Semantic Web Technologies to Reconcile Privacy and Context Awareness

advertisement
Semantic Web Technologies to
Reconcile Privacy and Context
Awareness
Norman M. Sadeh
ISRI- School of Computer Science
Carnegie Mellon University
Pittsburgh, PA - USA
Copyright ©2001-2004 Norman Sadeh
Mobility Challenge
Can no longer assume the user’s undivided
attention
 Time critical nature of many tasks
 Limited input/output functionality

Copyright ©2001-2004 Norman Sadeh
Context Awareness

…All this argues for:
 Higher levels of automation
 Context awareness
 …True also in fixed Internet scenarios
Copyright ©2001-2004 Norman Sadeh
Sources of Contextual Information


A user’s context information is distributed across a
number of disparate resources
 Calendar
 Location tracking
 Address book
 Buddy lists
 Weather
Available resources vary from one user to another
 …and over time
 e.g. roaming across different networks
Copyright ©2001-2004 Norman Sadeh
Vision

A growing collection of context-aware agents that
users can buy or subscribe to

Personal resources modeled as Semantic Web
services


Service profile
Each user has a Semantic eWallet

Automated identification and access of a user’s
personal resources subject to privacy preferences
Copyright ©2001-2004 Norman Sadeh
Semantic Web Approach

Ontologies to explicitly represent and reason about:
 Personal/Contextual Resources
 Location tracking, calendar, organizational resources,
messaging resources, preferences, etc.
 Contextual attributes
 e.g. location, calendar activities, social or
organizational context, etc.
 Preferences, incl. privacy preferences:
 Access control preferences
 “Obfuscation” rules
 Web services
 Automated service identification and access
Copyright ©2001-2004 Norman Sadeh
Personal Resource Ontology:
An Example
Personal
Resource
IS-A
Location
Information
Resource
Activity
Information
Resource
List of Friends
INSTANCE
CMU Location
Tracking
Microsoft Outlook
Calendar
Sprint PCS
Location Tracking
Copyright ©2001-2004 Norman Sadeh
MyCampus Project



Motivation:
 Campus as “everyday life microcosm”
Objective:
 Enhance campus life through context-aware
services accessible over the WLAN
Methodology:
 Involve stakeholders in the design
 Students and other members of the community
 Evaluate and extrapolate to other environments
 Mobile Commerce, Mobile Enterprise, etc.
Copyright ©2001-2004 Norman Sadeh
Overall Architecture
Semantic
Web-enabled
Context Resources
Calendar
Contextual
Ontologies
User’s Personal
Environment
e-Wallet
Location
Tracking
Personal Resource
Directory
(incl. Privacy Pref.)
Personal
Preference
Ontologies
Personal
Resource
Ontologies
Service
Ontologies
Internet and
Intranet Semantic
Web-enabled
Services
Semantic Web
Service Directory
Wireless
LAN
Social Context
Preferences
Task-Specific
Agents
Copyright ©2001-2004 Norman Sadeh
Semantic eWallet




Context-independent knowledge
 Name, email address, context-independent preferences
Context-dependent knowledge
 “When driving, I don’t want to receive instant messages”
Service invocation rules
 Automated service identification and access
 Map contextual attributes onto different resources (personal
and public)
Privacy rules
 Access control rules
 “Only my classmates can see my location”
 Obfuscation rules
 “My classmates can only see the building I am in but
not the actual room”
Copyright ©2001-2004 Norman Sadeh
Location Tracking as Web Service
Location Tracking
as a Web Service
Copyright ©2001-2004 Norman Sadeh
Query context
Query
assertion
Asserting elementary needs for Pre-check
authorized information
access rights
eResult
Assertion of
authorized knowledge
Application of
obfuscation rules
Fetch useful
static knowledge
Call relevant
external services
Post-check
access rights
Example : Query from John inquiring about Mary’s location
 the sender of the query is John
 John’s query requires accessing Mary’s location
1.Is John allowed to see Mary’s location given what we know
about the context of the query?
2.Mary said she only allows colleagues to see her location when
she is on campus
3.John is a colleague of Mary
 Access location tracking functionality or Mary’s calendar
 Is Mary on campus?
 Mary is willing to disclose the building but not the room she is in
 Mary is in Smith Hall
Copyright ©2001-2004 Norman Sadeh
User Interaction
Agent
Agent Management
Agent (FIPA)
e-Wallet Manager
Agent
Ontologist
Agent
FIPA ACL messages and OWL Content
Directory Facilitator
Agent (FIPA)
Task-Specific
Agents
JADENorman
platform
Copyright ©2001-2004
Sadeh
HTTP Request
User Interaction
Agent
Agent Management
Agent (FIPA)
e-Wallet Manager
Agent
Ontologist
Agent
FIPA ACL messages and OWL Content
Directory Facilitator
Agent (FIPA)
Task-Specific
Agents
JADENorman
platform
Copyright ©2001-2004
Sadeh
Design of an e-Wallet



