Formal modelling of OWL ontologies-based requirements for the development of safe and secure smart city systems

Formal methods are mathematical techniques used for developing reliable and verified systems. Event-B formal method is proved to be very useful to construct models of systems that are corrected by construction. Developing safe, secure, and reliable smart systems is essential for effective smart city solutions. The integration of safety and security mechanisms is an important aspect to achieve trust in smart cities’ services and applications. In this paper, we present prototype for the development of smart systems using OWL ontologies and Event-B formal models. We focus on the proposed approach that uses OWL ontologies to generate Event-B formal models for secure and safe development of systems. In recent years, ontologies-driven approaches have been applied during different phases to requirements engineering (RE), such as elicitation, analysis, specification, and validation. Many empirical studies have demonstrated benefits of the application of ontologies to handle ambiguity, inconsistency and incompleteness of requirements. We derive benefit from OWL ontologies to produce textual requirements that are consistent, complete, and unambiguous for formal modelling and to manage traceability between requirements and models. The approach uses Protégé-OWL editor, OWL verbaliser, Rodin platform, and OntoGraf tool. Protégé-OWL editor enables to build and view ontologies in Web Ontology Language (OWL). OWL verbaliser is used to generate controlled English requirements called Attempto Controlled English (ACE) from OWL ontologies. ACE representation is used as input requirements and transformed into Event-B formal models. Rodin platform is used for specification, refinement and proof. OntoGraf is a tool in Protégé that is used to visualise ontologies, and we make use of OntoGraf in this paper to assist in deciding refinement strategy and managing traceability between requirements and models.

[1]  Pete Sawyer,et al.  Requirements Engineering: A Good Practice Guide , 1997 .

[2]  Tasawar Hayat,et al.  Application of reproducing kernel algorithm for solving second-order, two-point fuzzy boundary value problems , 2017, Soft Comput..

[3]  Adel Said Elmaghraby,et al.  Cyber security challenges in Smart Cities: Safety, security and privacy , 2014, Journal of advanced research.

[4]  Tatiana Avdeenko,et al.  The ontology-based approach to support the completeness and consistency of the requirements specification , 2015, 2015 International Siberian Conference on Control and Communications (SIBCON).

[5]  Lukas Ladenberger,et al.  A method and tool for tracing requirements into specifications , 2014, Sci. Comput. Program..

[6]  Mohamed El-Attar,et al.  Using security robustness analysis for early-stage validation of functional security requirements , 2014, Requirements Engineering.

[7]  Xiaohui Liang,et al.  Security and Privacy in Smart City Applications: Challenges and Solutions , 2017, IEEE Communications Magazine.

[8]  Omar Abu Arqub,et al.  Adaptation of reproducing kernel algorithm for solving fuzzy Fredholm–Volterra integrodifferential equations , 2017, Neural Computing and Applications.

[9]  Jéssyka Vilela,et al.  Applications of ontologies in requirements engineering: a systematic review of the literature , 2015, Requirements Engineering.

[10]  W. N. Borst,et al.  Construction of Engineering Ontologies for Knowledge Sharing and Reuse , 1997 .

[11]  Yarden Katz,et al.  Pellet: A practical OWL-DL reasoner , 2007, J. Web Semant..

[12]  Corina Cîrstea,et al.  Building traceable Event-B models from requirements , 2015, Sci. Comput. Program..

[13]  Jéssyka Vilela,et al.  A Systematic Review on the Use of Ontologies in Requirements Engineering , 2014, 2014 Brazilian Symposium on Software Engineering.

[14]  Kaarel Kaljurand,et al.  Verbalizing OWL in Attempto Controlled English , 2007, OWLED.

[15]  Rafael Capilla,et al.  A Meta-model for Requirements Engineering in System Family Context for Software Process Improvement Using CMMI , 2005, PROFES.

[16]  Quang Huy Nguyen,et al.  Industrial Use of Formal Methods for a High-Level Security Evaluation , 2008, FM.

[17]  Martyn Thomas The industrial use of formal methods , 1993, Microprocess. Microsystems.

[18]  Gerald M. Weinberg,et al.  Quality software management: volume 4: anticipating change , 1997 .

[19]  Alfredo Pérez-Rueda,et al.  Determinants of multi-service smartcard success for smart cities development: A study based on citizens' privacy and security perceptions , 2015, Gov. Inf. Q..

[20]  Thai Son Hoang,et al.  Rodin: an open toolset for modelling and reasoning in Event-B , 2010, International Journal on Software Tools for Technology Transfer.

[21]  Za'er Salim Abo-Hammour,et al.  Numerical solution of systems of second-order boundary value problems using continuous genetic algorithm , 2014, Inf. Sci..

[22]  Eman H. Alkhammash Derivation of Event-B Models from OWL Ontologies , 2016 .

[23]  M. L. Caliusco,et al.  The Use of Ontologies in Requirements Engineering , 2010 .

[24]  Lei Cui,et al.  Security and Privacy in Smart Cities: Challenges and Opportunities , 2018, IEEE Access.

[25]  Sidney C. Bailin,et al.  Software requirements engineering , 2011 .

[26]  Jean-Raymond Abrial,et al.  Modeling in event-b - system and software engineering by Jean-Raymond Abrial , 2010, SOEN.

[27]  Anne Elisabeth Haxthausen Towards a Framework for Modelling and Verification of Relay Interlocking Systems , 2010, Monterey Workshop.

[28]  Jim Woodcock,et al.  Industrial Deployment of Formal Methods: Trends and Challenges , 2013, Industrial Deployment of System Engineering Methods.

[29]  Mustapha Bourahla,et al.  Towards an Ontology for UML State Machines , 2014 .

[30]  Tasawar Hayat,et al.  Numerical solutions of fuzzy differential equations using reproducing kernel Hilbert space method , 2015, Soft Computing.

[31]  Liesbet van Zoonen,et al.  Privacy concerns in smart cities , 2016, Gov. Inf. Q..

[32]  J. Li,et al.  Smart city and the applications , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).

[33]  Gerold Schneider,et al.  Attempto Controlled English Meets the Challenges of Knowledge Representation, Reasoning, Interoperability and User Interfaces , 2006, FLAIRS.

[34]  Petr Kroha,et al.  Ontologies in Checking for Inconsistency of Requirements Specification , 2009, 2009 Third International Conference on Advances in Semantic Processing.

[35]  Michael J. Butler,et al.  Control Systems: Phenomena and Structuring Functional Requirement Documents , 2012, 2012 IEEE 17th International Conference on Engineering of Complex Computer Systems.