SecureOnt: A Security Ontology for Establishing Data Provenance in Semantic Web
Keywords:Security Ontology, , Data Provenance, Ontology Evaluation Tools, Semantic Web, Ontology Richness, Anomalies, Pitfall Rate
Security becomes a primary concern during sharing of information over the web. To overcome this problem, many security ontologies have been developed so far. The available security ontologies help to track data provenance and contain different aspects of data security like confidentiality, integrity, data availability, and access control. This paper provides a security ontology for establishing data provenance in the semantic web. The proposed ontology contains a comprehensive knowledge base of data security by consolidating all the available security ontologies and derives data provenance with annotations at the extensional level and thus lower maintenance cost. By this paper, analysts and researchers find a road map, an overview of what exists in terms of security ontologies.
Buneman, P., Khanna, S., and Wang-Chiew, T. (2001, January). Why and where: A characterization of data provenance. In International conference on database theory (pp. 316–330). Springer, Berlin, Heidelberg.
Souag, A., Salinesi, C., and Comyn-Wattiau, I. (2012, June). Ontologies for security requirements: A literature survey and classification. In International conference on advanced information systems engineering (pp. 61–69). Springer, Berlin, Heidelberg.
Patel, A., and Debnath, N. C. (2022). Development of the InBan_CIDO Ontology by Reusing the Concepts Along with Detecting Overlapping Information. In Inventive Computation and Information Technologies (pp. 349–359). Springer, Singapore.
Blanco, C., Lasheras, J., Valencia-García, R., Fernández-Medina, E., Toval, A., and Piattini, M. (2008, March). A systematic review and comparison of security ontologies. In 2008 Third International Conference on Availability, Reliability and Security (pp. 813–820). Ieee.
Dalpra, H. L., Costa, G. C. B., Sirqueira, T. F. M., Braga, R. M., Campos, F., Werner, C. M. L., and David, J. M. N. (2015). Using Ontology and Data Provenance to Improve Software Processes. In ONTOBRAS.
Alneyadi, S., Sithirasenan, E., and Muthukkumarasamy, V. (2016). A survey on data leakage prevention systems. Journal of Network and Computer Applications, 62, 137–152.
Thuraisingham, B., Cadenhead, T., Kantarcioglu, M., and Khadilkar, V. (2014). Secure data provenance and inference control with semantic web. CRC Press.
Patel, A., Debnath, N. C., Mishra, A. K., and Jain, S. (2021). Covid19-IBO: a Covid-19 impact on Indian banking ontology along with an efficient schema matching approach. New Generation Computing, 39(3), 647–676.
Fileto, R., Medeiros, C. B., Liu, L., Pu, C., and Assad, E. D. (2003). Using domain ontologies to help track data provenance. In Embrapa Informática Agropecuária-Artigo em anais de congresso (ALICE). In: SIMPÓSIO BRASILEIRO DE BANCO DE DADOS, 18., 2003, Manaus. Anais… Manaus: Universidade Federal do Amazonas, 2003. pp. 84–98.
Kasten, A. (2016). Secure semantic web data management: confidentiality, integrity, and compliant availability in open and distributed networks (Doctoral dissertation, Universität Koblenz-Landau).
Xu, G., and Wang, Z. (2010, June). Data provenance architecture based on semantic web services. In 2010 Fifth IEEE International Symposium on Service Oriented System Engineering (pp. 91–94). IEEE.
Herzog, A., Shahmehri, N., and Duma, C. (2007). An ontology of information security. International Journal of Information Security and Privacy (IJISP), 1(4), 1–23.
Vorobiev, A., and Han, J. H. J. (2006, November). Security attack ontology for web services. In 2006 Semantics, Knowledge and Grid, Second International Conference on (pp. 42–42). IEEE.
Vorobiev, A., and Bekmamedova, N. (2010). An ontology-driven approach applied to information security. Journal of Research and Practice in Information Technology, 42(1), 61–76.
Ekelhart, A., Fenz, S., Klemen, M. D., and Weippl, E. R. (2006, December). Security ontology: Simulating threats to corporate assets. In International Conference on Information Systems Security (pp. 249–259). Springer, Berlin, Heidelberg.
OWL-S Ontology: http://www.daml.org/services/owl-s/security.html
Bhaumik, A. (2012). An Approach in Defining Information Assurance Patterns Based on Security Ontology and Meta-modeling. University of Nebraska at Omaha.