1 / 24

Semantic Web Technologies to Reconcile Privacy and Context Awareness

Semantic Web Technologies to Reconcile Privacy and Context Awareness. Norman M. Sadeh ISRI- School of Computer Science Carnegie Mellon University Pittsburgh, PA - USA. Mobility Challenge. Can no longer assume the user’s undivided attention Time critical nature of many tasks

Download Presentation

Semantic Web Technologies to Reconcile Privacy and Context Awareness

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Semantic Web Technologies to Reconcile Privacy and Context Awareness Norman M. Sadeh ISRI- School of Computer Science Carnegie Mellon University Pittsburgh, PA - USA

  2. Mobility Challenge • Can no longer assume the user’s undivided attention • Time critical nature of many tasks • Limited input/output functionality

  3. Context Awareness • …All this argues for: • Higher levels of automation • Context awareness • …True also in fixed Internet scenarios

  4. Sources of Contextual Information • A user’s context information is distributed across a number of disparate resources • Calendar • Location tracking • Address book • Buddy lists • Weather • Available resources vary from one user to another • …and over time • e.g. roaming across different networks

  5. Vision • A growing collection of context-aware agents that users can buy or subscribe to • Personal resources modeled as Semantic Web services • Service profile • Each user has a Semantic eWallet • Automated identification and access of a user’s personal resources subject to privacy preferences

  6. Semantic Web Approach • Ontologies to explicitly represent and reason about: • Personal/Contextual Resources • Location tracking, calendar, organizational resources, messaging resources, preferences, etc. • Contextual attributes • e.g. location, calendar activities, social or organizational context, etc. • Preferences, incl. privacy preferences: • Access control preferences • “Obfuscation” rules • Web services • Automated service identification and access

  7. Personal Resource Ontology: An Example Personal Resource IS-A Location Information Resource Activity Information Resource List of Friends INSTANCE CMU Location Tracking Microsoft Outlook Calendar Sprint PCS Location Tracking

  8. MyCampus Project • Motivation: • Campus as “everyday life microcosm” • Objective: • Enhance campus life through context-aware services accessible over the WLAN • Methodology: • Involve stakeholders in the design • Students and other members of the community • Evaluate and extrapolate to other environments • Mobile Commerce, Mobile Enterprise, etc.

  9. Overall Architecture Personal Preference Ontologies Personal Resource Ontologies Contextual Ontologies Service Ontologies Semantic Web-enabled Context Resources Internet and Intranet Semantic Web-enabled Services User’s Personal Environment Calendar e-Wallet Personal Resource Directory (incl. Privacy Pref.) Location Tracking Semantic Web Service Directory Wireless LAN Social Context Preferences Task-Specific Agents

  10. Semantic eWallet • Context-independent knowledge • Name, email address, context-independent preferences • Context-dependent knowledge • “When driving, I don’t want to receive instant messages” • Service invocation rules • Automated service identification and access • Map contextual attributes onto different resources (personal and public) • Privacy rules • Access control rules • “Only my classmates can see my location” • Obfuscation rules • “My classmates can only see the building I am in but not the actual room”

  11. Location Tracking as Web Service Location Tracking as a Web Service

  12. Example : Query from John inquiring about Mary’s location the sender of the query is John John’s query requires accessing Mary’s location Is John allowed to see Mary’s location given what we know about the context of the query? Mary said she only allows colleagues to see her location when she is on campus John is a colleague of Mary Access location tracking functionality or Mary’s calendar Is Mary on campus? Mary is willing to disclose the building but not the room she is in Mary is in Smith Hall Query context assertion Asserting elementary needs for authorized information Pre-check access rights Query Fetch usefulstatic knowledge Call relevant external services Post-checkaccess rights Result Application of obfuscation rules Assertion ofauthorized knowledge e-

  13. User Interaction Agent FIPA ACL messages and OWL Content Directory Facilitator Agent (FIPA) Agent Management Agent (FIPA) e-Wallet Manager Agent Ontologist Agent Task-Specific Agents JADE platform

  14. HTTP Request User Interaction Agent FIPA ACL messages and OWL Content Directory Facilitator Agent (FIPA) Agent Management Agent (FIPA) e-Wallet Manager Agent Ontologist Agent Task-Specific Agents JADE platform

  15. privacy query service Core Know-ledge answer Design of an e-Wallet • Three-layer architecture: security through typing • Core knowledge: User static & context-sensitive knowledge • Service Layer: Automatic identification and invocation of external sourcesof knowledge (e.g. public web services and and personal resources) • Privacy layer: Enforces privacy rulesaccess control & obfuscation • All facts represented in OWL • Backward chaining migration rules: privacy rules, service rules, static migration rules

  16. privacy query service Core Know-ledge answer Query context assertion Asserting elementary needs for authorized information Pre-check access rights Query Fetch usefulstatic knowledge Call relevant external services Post-checkaccess rights Result Application of obfuscation rules Assertion ofauthorized knowledge Design of an e-Wallet • Three-layer architecture: security through typing • Core knowledge: user static & context-sensitive knowledge • Service Layer: automatic identification and invocation of personal and public semantic web services • Privacy layer: enforces privacy rulesaccess control obfuscation rules e-

  17. Ontology in OWL Ontology stylesheet Ontology in CLIPS & Annotation in OWL Annotation stylesheet Annotation in CLIPS & Rule in (R)OWL Rule stylesheet Rule in CLIPS & Services in (W)OWL Service stylesheet Service rule in CLIPS & Privacy in (S)OWL Privacy stylesheet Privacy rule in CLIPS & Query in (Q)OWL Query stylesheet Query rules in CLIPS Result in OWL & XSLT Engine JESS Implementation Details OWL Meta-model in CLIPS

  18. Visualizing & Editing Preferences Visualizing & editing a privacy rule

  19. Editing Based on Existing Ontologies

  20. Obfuscation Example • User location finder City level level City block level

  21. Slide Projector Agent

  22. Empirical Evaluation • Initial prototype working on Carnegie Mellon’s campus • Restaurant concierge agent, message filtering agent, etc. • Integration with calendar, location tracking, user profile, etc. • Evaluation • Context awareness adds value • Requires access to a broad range of resources/attributes • Privacy concerns have to be addressed • Additional validation on context-aware enterprise and DoD applications

  23. Concluding Remarks • Context awareness helps overcome the limitations of mobile devices and the time criticality of mobile scenarios • Context awareness makes privacy even more critical • Our experiments indicate that user preferences are often complex • Incl. context-sensitive preferences • Capturing these preferences is far from trivial • Default profiles, learning, dialogs, • How far can we go? • Semantic Web approach • Allows for policies that refer to concepts introduced in any number of domain-specific ontologies • Opportunities for reconciliation with P3P/APPEL

  24. Q&A Source:http://www.firstmonday.org/issues/issue4_9/odlyzko/index.html

More Related