Data Privacy for \(\mathcal{ALC}\) Knowledge Bases

  • Phiniki Stouppa
  • Thomas Studer
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5407)


Information systems support data privacy by granting access only to certain (public) views. The data privacy problem is to decide whether hidden (private) information may be inferred from the public views and some additional general background knowledge. We study the problem of provable privacy in the context of \(\mathcal{ALC}\) knowledge bases. First we show that the \(\mathcal{ALC}\) privacy problem wrt. concept retrieval and subsumption queries is ExpTime-complete. Then we provide a sufficient condition for data privacy that can be checked in PTime.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Baader, F., Calvanese, D., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F. (eds.): The Description Logic Handbook. Cambridge University Press, Cambridge (2003)MATHGoogle Scholar
  2. 2.
    Smith, M.K., Welty, C., McGuinness, D.L.: OWL web ontology language guide (2004),
  3. 3.
    Stoffel, K., Studer, T.: Provable data privacy. In: Viborg, K., Debenham, J., Wagner, R. (eds.) DEXA 2005. LNCS, vol. 3588, pp. 324–332. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    Stouppa, P., Studer, T.: A formal model of data privacy. In: Virbitskaite, I., Voronkov, A. (eds.) PSI 2006. LNCS, vol. 4378, pp. 401–411. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  5. 5.
    Stouppa, P., Studer, T.: Data privacy for \(\mathcal{ALC}\), Technical Report, IAM 08-002 (2008),
  6. 6.
    Fagin, R., Kolaitis, P.G., Miller, R., Popa, L.: Data exchange: Semantics and query answering. Theoretical Computer Science 336, 89–124 (2005)MathSciNetCrossRefMATHGoogle Scholar
  7. 7.
    Hofmann, M.: Proof-theoretic approach to description-logic. In: LICS 2005, pp. 229–237. IEEE Computer Society, Los Alamitos (2005)Google Scholar
  8. 8.
    van der Meyden, R.: Logical approaches to incomplete information: a survey. In: Logics for databases and information systems, pp. 307–356. Kluwer, Dordrecht (1998)CrossRefGoogle Scholar
  9. 9.
    Calì, A., Calvanese, D., Giacomo, G.D., Lenzerini, M.: Data integration under integrity constraints. In: Pidduck, A.B., Mylopoulos, J., Woo, C.C., Ozsu, M.T. (eds.) CAiSE 2002. LNCS, vol. 2348, pp. 262–279. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  10. 10.
    Halevy, A.Y.: Answering queries using views: A survey. The VLDB Journal 10(4), 270–294 (2001)CrossRefMATHGoogle Scholar
  11. 11.
    Arenas, M., Libkin, L.: XML data exchange: Consistency and query answering. In: PODS, pp. 13–24 (2005)Google Scholar
  12. 12.
    Nash, A., Deutsch, A.: Privacy in glav information integration. In: Schwentick, T., Suciu, D. (eds.) ICDT 2007. LNCS, vol. 4353, pp. 89–103. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  13. 13.
    Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. Journal of Information Security 7(3), 199–217 (2008)CrossRefGoogle Scholar
  14. 14.
    Miklau, G., Suciu, D.: A formal analysis of information disclosure in data exchange. In: SIGMOD, pp. 575–586. ACM, New York (2004)Google Scholar
  15. 15.
    Deutsch, A., Papakonstantinou, Y.: Privacy in database publishing. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol. 3363, pp. 230–245. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  16. 16.
    Machanavajjhala, A., Gehrke, J.: On the efficiency of checking perfect privacy. In: PODS 2006, pp. 163–172. ACM Press, New York (2006)Google Scholar
  17. 17.
    Dalvi, N.N., Miklau, G., Suciu, D.: Asymptotic conditional probabilities for conjunctive queries. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol. 3363, pp. 289–305. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  18. 18.
    Martin, D.J., Kifer, D., Machanavajjhala, A., Gehrke, J., Halpern, J.Y.: Worst-case background knowledge in privacy. In: ICDE, pp. 126–135. IEEE, Los Alamitos (2007)Google Scholar
  19. 19.
    Calvanese, D., De Giacomo, G., Lenzerini, M., Rosati, R.: View-based query answering over description logic ontologies. In: Principles of Knowledge Representation and Reasoning, pp. 242–251 (2008)Google Scholar
  20. 20.
    Grau, B.C., Horrocks, I.: Privacy-preserving query answering in logic-based information systems. In: 18th European Conference on Artificial Intelligence (ECAI 2008) (to appear, 2008)Google Scholar
  21. 21.
    Horrocks, I., Patel-Schneider, P., van Harmelen, F.: From SHIQ and RDF to OWL: The making of a web ontology language. Journal of Web Semantics 1(1) (2003)Google Scholar
  22. 22.
    Calvanese, D., Lenzerini, M.: Answering queries using views over description logics knowledge bases. In: Proceedings of AAAI 2000, pp. 386–391 (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Phiniki Stouppa
    • 1
  • Thomas Studer
    • 1
  1. 1.Institut für Informatik und angewandte MathematikUniversität BernBernSwitzerland

Personalised recommendations