Three-layer architecture: security through
typing
 Core knowledge: User static & contextsensitive knowledge
 Service Layer: Automatic identification
and invocation of external sources
of knowledge (e.g. public web services
and and personal resources)
 Privacy layer: Enforces privacy rules
access control & obfuscation
All facts represented in OWL
Backward chaining migration rules: privacy
rules, service rules, static migration rules
privacy
service
Core
Knowledge
query
answer
Copyright ©2001-2004 Norman Sadeh
Design of an e-Wallet

Three-layer architecture: security through
typing
 Core knowledge: user static & contextsensitive knowledge
 Service Layer: automatic identification
and invocation of personal and public
semantic web services
 Privacy layer: enforces privacy rules
access control obfuscation rules
Query context
Query
assertion
Result
privacy
service
Core
Knowledge
query
answer
Asserting elementary needs for Pre-check
authorized information
access rights Fetch useful
static knowledge
Assertion of
authorized knowledge
e-
Application of
obfuscation rules
Call relevant
external services
Post-check
access
rights
Copyright
©2001-2004 Norman Sadeh
Implementation Details
OWL
Meta-model
in CLIPS
Ontology
in OWL
&
Ontology
stylesheet
Ontology
in CLIPS
Annotation
in OWL
&
Annotation
stylesheet
Annotation
in CLIPS
Rule
in (R)OWL
&
Rule
stylesheet
Rule
in CLIPS
Services
in (W)OWL
&
Service
stylesheet
Service rule
in CLIPS
Privacy
in (S)OWL
&
Privacy
stylesheet
Privacy rule
in CLIPS
Query
in (Q)OWL
&
Query
stylesheet
Query rules
in CLIPS
XSLT Engine
Result
in OWL
JESS
Copyright ©2001-2004 Norman Sadeh
Visualizing & Editing Preferences
Visualizing & editing a privacy rule
Copyright ©2001-2004 Norman Sadeh
Editing Based on Existing Ontologies
Copyright ©2001-2004 Norman Sadeh
Obfuscation Example

User location finder
City block level
City level level
Copyright ©2001-2004 Norman Sadeh
Slide Projector Agent
Copyright ©2001-2004 Norman Sadeh
Empirical Evaluation



Initial prototype working on Carnegie Mellon’s campus
 Restaurant concierge agent, message filtering agent,
etc.
 Integration with calendar, location tracking, user
profile, etc.
Evaluation
 Context awareness adds value
 Requires access to a broad range of resources/attributes
 Privacy concerns have to be addressed
Additional validation on context-aware enterprise and DoD
applications
Copyright ©2001-2004 Norman Sadeh
Concluding Remarks






Context awareness helps overcome the limitations of
mobile devices and the time criticality of mobile
scenarios
Context awareness makes privacy even more critical
Our experiments indicate that user preferences are
often complex
 Incl. context-sensitive preferences
Capturing these preferences is far from trivial
 Default profiles, learning, dialogs,
 How far can we go?
Semantic Web approach
 Allows for policies that refer to concepts
introduced in any number of domain-specific
ontologies
Opportunities for reconciliation with P3P/APPEL
Copyright ©2001-2004 Norman Sadeh
Q&A
Source:http://www.firstmonday.org/issues/issue
4_9/odlyzko/index.html
Copyright ©2001-2004 Norman Sadeh
Download