<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Closed- and Open-world Reasoning in DL-Lite for Cloud Infrastructure Security (Extended Abstract)???</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Claudia Cauli</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Magdalena Ortiz</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nir Piterman</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Gothenburg</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>Complex cloud infrastructure is managed through con guration les that are compiled into atomic deployment instructions as part of a process known as Infrastructure as Code (IaC). Con guration les contain declarations for the resources to be created, their settings, and their connectivity. Unfortunately, the same features that make IaC a convenient and powerful deployment tool| reusability, modularity, and shareability|also threaten the security of the cloud. The vulnerabilities arising from such a practice are subtle and widespread and need to be detected early, at the level of con guration les, before potentiallyvulnerable infrastructure is deployed. To this end, we research the application of knowledge representation formalisms to the modeling and reasoning of IaC les. In particular, description logics allow for a succinct and natural description of these con guration les, and the open-world assumption captures the distributed nature of the cloud, where a newly deployed portion of infrastructure could connect to pre-existing resources not necessarily owned by the same user and whose con guration is only partially known. In previous work, we used the expressive ALCOIQ to model and reason about AWS CloudFormation, Amazon Web Services proprietary Infrastructure as Code framework [6,5]. Here, we suggest a lightweight DL that is speci cally tailored for cloud infrastructure. Core-closed Knowledge Bases We devise an extension of DL-LiteF that allows for combining a core part that is completely de ned (closed-world) and interacts with a partially known environment (open-world). We introduce the so-called \core-closed" knowledge bases, which are DL-LiteF KBs de ned as the tuple K = hT ; A; S; Mi, built from a standard KB hT ; Ai and a core hS; Mi. The set S contains DL-LiteF axioms representing the core structural cloud speci cations for each type of resource that can be deployed, and the set M contains positive concept and role assertions representing the core user con guration. Syntactically, M is similar to an ABox A but, di erently from A, it is assumed to be complete with respect to the speci cations S. As usual, hT ; Ai encodes the incomplete terminological and assertional knowledge that, in our setting, may refer to both the (closed) core and the surrounding (open) world. We consider various reasoning problems over core-closed KBs and study their combined and</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Claudia Cauli, Magdalena Ortiz, and Nir Piterman
data complexity [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. As per standard DL-LiteF results [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], we show that satis
ability of core-closed KBs (i) can be reduced to consistency of the functionality
axioms and of the axioms in the negative closure of T and S, and (ii) it is
FOL-reducible. We also show that when dropping the unique name assumption
on individuals not in the core satis ability of DL-LiteF core-closed KBs with
inequalities is AC0 in data complexity and P-complete in combined complexity.
Veri cation of Security Properties In security, we seek query languages to
express that mitigations to security threats must be present (vs. may be absent)
and vulnerabilities may be present (vs. must be absent). Such a requirement
calls for e cient decision procedures for query satis ability, in addition to query
entailment. To reason about mitigations and vulnerabilities, we introduce Must
and May conjunctive queries and devise a simple logical language for the speci
cation of such properties. Technically, properties that must hold are resolved via
query entailment and properties that may hold are resolved via query satis
ability. Regarding query entailment, as a result of the tight correspondence between
the standard and the core-closed setting w.r.t. canonical model construction and
query reformulation, we show that answering conjunctive queries in core-closed
DL-LiteF KBs is FOL-reducible. Regarding query satis ability, we show that
computing whether a tuple t is a sat-answer of a given query can be solved in
logarithmic space in the core portion of the KB. We de ne a query language that
allows for Boolean combinations of Must/May queries. Such a Boolean
combination is a query that connects nested union of conjunctive queries in the scope
of a Must or a May operator. Intuitively, the reasoning needed for answering
the nested queries (either through entailment or satis ability) can be decoupled
from the reasoning needed to answer the higher-level Boolean combination.
Many authors have advocated for combining open- and closed-world reasoning
in DLs in a variety of ways, e.g., [
        <xref ref-type="bibr" rid="ref1 ref3 ref7 ref8">1,3,7,8</xref>
        ]; for example, via closed predicates [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
Our combination of open- and closed-world reasoning was tailored speci cally for
our application domain, and it is not obvious whether it can be easily expressed
using the usual closed predicates, due to the presence of terms that are closed
over part of the domain but open on the rest. One of the major challenges
of extending DLs with closed predicates relates to complexity: they could be
simulated in expressive DLs with nominals (ALCO and beyond), but for such
logics satis ability is at least ExpTime-hard [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and conjunctive query entailment
2ExpTime-hard [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Unfortunately, query answering with closed predicates is
also intractable in data complexity or FOL rewritable only under special safety
restrictions that make the presence of the closed predicates irrelevant [
        <xref ref-type="bibr" rid="ref10 ref9">10,9</xref>
        ].
      </p>
      <p>In our implementation of closed-world reasoning, core-closed KBs resemble
safe KBs and are FOL rewritable, but the partial closed-world assumption plays
an important role, particularly in the query satis ability problem that arises
from the May queries. For future work, we are interested in including more
complex knowledge in the Tbox while still keeping (data) complexity tractable.
