In recent work, we have shown how to compute compliant anonymizations of quantified ABoxes w.r.t. ?L policies. In this setting, quantified ABoxes can be used to publish information about individuals, some of which are anonymized. The policy is given by concepts of the Description Logic (DL) ?L, and compliance means that one cannot derive from the ABox that some non-anonymized individual is an instance of a policy concept. If one assumes that a possible attacker could have additional knowledge about some of the involved non-anonymized individuals, then compliance with a policy is not sufficient. One wants to ensure that the quantified ABox is safe in the sense that none of the secret instance information is revealed, even if the attacker has additional compliant knowledge. In the present paper, we show that safety can be decided in polynomial time, and that the unique optimal safe anonymization of a non-safe quantified ABox can be computed in exponential time, provided that the policy consists of a single ?L concept.
Baader, F., Kriegel, F., Nuradiansyah, A., Penaloza, R. (2021). Safety of quantified ABoxes w.r.t. singleton EL policies. In Proceedings of the ACM Symposium on Applied Computing (pp.863-872). Association for Computing Machinery [10.1145/3412841.3441961].
Safety of quantified ABoxes w.r.t. singleton EL policies
Penaloza, R
2021
Abstract
In recent work, we have shown how to compute compliant anonymizations of quantified ABoxes w.r.t. ?L policies. In this setting, quantified ABoxes can be used to publish information about individuals, some of which are anonymized. The policy is given by concepts of the Description Logic (DL) ?L, and compliance means that one cannot derive from the ABox that some non-anonymized individual is an instance of a policy concept. If one assumes that a possible attacker could have additional knowledge about some of the involved non-anonymized individuals, then compliance with a policy is not sufficient. One wants to ensure that the quantified ABox is safe in the sense that none of the secret instance information is revealed, even if the attacker has additional compliant knowledge. In the present paper, we show that safety can be decided in polynomial time, and that the unique optimal safe anonymization of a non-safe quantified ABox can be computed in exponential time, provided that the policy consists of a single ?L concept.File | Dimensione | Formato | |
---|---|---|---|
BaKrNuPe-SAC2021.pdf
accesso aperto
Tipologia di allegato:
Submitted Version (Pre-print)
Dimensione
523.87 kB
Formato
Adobe PDF
|
523.87 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.