On Inference-Proof View Processing of XML Documents

This work aims at treating the inference problem in XML documents that are assumed to represent potentially incomplete information. The inference problem consists in providing a control mechanism for enforcing inference-usability confinement of XML documents. More formally, an inference-proof view of an XML document is required to be both indistinguishable from the actual XML document to the clients under their inference capabilities, and to neither contain nor imply any confidential information. We present an algorithm for generating an inference-proof view by weakening the actual XML document, i.e., eliminating confidential information and other information that could be used to infer confidential information. In order to avoid inferences based on the schema of the XML documents, the DTD of the actual XML document is modified according to the weakening operations as well, such that the modified DTD conforms with the generated inference-proof view.

[1]  Maarten Marx,et al.  Specifying access control policies for XML documents with XPath , 2004, SACMAT '04.

[2]  Wenfei Fan,et al.  Secure XML querying with security views , 2004, SIGMOD '04.

[3]  Yufei Tao,et al.  M-invariance: towards privacy preserving re-publication of dynamic datasets , 2007, SIGMOD '07.

[4]  Bertram Ludäscher,et al.  Parallelizing XML data-streaming workflows via MapReduce , 2010, J. Comput. Syst. Sci..

[5]  Joachim Biskup Usability Confinement of Server Reactions: Maintaining Inference-Proof Client Views by Controlled Interaction Execution , 2010, DNIS.

[6]  Sushil Jajodia,et al.  Checking for k-Anonymity Violation by Views , 2005, VLDB.

[7]  Chen Li,et al.  Secure XML Publishing without Information Leakage in the Presence of Data Inference , 2004, VLDB.

[8]  Wang Yuan-zhen,et al.  An approach for XML inference control based on RDF , 2006 .

[9]  Yuanzhen Wang,et al.  An Approach for XML Inference Control Based on RDF , 2006, DEXA.

[10]  Gultekin Özsoyoglu,et al.  Auditing and Inference Control in Statistical Databases , 1982, IEEE Transactions on Software Engineering.

[11]  Dorothy E. Denning,et al.  Inference Controls for Statistical Databases , 1983, Computer.

[12]  Joachim Biskup,et al.  Policy-Based Secrecy in the Runs & Systems Framework and Controlled Query Evaluation , 2010, IWSEC.

[13]  Benjamin C. M. Fung,et al.  Anonymizing sequential releases , 2006, KDD '06.

[14]  Georg Gottlob,et al.  Efficient Algorithms for Processing XPath Queries , 2002, VLDB.

[15]  Ruizhong Wei,et al.  A dynamic method for handling the inference problem in multilevel secure databases , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[16]  Chen Zhan-sheng,et al.  Strong functional dependencies and their application to normal forms in XML , 2005 .

[17]  Toru Fujiwara,et al.  Verification of the Security against Inference Attacks on XML Databases , 2009 .

[18]  Steven J. DeRose,et al.  XML Path Language (XPath) Version 1.0 , 1999 .

[19]  Elisa Bertino,et al.  Specifying and enforcing access control policies for XML document sources , 2004, World Wide Web.

[20]  Sushil Jajodia,et al.  Inference Problems in Multilevel Secure Database Management Systems , 2006 .

[21]  Serge Abiteboul,et al.  Representing and querying XML with incomplete information , 2001, PODS '01.

[22]  Marcelo Arenas,et al.  A normal form for XML documents , 2002, PODS '02.

[23]  Sven Hartmann,et al.  Efficient reasoning about a robust XML key fragment , 2009, TODS.

[24]  Joachim Biskup,et al.  Controlled query evaluation with open queries for a decidable relational submodel , 2007, Annals of Mathematics and Artificial Intelligence.

[25]  Sushil Jajodia,et al.  Unauthorized inferences in semistructured databases , 2006, Inf. Sci..

[26]  Chengkai Li,et al.  An optimization framework for map-reduce queries , 2012, EDBT '12.

[27]  Joachim Biskup,et al.  Preprocessing for controlled query evaluation with availability policy , 2008, J. Comput. Secur..

[28]  Bhavani M. Thuraisingham,et al.  Ontology-Driven Query Expansion Using Map/Reduce Framework to Facilitate Federated Queries , 2011, 2011 IEEE International Conference on Web Services.

[29]  Wenfei Fan,et al.  Rewriting Regular XPath Queries on XML Views , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[30]  Sabrina De Capitani di Vimercati,et al.  A fine-grained access control system for XML documents , 2002, TSEC.

[31]  Gabriel M. Kuper,et al.  Generalized XML security views , 2005, SACMAT.

[32]  Joachim Biskup,et al.  Towards Controlled Query Evaluation for Incomplete First-Order Databases , 2010, FoIKS.

[33]  Sophie Tison,et al.  XML Security Views Revisited , 2009, DBPL.

[34]  Béatrice Finance,et al.  The case for access control on XML relationships , 2005, CIKM '05.

[35]  Joachim Biskup,et al.  A sound and complete model-generation procedure for consistent and confidentiality-preserving databases , 2011, Theor. Comput. Sci..

[36]  Cristina Sirangelo,et al.  XML with incomplete information , 2010, JACM.

[37]  Georg Gottlob,et al.  The complexity of XPath query evaluation and XML typing , 2005, JACM.

[38]  Jianhua Li,et al.  Enforce Mandatory Access Control Policy on XML Documents , 2005, ICICS.