基于不确定使用边的间接依赖过滤方法Provenance Sanitization for Indirect Dependencies Based on Uncertain Usage Edges
孙连山;陈秀婷;马胜天;
摘要(Abstract):
起源过滤是通过改造起源图中的节点、边或间接依赖关系,隐藏起源图中的敏感信息,实现起源安全发布的新兴技术。针对现有起源过滤研究主要关注节点和边的过滤,较少研究间接依赖的过滤问题。扩展现有"删除+修复"的间接依赖过滤策略,提出了一种起源间接依赖过滤方法。形式地定义不确定的使用边,并阐明引入不确定的使用边修复被误断的间接依赖的基本原理;提出一种基于不确定使用边的间接依赖过滤机制,该机制先删除敏感路径中的恰当的使用边断开敏感间接依赖,再采用最小代价法引入恰当的不确定的使用边修复被误断的非敏感间接依赖。实验结果表明,与现有的间接依赖过滤机制相比,该方法可以在满足结构约束的同时保持过滤视图的溯源效用。
关键词(KeyWords): 起源过滤;间接依赖;不确定使用边;溯源效用;起源安全
基金项目(Foundation): 国家自然科学青年基金(61202019);; 陕西省自然科学基础研究计划(2019JM-354)
作者(Author): 孙连山;陈秀婷;马胜天;
Email:
DOI:
参考文献(References):
- [1] HUYNH T D,MOREAU L.Provenance for online decision making[C]//Proceedings of the 5th International Provenance and Annotation Workshop,2014:44-55.
- [2]刘通,王凤英.基于OPM的安全起源模型[J].计算机应用研究,2013,30(10):3117-3120.
- [3] MOREAU L,GROTH P,CHENEY J,et al.The rationale of PROV[J].Web Semantics:Science,Services and Agents on the World Wide Web,2015,35(4):235-257.
- [4] MISSIER P,BELHAJJAME K,CHENEY J.The W3C PROV family of specifications for modelling provenance metadata[C]//Proceedings of the 16th International Conference on Extending Database Technology,2013:773-776.
- [5] KWASNIKOWSKA N,MOREAU L,BUSSCHE J V D.A formal account of the open provenance model[J].ACM Transactions on the Web,2015,9(2):1-44.
- [6] DAVIDSON S B,ROY S.Provenance:Privacy and security[C]//Proceedings of Encyclopedia of Database Systems,2017:190-196.
- [7]明华,张勇,符小辉.数据溯源技术综述[J].小型微型计算机系统,2012,33(9):1917-1923.
- [8] GURJAR K.Comparative study of evaluating trustworthiness of data based on data provenance[J].Journal of Information Processing Systems,2016,12(2):234-248.
- [9] TORRA V,NAVARRO-ARRIBAS G,SANCHEZ-CHARLE S D,et al.Provenance and privacy[M]//Modeling decision for artificial intelligence.Cham:Springer,2017:3-11.
- [10] CHENEY J,PERERA R.An analytical survey of provenance sanitization[C]//Proceedings of the 5th IPAW on Provenance and Annotation of Data and Processes,2014:113-126.
- [11] LIN Z Y,TRIPUNITARA M.Graph automorphism-based,semanticspreserving security for the Resource Description Framework(RDF)[C]//Proceedings of the 7th ACM Conference on Data and Application Security and Privacy,2017:337-348.
- [12] MISSIER P,BRYANS J,GAMBLE C,et al.ProvAbs:Model,policy,and tooling for abstracting PROV graphs[C]//Proceedings of the 5th IPAW on Provenance and Annotation of Data and Processes,2014:3-15.
- [13] BLAUSTEIN B,CHAPMAN A,SELIGMAN L,et al.Surrogate parenthood:Protected and informative graphs[J].Proc of the Vldb Endowment,2011,4(8):518-525.
- [14] NAGY N,MOKHTAR H M O,EL-SHARKAWI M E.A comprehensive sanitization approach for workflow provenance graphs[C]//Proceedings of International Workshop on Privacy and Anonymity in the Information Society,2016:22-33.
- [15] WU J,NI WW,ZHANG S.Generalization based privacypreserving provenance publishing[C]//Proceedings of International Conference on Web Information Systems and Applications,2018:287-299.
- [16]王艺星,孙连山,石丽波.一种高效用数据起源过滤机制[J].计算机工程,2018,44(3):144-150.
- [17]孙连山,欧阳晓通,徐艳艳,等.面向间接依赖的数据起源过滤方法[J].计算机科学,2019,46(3):164-169.
- [18] DEY S C,ZINN D.PROPUB:Towards a declarative approach for publishing customized,policy-aware provenance[C]//Proceedings of International Conference on Scientific and Statistical Database Management.Portland:Springer,2011:225-243.
- [19]孙连山,徐艳艳,张永斌,等.基于马尔科夫链的起源过滤效用评估模型[J].陕西科技大学学报,2020,38(2):172-179.
- [20] CHEAH Y W,PLALE B,KENDALL-MORWICK J,et al.A noisy 10 GB provenance database[M].Berlin:Springer,2012.