Skip to main content

Leveraging Protection and Efficiency of Query Answering in Heterogenous RDF Data Using Blockchain

  • Chapter
  • First Online:
Book cover Data Management and Analysis

Part of the book series: Studies in Big Data ((SBD,volume 65))

Abstract

In recent years, the digital world has experienced a massive amount of data being captured in various domains due to improvements in technology. Accordingly, big data management has emerged for storing, managing, and extracting valuable knowledge from collected data. Due to the explosion of the amount of data, developing tools for accurate and timely integration of inherently heterogeneous data has become a critical need. In the first part of this study, we focus on a semantic data integration approach with a case study of a plant ontology to provide a uniform query interface between users and different data sources. In the second part of this study, we propose a distributed Hyperledger-based architecture to ensure data security and privacy preservation in a semantic data integration framework. Data privacy and security can potentially be violated by unauthorized users, or malicious entities. The proposed view layer architecture between heterogeneous data sources and user interface layer using distributed Hyperledger can ensure only authorized users have access to the data sources in order to protect the system against unauthorized violation and determine the degree of users’ permission for read and write access.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abbate, J. (1999). The electrical century: Inventing the Web. Proceedings of the IEEE, 87(11), 1999–2002.

    Article  Google Scholar 

  2. Chandarana, P., & Vijayalakshmi, M. (2014). Big data analytics frameworks. In Circuits, Systems, Communication and Information Technology Applications (CSCITA), 2014 International Conference on (pp. 430–434). Piscataway, NJ: IEEE.

    Google Scholar 

  3. Strawn, G. (2014). Masterminds of the world wide web. IT Professional, 16(4), 58–59.

    Article  Google Scholar 

  4. Janev, V., & Vranes, S. (2009). Semantic web technologies: Ready for adoption? IT Professional, 11(5), 8–16.

    Article  Google Scholar 

  5. Howell, S., Rezgui, Y., & Beach, T. (2018). Water utility decision support through the semantic web of things. Environmental Modelling & Software, 102, 94–114.

    Article  Google Scholar 

  6. Kassani, P. H., Teoh, A. B. J., & Kim, E. (2017). Evolutionary-modified fuzzy nearest-neighbor rule for pattern classification. Expert Systems with Applications, 88, 258–269.

    Article  Google Scholar 

  7. Ostrowski, D. (2018). Building linked data agents for mobility applications. In Proceedings - 12th IEEE International Conference on Semantic Computing, ICSC 2018. Piscataway, NJ: IEEE.

    Google Scholar 

  8. Miao, Q., Meng, Y., Fang, L., Nishino, F., & Igata, N. (2015). Link scientific publications using linked data. In Semantic Computing (ICSC), 2015 IEEE International Conference on (pp. 268–271). Piscataway, NJ: IEEE.

    Chapter  Google Scholar 

  9. Costanzo, A., Faro, A., Giordano, D., & Spampinato, C. (2012). Implementing Ubiquitous Information services with ontologies: Methodology and case study. In Computer Science and Information Systems (FedCSIS), 2012 Federated Conference on (pp. 911–914). Piscataway, NJ: IEEE.

    Google Scholar 

  10. Chakraborty, A., Munshi, S., & Mukhopadhyay, D. (2013). Searching and establishment of S-P-O relationships for linked RDF Graphs: An adaptive approach. In Proceedings - 2013 International Conference on Cloud and Ubiquitous Computing and Emerging Technologies, CUBE 2013. Washington, DC: IEEE Computer Society.

    Google Scholar 

  11. Sara Hosseinzadeh Kassani, S. E. N., & Kassani, P. H. (2015). Introducing a hybrid model of DEA and data mining in evaluating efficiency. Case study: Bank branches. Academic Journal of Research in Economics and Management, 3(2), 72–80.

