CS Security John James University of X CS Senior

Policies in XML

System Architecture for Access Control User Pull/Query Push/result XML Documents X-AccessX-Admin Admin Tools Policy base Credential base

Third-Party Architecture Credential base policy base XML Source User/Subject Owner Publisher Query Reply document SE-XML credentials The Owner is the producer of information It specifies access control policies The Publisher is responsible for managing (a portion of) the Owner information and answering subject queries Goal: Untrusted Publisher with respect to Authenticity and Completeness checking

Secure Web Service Architecture Confidentiality, Authenticity, Integrity Service requestor Service provider UDDI Query BusinessEntity BusinessService BindingTemplate BusinessService tModel PublisherAssertion

NSF/EU Workshop October 2001 An invitational workshop was held in October 2001 to determine directions for semantic web My presentation was on Security for the semantic web; this was the beginning of security research for the semantic web Since then two major accomplishments ( ) –Finin, Kagal et al at UMBC; REI policy language, framework and reasoned (Kagal PhD Thesis) –Policy Aware Web Project initiated at MIT More recently Piertro Bonatti et al’s (U of Naples) research on policy and semantic web

Beyond XML Security Why do we need RDF, OWL Security? Why do we need RDF and OWL? –More expressive as well as reasoning power than XML –Inferencing capabilities Policies can be expressed in RDF and OWL Need to secure RDF and OWL documents Inference and Privacy problems can be better handled with RDF and OWL Some early research on RDF security with Elena Ferrari and Barbara Carminati (2003-4)

Security and Ontologies Access control for Ontologies –Who can access which parts of the Ontologies –E.g, Professor can access all patents of the department while the Secretary can access only the descriptions of the patents in the patent ontology Ontologies for Security Applications –Use ontologies for specifying security/privacy policies –Ontology reasoning techniques for reasoning about policies –Integrating heterogeneous policies may involve developing ontologies and resolving inconsistencies

Confidentiality, Privacy and Trust CPT Trust –Trust is established between say a web site and a user based on credentials or reputations. Privacy –When a user logs into a website to make say a purchase, the web site will specify heat its privacy policies are. The user will then determine whether he/she wants to enter personal information. –That is, if the web site will give out say the user’s address to a third party, then the user can decide whether to enter this information. –However before the user enters the information, the user has to decide whether he trusts the web site. –This can be based on the credential and reputation. – if the user trusts the web site, then the user can enter his private information if he is satisfied with the policies. If not, he can choose not to enter the information. Confidentiality –Here the user is requesting information from the web site; –the web site checks its confidentiality policies and decides what information to release to the user. –The web set can also check the trust it has on the user and decide whether to give the information to the user.

Inference/Privacy Control Policies Ontologies Rules Semantic web engine XML, RDF, OWL Documents Web Pages, Databases Inference Engine/ Rules Processor Interface to the Semantic Web Technology By UTDallas

Geospatial Interoperability Challenges Syntactic Naming Heterogeneity Distance – Float or Distance Type Structural Naming Heterogeneity Location expressed by two separate coordinates or by a point data type Semantic Heterogeneity Distance computed on the sphere or in a plane Service Discovery and Evaluation Hydrologist in charge of Flood Warnings has 3 Water-level Service Providers. Service Composition Service to Compute the outline of a Toxic cloud after a Chemical Spill.

WWW URI, HTML, HTTP Bringing the web to its full potential for Geospatial Domain Geospatial Semantic Web GRDF Dynamic Geo-Web Services UDDI, WSDL, SOAP,OGC -WS Static Geospatial Semantic Web Services DAGIS DAGIS (Automatic Discovery of Geospatial Information Services) Vision

Motivating Scenario Query: “Find movie theaters within 30 miles of 75080” within, near, overlap – Geospatial Operators Theaters, Restaurants – Businesses (Non-Geospatial data) Miles – Distance Unit 75080, Richardson – Geo References Cinemark Movies 10 Radisson Hotel Dallas North- Richardson

DAGIS System Architecture DAGIS Query Interface OWL-S MatchMaker OWL-DL Reasoner for Matchmaker Service Providers 1. Register/ Advertise 3. Service Discovery, Service Enactment DAGIS Matchmaker Service Provider - 1 Service Provider - 1 Service Provider - n Service Provider - n DAGIS Agent DAGIS Agent Reasoner/ Matching Engine Reasoner/ Matching Engine DAGIS Interface DAGIS Interface … 2. Query

