Table Of ContentT Secure Data Provenance
K h
KaCu
hntadra
aaei
drns
ilkcioheing and Inference Control
agah
rlda
u m
with Semantic Web
I
n
f
e
r
S
e
e
n
c
c
u
e
r
Ce
o
D
n
a
t
rt
a
o
lP
w
r
o
i
tv
h
e
n
S
a
e
mn
c
ae
n
a
t
n
i
c
d
W
Bhavani Thuraisingham • Tyrone Cadenhead
e
b Murat Kantarcioglu • Vaibhav Khadilkar
Secure Data Provenance
and Inference Control
with Semantic Web
OTHER BOOKS BY BHAVANI THURAISINGHAM
FROM AUERBACH PUBLICATIONS
Building Trustworthy Semantic Webs
ISBN: 978-0-8493-5080-1
Database and Applications Security: Integrating Information Security
and Data Management
ISBN: 978-0-8493-2224-2
Data Management Systems: Evolution and Interoperation
ISBN: 978-0-8493-9493-5
Data Mining: Technologies, Techniques, Tools, and Trends
ISBN: 978-0-8493-1815-3
Data Mining Tools for Malware Detection
with Mehedy Masud and Latifur Khan
ISBN: 978-1-4398-5454-9
Design and Implementation of Data Mining Tools
with Lei Wang, Latifur Khan, and M. Awad
ISBN: 978-1-4200-4590-1
Developing and Securing the Cloud
ISBN: 978-1-4398-6291-9
Managing and Mining Multimedia Databases
ISBN: 978-0-8493-0037-0
Secure Semantic Service-Oriented Systems
ISBN: 978-1-4200-7331-7
Web Data Mining and Applications in Business Intelligence and
Counter-Terrorism
ISBN: 978-0-8493-1460-5
XML Databases and the Semantic Web
ISBN: 978-1-4200-7331-7
AUERBACH PUBLICATIONS
www.auerbach-publications.com
To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401
E-mail: [email protected]
Secure Data Provenance
and Inference Control
with Semantic Web
Bhavani Thuraisingham • Tyrone Cadenhead
Murat Kantarcioglu • Vaibhav Khadilkar
To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2015 by Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, an Informa business
No claim to original U.S. Government works
Version Date: 20140609
International Standard Book Number-13: 978-1-4665-6944-7 (eBook - PDF)
This book contains information obtained from authentic and highly regarded sources. Reasonable
efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors and
publishers have attempted to trace the copyright holders of all material reproduced in this publication
and apologize to copyright holders if permission to publish in this form has not been obtained. If any
copyright material has not been acknowledged please write and let us know so we may rectify in any
future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information stor-
age or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copy-
right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222
Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that pro-
vides licenses and registration for a variety of users. For organizations that have been granted a photo-
copy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
To Our Colleague and Friend
he late Dr. Steve Barker
Kings College, University of London
hank you for the fruitful collaboration we have
had on data and applications security.
Contents
Preface .........................................................................................................xvii
Acknowledgments .......................................................................................xxv
Authors ......................................................................................................xxvii
Permissions ................................................................................................xxix
1 Introduction ...........................................................................................1
1.1 Overview ...........................................................................................1
1.2 Background .......................................................................................3
1.3 Motivation .........................................................................................5
1.4 Our Solutions and Contributions ......................................................7
1.5 Outline of the Book ...........................................................................9
1.6 Next Steps .......................................................................................11
References ..................................................................................................12
SeCtion i SUPPoRtinG teCHnoLoGieS
SeCtion i introduction
2 Security and Provenance ......................................................................19
2.1 Overview .........................................................................................19
2.2 Scalability and Security of Provenance ............................................21
2.3 Access Control Languages and Provenance .....................................22
2.4 Graph Operations and Provenance ..................................................23
2.5 Summary and Directions ................................................................24
References ..................................................................................................24
3 Access Control and Semantic Web .......................................................29
3.1 Overview .........................................................................................29
3.2 Access Control .................................................................................30
3.3 Semantic Web..................................................................................31
3.4 Semantic Web and Security .............................................................36
vii
viii ◾ Contents
3.5 Summary and Directions ................................................................39
References ..................................................................................................39
4 he Inference Problem .........................................................................43
4.1 Overview .........................................................................................43
4.2 he Inference Problem ....................................................................44
4.2.1 Functions of an Inference Controller .................................44
4.2.2 Inference Strategies .............................................................45
4.2.3 Security Constraints ..........................................................46
4.2.4 Machine Learning and Inference .......................................46
4.3 Our Approach ................................................................................46
4.4 Historical Perspective ......................................................................47
4.5 A Note on the Privacy Problem .......................................................49
4.6 Summary and Directions ................................................................50
References ..................................................................................................50
5 Inference Engines .................................................................................53
5.1 Overview .........................................................................................53
5.2 Concepts for Inference Engines .......................................................53
5.3 Software Systems .............................................................................56
5.4 Summary and Directions ................................................................60
References ..................................................................................................60
6 Inferencing Examples ...........................................................................63
6.1 Overview .........................................................................................63
6.2 Inference Function .........................................................................64
6.3 Classiication of a Knowledge Base ..................................................65
6.4 Inference Strategies and Examples ...................................................68
6.5 Approaches to the Inference Problem ..............................................74
6.6 Inferences in Provenance .................................................................76
6.7 Summary and Directions ...............................................................77
References ..................................................................................................78
7 Cloud Computing Tools and Frameworks ...........................................81
7.1 Overview .........................................................................................81
7.2 Cloud Computing Tools ..................................................................82
7.3 Cloud Computing Framework........................................................84
7.3.1 RDF Integration ................................................................84
7.3.2 Provenance Integration .......................................................85
7.4 Secure Query Processing in a Cloud Environment ..........................86
7.4.1 he Web Application Layer ................................................86
7.4.2 he ZQL Parser Layer ........................................................87
7.4.3 he XACML Policy Layer ..................................................88
7.4.4 he Hive Layer ...................................................................89