Complex role inclusions would be required to reason about data ow, which is
a central aspect of security. Non-monotone extensions would be needed to be
considered in order to reason about permissions and access policies.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hollunder</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Embedding defaults into terminological knowledge representation formalisms</article-title>
          .
          <source>J. of Automated Reasoning</source>
          <volume>14</volume>
          (
          <issue>1</issue>
          ),
          <volume>149</volume>
          {
          <fpage>180</fpage>
          (
          <year>1995</year>
          ). https://doi.org/10.1007/BF00883932, https://doi.org/10.1007/BF00883932
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>An Introduction to Description Logic</article-title>
          . Cambridge University Press (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Borgwardt</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Forkel</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Closed-world semantics for conjunctive queries with negation over ELH nbot ontologies</article-title>
          .
          <source>In: JELIA. Lecture Notes in Computer Science</source>
          , vol.
          <volume>11468</volume>
          , pp.
          <volume>371</volume>
          {
          <fpage>386</fpage>
          . Springer (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giacomo</surname>
            ,
            <given-names>G.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lembo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lenzerini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosati</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Tractable reasoning and e cient query answering in description logics: The DL-Lite family</article-title>
          .
          <source>J. Autom. Reason</source>
          .
          <volume>39</volume>
          (
          <issue>3</issue>
          ),
          <volume>385</volume>
          {
          <fpage>429</fpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Cauli</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Piterman</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tkachuk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Pre-deployment security assessment for cloud services through semantic reasoning</article-title>
          . In: Computer Aided Veri cation - 33rd
          <source>International Conference, CAV</source>
          <year>2021</year>
          , Proceedings. Springer (
          <year>2021</year>
          ), to appear.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>CloudFORMAL: Prototype Implementation</surname>
          </string-name>
          (
          <year>2020</year>
          ), http://github.com/ claudiacauli/CloudFORMAL, Last accessed on 2020-
          <volume>10</volume>
          -15
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Franconi</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <article-title>Iban~ez-Garc a</article-title>
          ,
          <string-name>
            <given-names>Y.A.</given-names>
            ,
            <surname>Seylan</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.</surname>
          </string-name>
          :
          <article-title>Query answering with dboxes is hard</article-title>
          .
          <source>Electr. Notes Theor. Comput. Sci</source>
          .
          <volume>278</volume>
          ,
          <issue>71</issue>
          {
          <fpage>84</fpage>
          (
          <year>2011</year>
          ). https://doi.org/10.1016/j.entcs.
          <year>2011</year>
          .
          <volume>10</volume>
          .007, https://doi.org/10.1016/j. entcs.
          <year>2011</year>
          .
          <volume>10</volume>
          .007
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Gaggl</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rudolph</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schweizer</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Fixed-domain reasoning for description logics</article-title>
          . In: Kaminka,
          <string-name>
            <given-names>G.A.</given-names>
            ,
            <surname>Fox</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Bouquet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            , Hullermeier, E.,
            <surname>Dignum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            ,
            <surname>Dignum</surname>
          </string-name>
          , F.,
          <string-name>
            <surname>van Harmelen</surname>
            ,
            <given-names>F</given-names>
          </string-name>
          . (eds.)
          <source>Proc. of the 22nd Eur. Conf. on Arti - cial Intelligence (ECAI</source>
          <year>2016</year>
          ).
          <source>Frontiers in Arti cial Intelligence and Applications</source>
          , vol.
          <volume>285</volume>
          , pp.
          <volume>819</volume>
          {
          <fpage>827</fpage>
          . IOS Press (
          <year>2016</year>
          ). https://doi.org/10.3233/978-1-
          <fpage>61499</fpage>
          -672- 9-819, https://doi.org/10.3233/978-1-
          <fpage>61499</fpage>
          -672-9-819
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seylan</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wolter</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Ontology-based data access with closed predicates is inherently intractable(sometimes)</article-title>
          .
          <source>In: Proc. Int. Joint Conf. on Arti cial Intelligence</source>
          (IJCAI'
          <year>2013</year>
          ). pp.
          <volume>1024</volume>
          {
          <fpage>1030</fpage>
          . IJCAI/AAAI (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Lutz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seylan</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wolter</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>The data complexity of ontology-mediated queries with closed predicates</article-title>
          .
          <source>Logical Methods in Computer Science</source>
          <volume>15</volume>
          (
          <issue>3</issue>
          ) (
          <year>2019</year>
          ). https://doi.org/10.23638/LMCS-
          <volume>15</volume>
          (
          <issue>3</issue>
          :23)
          <year>2019</year>
          , https://doi.org/ 10.23638/LMCS-
          <volume>15</volume>
          (
          <issue>3</issue>
          :23)
          <fpage>2019</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Ngo</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ortiz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simkus</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Closed predicates in description logics: Results on combined complexity</article-title>
          .
          <source>In: Proc. Int. Conf. on the Principles of Knowledge Representation and Reasoning (KR</source>
          <year>2016</year>
          ). pp.
          <volume>237</volume>
          {
          <fpage>246</fpage>
          . AAAI Press (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Vardi</surname>
          </string-name>
          , M.Y.:
          <article-title>The complexity of relational query languages (extended abstract)</article-title>
          .
          <source>In: STOC</source>
          . pp.
          <volume>137</volume>
          {
          <fpage>146</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>1982</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>