    Google Scholar 

  12. Pathak, J., Kiefer, R. C., & Chute, C. G. (2013). Mining drug-drug interaction patterns from linked data: A case study for Warfarin, Clopidogrel, and Simvastatin. In Proceedings - 2013 IEEE International Conference on Bioinformatics and Biomedicine, IEEE BIBM 2013 (pp. 23–30). Piscataway, NJ: IEEE.

    Chapter  Google Scholar 

  13. Wang, S., Man, Y., Zhang, T., Wong, T. J., & King, I. (2013). Data management with flexible and extensible data schema in clans. Procedia Computer Science, 24, 268–273.

    Article  Google Scholar 

  14. Kanchi, S., Sandilya, S., Ramkrishna, S., Manjrekar, S., & Vhadgar, A. (2015). Challenges and solutions in big data management-An overview. In Proceedings - 2015 International Conference on Future Internet of Things and Cloud, FiCloud 2015 and 2015 International Conference on Open and Big Data, OBD 2015 (pp. 418–426). IEEE.

    Google Scholar 

  15. Kassani, P. H., & Kim, E. (2016). Pseudoinverse Matrix Decomposition Based Incremental Extreme Learning Machine with Growth of Hidden Nodes. International Journal of Fuzzy Logic and Intelligent Systems, 16(2), 125–130.

    Article  Google Scholar 

  16. Moujane, A., Chiadmi, D., Benhlima, L., & Wadjinny, F. (2009). A study in the P2P data integration process. In Computer Systems and Applications, 2009. AICCSA 2009. IEEE/ACS International Conference on (pp. 57–58). Piscataway, NJ: IEEE.

    Chapter  Google Scholar 

  17. Kassani, P. H., & Teoh, A. B. J. (2017). A new sparse model for traffic sign classification using soft histogram of oriented gradients. Applied Soft Computing Journal, 52, 231–246.

    Article  Google Scholar 

  18. Al Nuaimi, N., AlShamsi, A., Mohamed, N., & Al-Jaroodi, J. (2015). e-Health cloud implementation issues and efforts. In Industrial Engineering and Operations Management (IEOM), 2015 International Conference on (pp. 1–10). IEEE.

    Google Scholar 

  19. Treiblmaier, H., Madlberger, M., Knotzer, N., & Pollach, I. (2004). Evaluating personalization and customization from an ethical point of view: An empirical study. In System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on (p. 10). IEEE.

    Google Scholar 

  20. Sugumaran, M., Murugan, B. B., & Kamalraj, D. (2014). An architecture for data security in cloud computing. In 2014 World Congress on Computing and Communication Technologies (pp. 252–255). IEEE.

    Google Scholar 

  21. Paul, R., et al. (2008). An ontology-based integrated assessment framework for high-assurance systems. In Semantic Computing, 2008 IEEE International Conference on (pp. 386–393). IEEE.

    Google Scholar 

  22. Park, H.-A., Lee, D. H., & Zhan, J. (2008). Attribute-based access control using combined authentication technologies. In Granular Computing, 2008. GrC 2008. IEEE International Conference on (pp. 518–523). IEEE.

    Google Scholar 

  23. Lv, Z., Song, H., Basanta-Val, P., Steed, A., & Jo, M. (2017). Next-generation big data analytics: State of the art, challenges, and future research topics. IEEE Transactions on Industrial Informatics, 13(4), 1891–1899.

    Article  Google Scholar 

  24. Taleb, I., El Kassabi, H. T., Serhani, M. A., Dssouli, R., & Bouhaddioui, C. (2016). Big data quality: A quality dimensions evaluation. In 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld) (pp. 759–765). IEEE.

    Google Scholar 

  25. Karkouch, A., Al Moatassime, H., Mousannif, H., & Noel, T. (2015). Data quality enhancement in Internet of Things environment. In Computer Systems and Applications (AICCSA), 2015 IEEE/ACS 12th International Conference of (pp. 1–8). IEEE.

    Google Scholar 

  26. Botha, M., Botha, A., & Herselman, M. (2014). Data quality challenges: A content analysis in the e-health domain. In 2014 4th World Congress on Information and Communication Technologies, WICT 2014 (pp. 107–112). IEEE.