DAGIS for Complex Queries 1. Query Profile 2. Service Discovery 3. Compose Selection 4. Construct Sequence 5.Return Dynamic Service URI DAGIS Composer DAGIS Composer Match- Maker Match- Maker DAGIS Agent DAGIS Agent Client Composer Sequencer Composer Sequencer Find Movie Theaters within 30 Miles from Richardson, TX TX Zipcode Finder Zipcode Finder Theater Finder Theater Finder Richardson 30 Miles Theaters

DAGIS Composer Algorithm Recursive Back Chaining Inference Mechanism (Regression Planning) TX Richardson 30 Miles Movie Theaters Zipcodefinde r GetTheater Inputs:= City, State, DistanceOutput := Movie Theaters NO Service Provider Inputs:= City, State Output := ZipCode ZipCodeFinder Inputs:= ZipCode, DistanceOutput := MovieTheatersTheater Finder

DAGIS Integration Scenarios QueryAvailabilityService TypeService Invoked Find Movie Theaters within 30 Miles of YESAtomic (Single) Service Provider GetTheatersAndMoviesS ervice Find Movie Theaters within 30 Miles of Richardson,TX NODAGIS Composes two Atomic Services: ZipCodeFinder, GetTheatersAndMovies Find Movie Theaters within 30 Miles of QoS: Response Time 30 Sec YES Two services with QoS 40 Sec and 50 Sec Available Atomic Service GetTheatersAndMoviesS ervice QoS Response Time 40 Sec Find Movie Theaters within 30 Miles of NOAtomic ServiceGetTheatersService

Online Ontology Repository wlhttp:// wl

Geospatial Data Integration Upper-level ontologies Mid-level ontology (GRDF) Domain ontologies Concrete Definitions of All Relevant Geospatial Concepts Abstract Definitions of Main Geospatial Concepts Hydrology ontology Hydrology ontology Cartography ontology Cartography ontology Image ontology Image ontology

GRDF (Beyond OGC’s GML) GRDF (Geospatial Resource Description Framework) –Adds semantics to data –Loosely-structured (easy to freely mix with other non-geospatial data) –Semantically extensible ComputerScience Building hasExtent ( , ) ( , )

GRDF Example (Topology) <owl:minCardinality rdf:datatype=" >1 …

Semantic Access Control (SAC) Traditional Access Control Traditional Access Control Semantic Web Semantic Access Control Motivation Shortcomings of Traditional Access Control Proprietary systems Lack of modularity Changes in access control schemas break the system Changes in data schemas break the system Path to resources (e.g., XPATH) is clumsy //school/department/professor/person al/ssn – LONG! Non-optimal for distributed/federation environment

SAC Ontology Written in OWL ( Web Ontology Language ) User-centric Modular Easily extensible Available at : sonto sonto

Geo-WS Security Data providers (e.g., geospatial clearinghouses, research centers) need access control on serviceable resources. Access policies have geospatial dimension –Bob has access on Building A –Bob does NOT have access on Building B –Building A and B have overlapping area Current access control mechanisms are static and non- modular.

Geo-WS Security: Policy Components Subjects: Software Agents or Human clients Resources: Assets exposed through WS Actions: Read, Write, Execute Conditions: Additional constraints (e.g., geospatial parameters) on policy enforcement Resources Subjects Actions Condition Policy Set

Geo-WS Security: Architecture Client DAGISDAGIS DAGISDAGIS Geospatial Semantic WS Provider Enforcement Module Decision Module Authorization Module Semantic-enabled Policy DB Web Service Client SideWeb Service Provider Side

Geo-WS Security: Semantics Policy rules are based on description logic (DL). DL allows machine-processed deductions on policy base. Example 1: –DL Rule: ‘Stores’ Inv. Prop. ‘Is Stored In’ –Fact: Airplane_Hanger(X) ‘stores’ Airplane(Y) Example 2: –DL Rule: ‘Is Located In’ is Symmetric –Fact: Polygon(S) ‘Is Located In’ Polygon(V) Polygon(V) ‘Is Located In’ Polygon(T)

Geo-WS Security: Inferencing Geospatial Data Store Semantic-enabled Policy DB Inferencing Module Obvious facts Deduced facts

SAC in Action Environment: University Campus Campus Ontology Main Resources –Computer Science Building –Pharmacy Building –Electric Generator in each Building User Access: –Bob has ‘execute’ access to all Building Resources –Bob doesn’t have any access to CS Building –Bob has ‘modify’ access to Building resources within a certain geographic extent Policy File located at

