1 / 13

Storing Semantic Web Data in an Untrusted Datastore

Storing Semantic Web Data in an Untrusted Datastore. Scenario.  Health Service organizations need to store patient records.  Two important considerations:. 1. Not all clinics and hospitals can afford dedicated hardware and personnel for record keeping.

suarezc
Download Presentation

Storing Semantic Web Data in an Untrusted Datastore

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Storing Semantic Web Data in an Untrusted Datastore

  2. Scenario Health Service organizations need to store patient records. Two important considerations: 1. Not all clinics and hospitals can afford dedicated hardware and personnel for record keeping. 2. Data integration is a major need for providing effective health services

  3. Initial System Architecture DataStore Data Source Hospital Data Aggregation Module DB Data Source Clinic Data Query Module Client (Hospital) Client (HMO)

  4. Type of Data For this particular project, we are interested in RDF (Resource Description Framework). RDF data model is based on a simple binary graph concept: Node Node Subject Predicate Object

  5. RDF Instance Patient Record of John Smith <rdf:Description rdf:about="http://.../JohnSmith"> <info:age> 25 </info:age> </rdf:Description>  http://.../JohnSmith 25 info:age

  6. Objectives:  Privacy of Stored Data  Efficient text and number based data retrieval  Only trusted users can query Definition - Trusted users: A person X is trusted iff she has the authorized privilege from the original data source to access the data.

  7. Revised System Architecture DataStore Secure CoProcessor Data Source Hospital Data Aggregation Module Enc. DB Data Query Module Client (HMO)

  8. Implementation Details Database Schema (fixed 5 attribute tables) EncT Sub Pred Obj Role EncT = EK(Sub,Pred,Obj)

  9. Implementation Details How to store integer data: 0 100 200 300 400 500 Divide the domain of the attribute into buckets. Q: Fixed sized bucket or expanding bucket? A: Fixed sized – harder to implement, more security than expanding.

  10. Implementation Details How to store Character data: Hash(“http://.../JohnSmith) = v Brute-Force Attack: Hash(some_string) = = v ? If yes, some_string = http://.../JohnSmith Solution: 1) Use Keyed Hash 2) Partition the range of hash function into buckets 0 100 200 300 400 500

  11. Challenges: How to perform %LIKE% (wildcard) queries on character data Hash(http://.../JohnSmith) ~ Hash(http://.../John?????) SELECT ?x WHERE { ?x <http://www.w3.org/2001/vcard-rdf/3.0#FN> "John????? " }

  12. Potential Solution Storing Character Data for %LIKE% queries String S = h t t p : / / . . ./ J o h n S m i t h Total 26 characters in the alphabet. Define: Function Ind = index into the string FunctionAlpPos = index into the English alphabet Enc(S) = (x – Ind(h)AlpPos(h)) (x – Ind(t)AlpPos(t)…

  13. Future Work Process full-fledged RDF data. Benchmark with voluminous data. Transport the application into SCP.

More Related