Repairing mappings under policy views

03/21/2019
by   Angela Bonifati, et al.
0

The problem of data exchange involves a source schema, a target schema and a set of mappings from transforming the data between the two schemas. We study the problem of data exchange in the presence of privacy restrictions on the source. The privacy restrictions are expressed as a set of policy views representing the information that is safe to expose over all instances of the source. We propose a protocol that provides formal privacy guarantees and is data-independent, i.e., if certain criteria are met, then the protocol guarantees that the mappings leak no sensitive information independently of the data that lies in the source. We also propose an algorithm for repairing an input mapping w.r.t. a set of policy views, in cases where the input mapping leaks sensitive information. The empirical evaluation of our work shows that the proposed algorithm is quite efficient, repairing sets of 300 s-t tgds in an average time of 5s on a commodity machine. To the best of our knowledge, our work is the first one that studies the problems of exchanging data and repairing mappings under such privacy restrictions. Furthermore, our work is the first to provide practical algorithms for a logical privacy-preservation paradigm, described as an open research challenge in previous work on this area.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/03/2019

Reasoning about disclosure in data integration in the presence of source constraints

Data integration systems allow users to access data sitting in multiple ...
research
12/04/2019

Direct Mappings between RDF and Property Graph Databases

Resource Description Framework (RDF) triplestores and Property Graph (PG...
research
10/17/2017

Privacy by typing in the π-calculus

In this paper we propose a formal framework for studying privacy in info...
research
04/21/2013

Exchanging OWL 2 QL Knowledge Bases

Knowledge base exchange is an important problem in the area of data exch...
research
04/30/2018

Relational to RDF Data Exchange in Presence of a Shape Expression Schema

We study the relational to RDF data exchange problem, where the tar- get...
research
07/07/2023

Improving Bitswap Privacy with Forwarding and Source Obfuscation

IPFS is a content-addressed decentralized peer-to-peer data network, usi...
research
01/30/2019

Constructing Independently Verifiable Privacy-Compliant Type Systems for Message Passing between Black-Box Components

Privacy by design (PbD) is the principle that privacy should be consider...

Please sign up or login with your details

Forgot password? Click here to reset