Ontology guided XML security engine

  • Authors:
  • Andrei Stoica;Csilla Farkas

  • Affiliations:
  • Information Security Laboratory, Department of Computer Science and Engineering, University of South Carolina;Information Security Laboratory, Department of Computer Science and Engineering, University of South Carolina

  • Venue:
  • Journal of Intelligent Information Systems - Special issue: Database and applications security
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we study the security impact of large scale, semantically enhanced data processing in distributed databases. We present an ontology-supported security model to detect undesired inferences via replicated XML data. Our model is able to detect inconsistent security classifications of replicated data. Wc propose the Ontology Guided XML Security Engine (Oxsegin) architecture to identify data items exposed to ontology-based inference attacks. The main technical contribution is the development of the Probabilistic Inference Engine used by Oxsegin. The inference engine operates on DTD files, corresponding to XML documents, and detects tags that are ontologically equivalent, i.e., can be abstracted to the same concept in the ontology, but may be different syntactically. Potential illegal inferences occur when two ontologically equivalent tags have contradictory security classifications. These tags are marked with a security violation pointer (SVP). Confidence level coefficients, attached to every security violation pointer, differentiate among the detected SVPs based on the system's confidence in an indicated inference.