Abstract
AbstractControlled query evaluation (CQE) is an approach for confidentiality-preserving query answering where a function called censor alters query answers so that users can never infer data that are protected by a policy given in terms of logic formulae. In this paper, we review some foundational results we have recently found in the context of CQE over Description Logic ontologies. In more detail, we discuss the main characteristics of two notions of censor, CQ censor and GA censor, focusing on the computational complexity of query answering and on the notion of indistinguishability. The latter is a desirable property imposing that a censor always makes a user believe that the underlying data instance might not contain confidential data. As for computational aspects, we characterize the data complexity of answering conjunctive queries for the relevant and practical case of $$\text {DL-Lite} _{{\mathcal {R}}}$$
DL-Lite
R
ontologies. Since neither CQ censors nor GA censors enjoy both indistinguishability and tractability of query answering in the analyzed setting, we finally recall the notion of IGA censors, a sound approximation of GA censors which instead enjoys both properties, thus paving the way for robust and practical CQE for $$\text {DL-Lite} _{{\mathcal {R}}}$$
DL-Lite
R
ontologies.
Funder
Università degli Studi di Roma La Sapienza
Publisher
Springer Science and Business Media LLC
Reference38 articles.
1. Baader F, Calvanese D, McGuinness D, Nardi D, Patel-Schneider PF, editors. The description logic handbook: theory, implementation and applications. 2nd ed. Cambridge University Press; 2007.
2. Bayardo RJ, Agrawal R. Data privacy through optimal k-anonymization. In: Aberer K, Franklin MJ, Nishio S (eds) Proc. of the 31th IEEE Int. Conf. on Data Engineering (ICDE). IEEE Computer Society Press; 2005. pp. 217–228
3. Benedikt M, Cuenca Grau B, Kostylev EV. Logical foundations of information disclosure in ontology-based data integration. Artif Intell. 2018;262:52–95.
4. Bhanot R, Hans R. A review and comparative analysis of various encryption algorithms. Int J Secur Appl. 2015;9:289–306.
5. Biskup J. For unknown secrecies refusal is better than lying. Data Knowl Eng. 2000;33(1):1–23.