Future Directions for Secure Geospatial Semantic Web QoS based Selection for Complex Queries Automatic Trust Negotiation for DAGIS –Examine the work of Winslett et al (Trust Buildrer) and Bertino et al (Trust-X) Define a specification for access control semantics Geospatial dataset development Application: Crime Analysis

Assured Information Sharing: Need to Know to Need to Share Need to know policies during the cold war; even if the user has access, does the user have a need to know? Pose 9/11 the emphasis is on need to share –User may not have access, but needs the data Do we give the data to the user and then analyze the consequences Do we analyze the consequences and then determine the actions to take Do we simply not give the data to the user What are risks involved?

Assured Information Sharing: Architecture Export Data/Policy Component Data/Policy for Agency A Data/Policy for Coalition Export Data/Policy Component Data/Policy for Agency C Component Data/Policy for Agency B Export Data/Policy Trustworthy Partners Semi-Trustworthy Partners Untrustworthy Partners

Our Approach Integrate the Medicaid claims data and mine the data; next enforce policies and determine how much information has been lost (Trustworthy partners); Prototype system Examine RBAC and UCON for coalitions (George Mason University – Ravi Sandhu) Apply game theory and probing to extract information from semi-trustworthy partners Trust for Peer to Peer Networks Conduct information operations (defensive and offensive) and determine the actions of an untrustworthy partner.

Coalition Policy Enforcement Prototype

Architectural Elements of the Prototype Policy Enforcement Point (PEP): Enforces policies on requests sent by the Web Service. Translates this request into an XACML request; sends it to the PDP. Policy Decision Point (PDP): Makes decisions regarding the request made by the web service. Conveys the XACML request to the PEP. Policy Files:  Policy Files are written in XACML policy language. Policy Files specify rules for “Targets”. Each target is composed of 3 components: Subject, Resource and Action; each target is identified uniquely by its components taken together. The XACML request generated by the PEP contains the target. The PDP’s decision making capability lies in matching the target in the request file with the target in the policy file. These policy files are supplied by the owner of the databases (Entities in the coalition). Databases:  The entities participating in the coalition provide access to their databases. Migrating to RDF from XML, developing ontologies for policy interoperability

UCON Policy Model (Prof. Ravi Sandu, X. Min) Operations that we need to model: –Document read by a member. –Adding/removing a member to/from the group –Adding/removing a document to/from the group Member attributes –Member: boolean –TS-join: join time –TS-leave: leave time Document attributes –D-Member: boolean –D-TS-join: join time –D-TS-leave: leave time

Policy model: member enroll/dis-enroll Initial state: Never been a member State I Currently a member State II Past member State III enrolldis- enroll member TS-join TS-leave null True time of join null enroll False time of join time of leave dis-enroll enroll enroll, dis-enroll: authorized to Group-Admins UCON elements: Pre-Authorization, attribute predicates, attribute mutability enroll

Policy model: document add/remove Initial state: Never been a group doc State I Currently a group doc State II Past group doc State III add remove D-member D-TS-join D-TS-leave null True time of join null add False time of join time of leave remove add, remove : authorized to Group-Admins add UCON elements: Pre-Authorization, attribute predicates, attribute mutability add

Directions: Combining UCON and Data Sharing with Semantic Web (UMBC-GMU-UTD-MIT ) UMBC Research – In particular, Lalana Kagal’s PhD research –REI (RDF-based) Policy Language and Reasoning system How can we extend UCON and REI to develop a security model and reasoning (possibly based on PELLET) for data sharing environment?

Policy Engineering Software engineering for software; Data engineering for data; Ontology engineering for ontology; Tim Finin coined the term “Policy engineering” for policies Policy engineering involved developing tools for –Policy specification – Policy reasoning (consistency, completeness, - - -), –Policy reuse –Policy evolution Policy generation still an issue

Where are we and where do we go from here? Status –Tremendous progress the past 6 years –Tim Berners Lee’s vision now includes security and policy management for the semantic web –Multilevel security for web information retrieval (including inference) is being investigated by Fred Schneider et al at Cornell Future –Semantic web will never be complete; it will continue to evolve –We cannot buy a semantic web product; need to integrate several technologies –As we make progress with semantic web technologies, need to investigate CPT as well as tools for policy engineering –Need to share environment will be a major application; Network centric enterprise services and the Global information grid of the DoD –Specialized semantic webs for multiple domains and different types of data (e.g, geospatial)