Welcome to Journal of Beijing Institute of Technology
Volume 23Issue 4
.
Turn off MathJax
Article Contents
XUE Jin-rong, ZHENG Jun, AN Qiu-sheng. RDF(S) repository privacy protection via inference control[J]. JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2014, 23(4): 495-501.
Citation: XUE Jin-rong, ZHENG Jun, AN Qiu-sheng. RDF(S) repository privacy protection via inference control[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2014, 23(4): 495-501.

RDF(S) repository privacy protection via inference control

  • Received Date:2013-06-19
  • The privacy protection of resource description framework (schema) (RDF(S)) repository is an emerging topic in database security area. In this paper, entailment rules are investigated based on RDF(S) repository firstly. Then, an idea that uses reasoning closure to judge whether the privacy disclosure caused by inference is existed is proposed. Furthermore, the definitions of implication conditions and information measure of triple statements which gains data hiding algorithm with combining proposition logic reasoning theory are introduced. Meanwhile, a conversion method from conjunctive normal form to disjunctive normal form based minimal hitting sets of set cluster is also proposed. Finally, the experimental results show that our algorithm can prevent privacy disclosure of RDF(S) repository effectively.
  • loading
  • [1]
    Lassila O, Swick R. Resource description framework(RDF): Model and syntax specification. Recommendation, W3C [EB/OL]. (1998-10-11). http://www.w3.org/TR/REC-rdf-syntax/.
    [2]
    Brickley D, Guha R. Resource description framework(RDF) Schema specification 1.0. Candidate recommendation, W3C[EB/OL]. (2000-08-20). http://www.w3.org/TR/2000/CR-rdf-schema20000327/.
    [3]
    Broekstra J. Storage, querying and inferencing for semantic web languages[M]. Amsterdam: Department of Mathematics and Computer Science, Vrije Universiteit Amsterdam, 2005.
    [4]
    Shi Yiyi. RDF closure generation technology research based on the forward chaining strategy[J]. Computer Science, 2008, 35(4):336-337. (in Chinese)
    [5]
    Lu Jianjiang, Wang Jinpeng, Zhang Yafei, et al. An inference control algorithm for RDF(S) repository[C]//Proceedings of the Intelligence and Security Informatics, Chengdu, China: Springer, 2007:262-268.
    [6]
    Papakonstantinou V, Michou M, Fundulaki I, et al. Access control for RDF graphs using abstract models[C]// Proceedings of the 17th ACM symposium on Access Control Models and Technologies, Newark, New Jersey, USA: ACM, 2012:103-112.
    [7]
    Zoi Kaoudi, Manolis Koubarakis. Distributed RDFS reasoning over structured overlay networks[M]. Berlin: Springer, 2013,
    [8]
    Zuo Xiaoling, Li Weijian, Liu Yongcai. Discrete mathematics[M]. Shanghai: Shanghai Science and Technology Press, 1982. (in Chinese)
    [9]
    Zhi Huilai, Zhi Dongjie, Liu Zongtian. Research on conversion from conjunctive normal form to disjunctive normal form[J]. Computer Engineering and Applications, 2012, 48(2):15-17. (in Chinese)
    [10]
    Zhang Dedong, Li Renpu, Zhao Yongsheng. High-efficient algorithm for normal form conversion of discernibility function[J]. Application Research of Computers, 2010, 27(3):879-882.
  • 加载中

Catalog

    通讯作者:陈斌, bchen63@163.com
    • 1.

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (853) PDF downloads(27) Cited by()
    Proportional views
    Related

    /

      Return
      Return
        Baidu
        map