    Google Scholar 

  27. Kayem, A. V. D. M., Martin, P., & Akl, S. G. (2011). Efficient enforcement of dynamic cryptographic access control policies for outsourced data. In Information Security South Africa (ISSA), 2011 (pp. 1–8). IEEE.

    Google Scholar 

  28. Balani, R., Wanner, L. F., Friedman, J., Srivastava, M. B., Lin, K., & Gupta, R. K. (2011). Programming support for distributed optimization and control in cyber-physical systems. In Proceedings - 2011 IEEE/ACM 2nd International Conference on Cyber-Physical Systems, ICCPS 2011 (pp. 109–118). IEEE Computer Society.

    Google Scholar 

  29. Farroha, B., Essman, K., Farroha, D., & Cohen, A. (2011). Development of an integrated security framework to enable the control and security of a heterogeneous enterprise. In Systems Conference (SysCon), 2011 IEEE International (pp. 103–108). IEEE.

    Google Scholar 

  30. Ferrara, A. L., Fachsbauer, G., Liu, B., & Warinschi, B. (2015). Policy privacy in cryptographic access control. In Computer Security Foundations Symposium (CSF), 2015 IEEE 28th (pp. 46–60). IEEE.

    Google Scholar 

  31. Upadhyaya, A., & Bansal, M. (2015). Deployment of secure sharing: Authenticity and authorization using cryptography in cloud environment. In Conference Proceeding - 2015 International Conference on Advances in Computer Engineering and Applications, ICACEA 2015 (pp. 852–855). IEEE.

    Google Scholar 

  32. Yang, K.-A., Yang, H.-J., Yang, J.-D., & Kim, K.-H. (2005). Bio-ontology construction using object-oriented paradigm. In 12th Asia-Pacific Software Engineering Conference (APSEC’05) (p. 6). IEEE.

    Google Scholar 

  33. Kim, K.-H., Yang, J.-D., Choi, J.-H., Yang, K.-A., & Ha, Y.-G. (2007). A semantic inheritance/inverse-inheritance mechanism for systematic bio-ontology construction. In 2007 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (pp. 398–401). IEEE.

    Google Scholar 

  34. Gan, M., Dou, X., Wang, D., & Jiang, R. (2011). DOPCA: A new method for calculating ontology-based semantic similarity. In Proceedings - 2011 10th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2011 (pp. 110–115). IEEE.

    Google Scholar 

  35. Bandyopadhyay, S., & Mallick, K. (2014). A new path based hybrid measure for gene ontology similarity. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 11(1), 116–127.

    Article  Google Scholar 

  36. Silalahi, M., Cahyani, D. E., Sensuse, D. I., & Budi, I. (2015). Developing indonesian medicinal plant ontology using socio-technical approach. In 2015 International Conference on Computer, Communications, and Control Technology (I4CT) (pp. 39–43). IEEE.

    Google Scholar 

  37. Li, X., Zhang, Y., Wang, J., & Pu, Q. (2016). A preliminary study of plant domain ontology. In Proceedings - 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, DASC 2016, 2016 IEEE 14th International Conference on Pervasive Intelligence and Computing, PICom 2016, 2016 IEEE 2nd International Conference on Big Data. IEEE.

    Google Scholar 

  38. Qi, H., Zhang, L., & Gao, Y. (2010). Semantic retrieval system based on corn ontology. In Proceedings - 5th International Conference on Frontier of Computer Science and Technology, FCST 2010 (pp. 116–121). IEEE.

    Google Scholar 

  39. Mizoguchi, R., Sano, T., & Kitamura, Y. (1999). An ontology-based human friendly message generation in a multiagent human media system for oil refinery plant operation. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 1999 (pp. 648–653). IEEE.

    Google Scholar 

  40. Kassani, S. H., & Kassani, P. H. (2018). Building an ontology for the domain of plant science using prot\’eg\’e. arXiv.org. arXiv:1810.04606.

