Skip to main content

Controlled Query Evaluation over Prioritized Ontologies with Expressive Data Protection Policies

  • Conference paper
  • First Online:
The Semantic Web – ISWC 2021 (ISWC 2021)

Abstract

We study information disclosure in Description Logic ontologies, in the spirit of Controlled Query Evaluation, where query answering is filtered through optimal censors maximizing answers while hiding data protected by a declarative policy. Previous works have considered limited forms of policy, typically constituted by conjunctive queries (CQs), whose answer must never be inferred by a user. Also, existing implementations adopt approximated notions of censors that might result too restrictive in the practice in terms of the amount of non-protected information returned to the users. In this paper we enrich the framework, by extending CQs in the policy with comparison predicates and introducing preferences between ontology predicates, which can be exploited to decide the portion of a secret that can be disclosed to a user, thus in principle augmenting the throughput of query answers. We show that answering CQs in our framework is first-order rewritable for \(\textit{DL-Lite}_{A} \) ontologies and safe policies, and thus in AC \(^0\) in data complexity. We also present some experiments on a popular benchmark, showing effectiveness and feasibility of our approach in a real-world scenario.

This work was partly supported by the ANR AI Chair INTENDED (ANR-19-CHIA-0014), by the EU within the H2020 Programme under the grant agreement 834228 (ERC Advanced Grant WhiteMec) and the grant agreement 825333 (MOSAICrOWN), by Regione Lombardia within the Call Hub Ricerca e Innovazione under the grant agreement 1175328 (WATCHMAN), and by the Italian MUR (Ministero dell’Università e della Ricerca) through the PRIN project HOPE (prot. 2017MMJJRE), and by Sapienza (project CQEinOBDM).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This example is inspired by the benchmark we use in the experiments.

  2. 2.

    For the sake of presentation, we consider here CQE over ontologies. Our extensions and results apply straightforwardly to a privacy-protected OBDA framework [6].

  3. 3.

    https://www.w3.org/TR/owl2-profiles/.

  4. 4.

    A similar result is provided in [3, Theorem 38] in the context of CQA.

  5. 5.

    Technically speaking, \( \mathsf {PerfectRef}\) rewrites CQs. We here adopt a variant that rewrites the positive part of each \(\textit{BCQ}_ ineq \) in the premise of a policy assertion, which provides a correct reformulation under the safe policy assumption.

  6. 6.

    http://sws.ifi.uio.no/vocab/npd-v2.

  7. 7.

    In [6], we have extracted the conjunctive component of each such query, which in NPD contains also aggregate operators.

References

  1. Baader, F., Calvanese, D., McGuinness, D., Nardi, D., Patel-Schneider, P.F. (eds). The Description Logic Handbook: Theory, Implementation and Applications. 2nd edn, Cambridge University Press, Cambridge (2007)

    Google Scholar 

  2. Benedikt, M., Cuenca Grau, B., Kostylev, E.V.: Logical foundations of information disclosure in ontology-based data integration. AIJ 262, 52–95 (2018)

    Google Scholar 

  3. Bienvenu, M., Bourgaux, C.: Querying and repairing inconsistent prioritized knowledge bases: complexity analysis and links with abstract argumentation. In: Proceedings of KR, pp. 141–151 (2020)

    Google Scholar 

  4. Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. AMAI 40(1–2), 37–62 (2004)

    MathSciNet  MATH  Google Scholar 

  5. Bonatti, P.A., Sauro, L.: A confidentiality model for ontologies. In: Alani, H., Kagal, L., Fokoue, A., Groth, P., Biemann, C., Parreira, J.X., Aroyo, L., Noy, N., Welty, C., Janowicz, K. (eds.) ISWC 2013. LNCS, vol. 8218, pp. 17–32. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41335-3_2

    Chapter  Google Scholar 

  6. Cima, G., Lembo, D., Marconi, L., Rosati, R., Savo, D.F.: Controlled query evaluation in ontology-based data access. In: Proceedings of ISWC, pp. 128–146 (2020)

    Google Scholar 

  7. Cima, G., Lembo, D., Rosati, R., Savo, D.F.: Controlled query evaluation in description logics through instance indistinguishability. In: Proceedings of IJCAI, pp. 1791–1797 (2020)

    Google Scholar 

  8. Cuenca Grau, B., Kharlamov, E., Kostylev, E.V., Zheleznyakov, D.: Controlled query evaluation over OWL 2 RL ontologies. In: Alani, H., Kagal, L., Fokoue, A., Groth, P., Biemann, C., Parreira, J.X., Aroyo, L., Noy, N., Welty, C., Janowicz, K. (eds.) ISWC 2013. LNCS, vol. 8218, pp. 49–65. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41335-3_4

    Chapter  Google Scholar 

  9. Cuenca Grau, B., Kharlamov, E., Kostylev, E.V., Zheleznyakov, D.: Controlled query evaluation for datalog and OWL 2 profile ontologies. In: Proceedings of IJCAI (2015)

    Google Scholar 

  10. De Giacomo, G., et al.: MASTRO: a reasoner for effective ontology-based data access. In: Proceedings of ORE (2012)

    Google Scholar 

  11. Lanti, D., Rezk, M., Xiao, G., Calvanese, D.: The NPD benchmark: reality check for OBDA systems. In: Proceedings of EDBT, pp. 617–628 (2015)

    Google Scholar 

  12. Lembo, D., Rosati, R., Savo, D.F.: Revisiting controlled query evaluation in description logics. In: Proceedings of IJCAI, pp. 1786–1792 (2019)

    Google Scholar 

  13. Poggi, A., Lembo, D., Calvanese, D., De Giacomo, G., Lenzerini, M., Rosati, R.:. Linking data to ontologies. Journal on Data Semantics X, pp. 133–173 (2008)

    Google Scholar 

  14. Sicherman, G.L., de Jonge, W., van de Riet, R.P.: Answering queries without revealing secrets. ACM Trans. Database Syst. 8(1), 41–59 (1983)

    Article  Google Scholar 

  15. Staworko, S., Chomicki, J., Marcinkowski, J.: Prioritized repairing and consistent query answering in relational databases. AMAI 64(2–3), 209–246 (2012)

    MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gianluca Cima .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cima, G., Lembo, D., Marconi, L., Rosati, R., Savo, D.F. (2021). Controlled Query Evaluation over Prioritized Ontologies with Expressive Data Protection Policies. In: Hotho, A., et al. The Semantic Web – ISWC 2021. ISWC 2021. Lecture Notes in Computer Science(), vol 12922. Springer, Cham. https://doi.org/10.1007/978-3-030-88361-4_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-88361-4_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-88360-7

  • Online ISBN: 978-3-030-88361-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics