<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Controlled Query Evaluation in Description Logics Through Instance Indistinguishability (Extended Abstract)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Gianluca Cima</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Domenico Lembo</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Riccardo Rosati</string-name>
          <email>rosatig@diag.uniroma1.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Domenico Fabio Savo</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Sapienza University of Rome</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Bergamo</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>This extended abstract summarizes our recent work [11] about Controlled Query Evaluation over Description Logic ontologies. Controlled query evaluation (CQE) is a declarative framework for privacypreserving query answering investigated in the literature on knowledge representation and database theory [16,7,3]. The basic idea of CQE is de ning a data protection policy through logical statements. Speci cally, we consider the case where the policy is a set of denial assertions, i.e., FO sentences of the form 8x: (x) ! ?, such that 9x: (x) is a Boolean conjunctive query. Consider for instance an organization that wants to keep con dential the fact that it has suppliers involved in both Project A and Project B. This can be expressed over the information schema of the organization through a denial assertion of the form: 8x. Supplier(x) ^ ProjA(x) ^ ProjB(x) ! ? In CQE, two di erent main approaches can be identi ed. The rst one [5,4,6,2,1,17] models privacy preservation through the notion of indistinguishable data instances. In this approach, a system for CQE enforces data privacy if, for every data instance I, there exists a data instance I0 that does not violate the data protection policy and is indistinguishable from I for the user, i.e., for every user query q, the system provides the same answers to q over I and over I0. We call this approach (instance) indistinguishabilitybased (IB). In continuation of the previous example, in the presence of an instance fSupplier(c); ProjA(c); ProjB(c)g, an IB system should answer user queries as if the instance were, e.g., fSupplier(c); ProjA(c)g (note that other instances not violating the policy can be considered as indistinguishable, e.g., fSupplier(c); ProjB(c)g). The second approach [8,13,14] models privacy preservation by considering the whole (possibly in nite) set of answers to queries that the system provides to the user. In this approach, a CQE system protects the data if, for every data</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>instance I, the logical theory corresponding to the set of answers provided by the
system to all queries over I does not entail any violation of the data protection
policy. According to [14], we call this approach con dentiality-preserving (CP).
In our ongoing example, a CP system would entail, e.g., the queries Supplier(c) ^
ProjA(c) and 9x.Supplier(x) ^ ProjB(x), but not also the query Supplier(c) ^
ProjB(c) (notice that the choice is non-deterministic, and in our example the
system could have decided to disclose that c participates in Project B and hide
its participation in Project A).</p>
      <p>In both approaches, the ultimate goal is to realize optimal CQE systems, i.e.,
systems maximizing the answers returned to user queries, still respecting the data
protection policy. Traditionally, this aim has been pursued through the usage of
a single optimal censor, i.e., a speci c implementation of the adopted notion of
privacy-preservation, either IB or CP. Since in both approaches several optimal
censors typically exist, this way of proceeding requires to select an optimal censor
(thus discarding all the others). However, we argue that this should be motivated
by a reasonable semantic preference criterion. Indeed, in the lack of further
metainformation about the data domain, picking up just one optimal censor may end
up in arbitrary behaviors. To avoid this, query answering over all optimal censors
has been recently studied (limited to the CP approach) [13,15].</p>
      <p>Despite their similarities, the precise relationship between the IB and CP
approaches is still not clear and has not been fully investigated yet. Also, query
answering over all optimal IB censors has not been previously studied. Moreover,
among the complexity results obtained and the techniques de ned so far for
CQE, we still miss the identi cation of cases that are promising towards its
practical usage.</p>
      <p>In our work, we aim at lling some of the above mentioned gaps in the
context of Description Logic (DL) ontologies.1 We focus on the approach to CQE
based on instance indistinguishability, and study its relationship with the CP
approach. Speci cally, we prove that the IB approach to CQE in DLs corresponds
to a particular instance of the CP approach to CQE [15]. Based on such a
correspondence, for ontologies speci ed in the well-known DL DL-LiteR [9], we
are able to transfer some complexity results for query answering over all optimal
censors shown in [15] to the case of CQE under IB censors. Such results show
that, even in the lightweight DL DL-LiteR, query answering in the IB approach
is coNP-complete in data complexity, unless one relies on a single optimal censor
chosen non-deterministically in the lack of further meta-information about the
domain of the dataset.</p>
      <p>To overcome the above problems and provide a practical, semantically
wellfounded solution, we de ne a quasi-optimal notion of IB censor, which
corresponds to the best sound approximation of all the optimal IB censors.We then
prove that, in the case of DL-LiteR ontologies, query answering based on the
quasi-optimal IB censor is tractable with respect to data complexity and is
reducible to the evaluation of a rst-order query over the data instance, i.e., it
1 Privacy-preserving query answering in DLs has been investigated also in settings
di erent from CQE: see, e.g., [12,10,18].
is rst-order rewritable. We believe that this result has an important practical
impact. Indeed, we have identi ed a setting in which privacy-preserving query
answering formalized in a declarative logic-based framework as CQE, for a DL
(i.e., DL-LiteR) speci cally designed for data management, has the same data
complexity upper bound as evaluating queries over a database (i.e., AC0). This
opens the possibility of de ning algorithms for CQE of practical usage, amenable
to implementation on top of traditional (relational) data management systems,
as in Ontology-based Data Access [19]. We are currently working to achieve this
goal.</p>
      <p>
        Another important future direction is a deeper study of the user model.
Indeed, our framework inherits from its predecessors a relatively simple model
in which the user knows (at most) the TBox and all the query answers returned
by the system, and considers only the deductive abilities of the user over such
knowledge. This user model might need to be enriched to capture more realistic
data protection scenarios.
12. B. Cuenca Grau and I. Horrocks. Privacy-preserving query answering in logic-based
information systems. In Proc. of the 18th Eur. Conf. on Arti cial Intelligence
(ECAI), pages 40{44, 2008.
13. B. Cuenca Grau, E. Kharlamov, E. V. Kostylev, and D. Zheleznyakov. Controlled
query evaluation over OWL 2 RL ontologies. In Proc. of the 12th Int. Semantic
Web Conf. (ISWC), volume 8218 of Lecture Notes in Computer Science, pages
49{65, 2013.
14. B. Cuenca Grau, E. Kharlamov, E. V. Kostylev, and D. Zheleznyakov. Controlled
query evaluation for datalog and OWL 2 pro le ontologies. In Proc. of the 24th
Int. Joint Conf. on Arti cial Intelligence (IJCAI), pages 2883{2889, 2015.
15. D. Lembo, R. Rosati, and D. F. Savo. Revisiting controlled query evaluation in
description logics. In Proc. of the 28th Int. Joint Conf. on Arti cial Intelligence
(IJCAI), pages 1786{1792, 2019.
16. G. L. Sicherman, W. de Jonge, and R. P. van de Riet. Answering queries without
revealing secrets. ACM Trans. Database Syst., 8(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ):41{59, 1983.
17. T. Studer and J. Werner. Censors for boolean description logic. Trans. Data
      </p>
      <p>
        Privacy, 7(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ):223{252, 2014.
18. J. Tao, G. Slutzki, and V. G. Honavar. A conceptual framework for
secrecypreserving reasoning in knowledge bases. ACM Trans. on Computational Logic,
16(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ):3:1{3:32, 2014.
19. G. Xiao, D. Calvanese, R. Kontchakov, D. Lembo, A. Poggi, R. Rosati, and M.
Zakharyaschev. Ontology-based data access: A survey. In Proc. of the 27th Int. Joint
Conf. on Arti cial Intelligence (IJCAI), pages 5511{5519, 2018.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>M.</given-names>
            <surname>Benedikt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Bourhis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Jachiet</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Thomazo</surname>
          </string-name>
          .
          <article-title>Reasoning about disclosure in data integration in the presence of source constraints</article-title>
          .
          <source>In Proc. of the 28th Int. Joint Conf. on Arti cial Intelligence (IJCAI)</source>
          , pages
          <fpage>1551</fpage>
          {
          <fpage>1557</fpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>M.</given-names>
            <surname>Benedikt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. Cuenca</given-names>
            <surname>Grau</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E. V.</given-names>
            <surname>Kostylev</surname>
          </string-name>
          .
          <article-title>Logical foundations of information disclosure in ontology-based data integration</article-title>
          .
          <source>Arti cial Intelligence</source>
          ,
          <volume>262</volume>
          :
          <fpage>52</fpage>
          {
          <fpage>95</fpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>J.</given-names>
            <surname>Biskup</surname>
          </string-name>
          .
          <article-title>For unknown secrecies refusal is better than lying</article-title>
          .
          <source>Data and Knowledge Engineering</source>
          ,
          <volume>33</volume>
          (
          <issue>1</issue>
          ):1{
          <fpage>23</fpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>J.</given-names>
            <surname>Biskup</surname>
          </string-name>
          and
          <string-name>
            <given-names>P. A.</given-names>
            <surname>Bonatti</surname>
          </string-name>
          .
          <article-title>Controlled query evaluation for enforcing con dentiality in complete information systems</article-title>
          .
          <source>Int. J. of Information Security</source>
          ,
          <volume>3</volume>
          (
          <issue>1</issue>
          ):
          <volume>14</volume>
          {
          <fpage>27</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>J.</given-names>
            <surname>Biskup</surname>
          </string-name>
          and
          <string-name>
            <given-names>P. A.</given-names>
            <surname>Bonatti</surname>
          </string-name>
          .
          <article-title>Controlled query evaluation for known policies by combining lying and refusal</article-title>
          .
          <source>Ann. of Mathematics and Arti cial Intelligence</source>
          ,
          <volume>40</volume>
          (
          <issue>1- 2</issue>
          ):
          <volume>37</volume>
          {
          <fpage>62</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>J.</given-names>
            <surname>Biskup</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Weibert</surname>
          </string-name>
          .
          <article-title>Keeping secrets in incomplete databases</article-title>
          .
          <source>Int. J. of Information Security</source>
          ,
          <volume>7</volume>
          (
          <issue>3</issue>
          ):
          <volume>199</volume>
          {
          <fpage>217</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>P. A.</given-names>
            <surname>Bonatti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kraus</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Subrahmanian</surname>
          </string-name>
          .
          <article-title>Foundations of secure deductive databases</article-title>
          .
          <source>IEEE Trans. Knowl. Data Eng.</source>
          ,
          <volume>7</volume>
          (
          <issue>3</issue>
          ):
          <volume>406</volume>
          {
          <fpage>422</fpage>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>P. A.</given-names>
            <surname>Bonatti</surname>
          </string-name>
          and
          <string-name>
            <given-names>L.</given-names>
            <surname>Sauro</surname>
          </string-name>
          .
          <article-title>A con dentiality model for ontologies</article-title>
          .
          <source>In Proc. of the 12th Int. Semantic Web Conf. (ISWC)</source>
          , volume
          <volume>8218</volume>
          of Lecture Notes in Computer Science, pages
          <volume>17</volume>
          {
          <fpage>32</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          , G. De Giacomo,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lembo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lenzerini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Rosati</surname>
          </string-name>
          .
          <article-title>Tractable reasoning and e cient query answering in description logics: The DL-Lite family</article-title>
          .
          <source>J. of Automated Reasoning</source>
          ,
          <volume>39</volume>
          (
          <issue>3</issue>
          ):
          <volume>385</volume>
          {
          <fpage>429</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          , G. De Giacomo,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lenzerini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Rosati</surname>
          </string-name>
          .
          <article-title>View-based query answering in description logics: Semantics and complexity</article-title>
          .
          <source>J. of Computer and System Sciences</source>
          ,
          <volume>78</volume>
          (
          <issue>1</issue>
          ):
          <volume>26</volume>
          {
          <fpage>46</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. G. Cima,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lembo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Rosati</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D. F.</given-names>
            <surname>Savo</surname>
          </string-name>
          .
          <article-title>Controlled Query Evaluation in Description Logics Through Instance Indistinguishability</article-title>
          .
          <source>In Proc. of the 29th Int. Joint Conf. on Arti cial Intelligence (IJCAI)</source>
          , pages
          <fpage>1791</fpage>
          {
          <fpage>1797</fpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>