    Google Scholar 

  41. Bezerra, C., Freitas, F., & Santana, F. (2013). Evaluating ontologies with competency questions. In 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) (pp. 284–285). IEEE.

    Google Scholar 

  42. Khan, S., Qamar, U., & Muzaffar, A. W. (2015). A framework for evaluation of owl biomedical ontologies based on properties coverage. In 2015 13th International Conference on Frontiers of Information Technology (FIT) (pp. 59–64). IEEE.

    Google Scholar 

  43. OntoCheck. [Online]. Retrieved from https://protegewiki.stanford.edu/wiki/OntoCheck

  44. Schober, D., Tudose, I., Svatek, V., & Boeker, M. (2012). OntoCheck: Verifying ontology naming conventions and metadata completeness in Protégé 4. Journal of Biomedical Semantics, 3(2), S4.

    Article  Google Scholar 

  45. Samaniego, M., & Deters, R. Supporting IoT multi-tenancy on edge devices. In Proceedings - 2016 IEEE International Conference on Internet of Things; IEEE Green Computing and Communications; IEEE Cyber, Physical, and Social Computing; IEEE Smart Data, iThings-GreenCom-CPSCom-Smart Data 2016 (pp. 2017, 66–2073). IEEE.

    Google Scholar 

  46. Chen, J., & Xue, Y. (2017). Bootstrapping a blockchain based ecosystem for big data exchange. In Big Data (BigData Congress), 2017 IEEE International Congress on (pp. 460–463). IEEE.

    Google Scholar 

  47. Patel, D., Bothra, J., & Patel, V. (2017). Blockchain exhumed. In Asia Security and Privacy (ISEASP), 2017 ISEA (pp. 1–12). IEEE.

    Google Scholar 

  48. Guo, H., Meamari, E., & Shen, C.-C. (2018). Blockchain-inspired event recording system for autonomous vehicles. In 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN) (pp. 218–222). IEEE.

    Google Scholar 

  49. Lewis, A. (2015). Blockchain technology explained. Blockchain Technology, 1–27.

    Google Scholar 

  50. Wright, C., & Serguieva, A. (2018). Sustainable blockchain-enabled services: Smart contracts. In Proceedings - 2017 IEEE International Conference on Big Data, Big Data 2017 (pp. 4255–4264). IEEE.

    Google Scholar 

  51. Jämthagen, C., & Hell, M. (2017). Blockchain-based publishing layer for the keyless signing infrastructure. In 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld) (pp. 374–381). IEEE.

    Google Scholar 

  52. Aste, T., Tasca, P., & Di Matteo, T. (2017). Blockchain technologies: The foreseeable impact on society and industry. Computer, 50(9), 18–28.

    Article  Google Scholar 

  53. Cheng, J.-C., Lee, N.-Y., Chi, C., & Chen, Y.-H. (2018). Blockchain and smart contract for digital certificate. In 2018 IEEE International Conference on Applied System Invention (ICASI) (pp. 1046–1051). IEEE.

    Google Scholar 

  54. Samaniego, M., & Deters, R. (2017). Virtual resources & blockchain for configuration management in IoT. Journal of Ubiquitous Systems & Pervasive Networks, 9(2), 1–13.

    Google Scholar 

  55. Uchibeke, U. U., Kassani, S. H., Schneider, K. A., & Deters, R. (2018). Blockchain access control ecosystem for big data security. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 1373–1378). IEEE.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sara Hosseinzadeh Kassani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Hosseinzadeh Kassani, S., Schneider, K.A., Deters, R. (2020). Leveraging Protection and Efficiency of Query Answering in Heterogenous RDF Data Using Blockchain. In: Alhajj, R., Moshirpour, M., Far, B. (eds) Data Management and Analysis. Studies in Big Data, vol 65. Springer, Cham. https://doi.org/10.1007/978-3-030-32587-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-32587-9_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-32586-2

  • Online ISBN: 978-3-030-32587-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics