Inverted XML Access Control Model Based on Ontology Semantic Dependency

被引:14
作者
Wang, Meijuan [1 ,2 ]
Wang, Jian [1 ]
Guo, Lihong [1 ,3 ]
Harn, Lein [4 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Jiangsu, Peoples R China
[2] Army Engn Univ PLA, Command & Control Engn Coll, Nanjing 210007, Jiangsu, Peoples R China
[3] Nanjing Inst Technol, Dept Commun Engn, Nanjing 211167, Jiangsu, Peoples R China
[4] Univ Missouri, Kansas City, MO 64110 USA
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2018年 / 55卷 / 03期
基金
中国国家自然科学基金;
关键词
Privacy protection; access control; semantic dependence; inverted XML global view;
D O I
10.3970/cmc.2018.02568
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the era of big data, the conflict between data mining and data privacy protection is increasing day by day. Traditional information security focuses on protecting the security of attribute values without semantic association. The data privacy of big data is mainly reflected in the effective use of data without exposing the user's sensitive information. Considering the semantic association, reasonable security access for privacy protect is required. Semi-structured and self-descriptive XML (eXtensible Markup Language) has become a common form of data organization for database management in big data environments. Based on the semantic integration nature of XML data, this paper proposes a data access control model for individual users. Through the semantic dependency between data and the integration process from bottom to top, the global visual range of inverted XML structure is realized. Experimental results show that the model effectively protects the privacy and has high access efficiency.
引用
收藏
页码:465 / 482
页数:18
相关论文
共 19 条
[1]  
[Anonymous], 2010, IEEE 11 INT WORKSH S
[2]  
[Anonymous], THESIS
[3]  
Damiani E., 2002, ACM Transactions on Information and Systems Security, V5, P169, DOI 10.1145/505586.505590
[4]  
Emami SS, 2010, ISECURE-ISC INT J IN, V2, P47
[5]  
[冯登国 Feng Dengguo], 2014, [计算机学报, Chinese Journal of Computers], V37, P246
[6]  
Giuseppe D. A., 2015, PRIVACY DESIGN BIG D
[7]   eXtensible Markup Language access control model with filtering privacy based on matrix storage [J].
Guo, Lihong ;
Wang, Jian ;
Wu, Haitao ;
Du, He .
IET COMMUNICATIONS, 2014, 8 (11) :1919-1927
[8]  
Hulsebosch R.J., 2005, Proceedings of the 10th ACM symposium on Access Control Models and Technologies, SACMAT '05, P111, DOI DOI 10.1145/1063979.1064000
[9]   Using inverted indexing to facilitate composition-oriented semantic service discovery [J].
Department of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China .
Ruan Jian Xue Bao, 2007, 8 (1911-1921) :1911-1921
[10]  
Kudo Michiharu., 2000, P 7 ACM C COMPUTER C, P87