=Paper= {{Paper |id=Vol-2954/abstract-10 |storemode=property |title=Closed- and Open-world Reasoning in DL-Lite for Cloud Infrastructure Security (Extended Abstract) |pdfUrl=https://ceur-ws.org/Vol-2954/abstract-10.pdf |volume=Vol-2954 |authors=Claudia Cauli,Magdalena Ortiz, Nir Piterman |dblpUrl=https://dblp.org/rec/conf/dlog/CauliOP21 }} ==Closed- and Open-world Reasoning in DL-Lite for Cloud Infrastructure Security (Extended Abstract)== https://ceur-ws.org/Vol-2954/abstract-10.pdf
     Closed- and Open-world Reasoning in DL-Lite
           for Cloud Infrastructure Security
                (Extended Abstract)???

               Claudia Cauli1 , Magdalena Ortiz2 , and Nir Piterman1
                              1
                                  University of Gothenburg
                                       2
                                          TU Wien

     Complex cloud infrastructure is managed through configuration files that
are compiled into atomic deployment instructions as part of a process known
as Infrastructure as Code (IaC). Configuration files contain declarations for the
resources to be created, their settings, and their connectivity. Unfortunately,
the same features that make IaC a convenient and powerful deployment tool—
reusability, modularity, and shareability—also threaten the security of the cloud.
The vulnerabilities arising from such a practice are subtle and widespread and
need to be detected early, at the level of configuration files, before potentially-
vulnerable infrastructure is deployed. To this end, we research the application
of knowledge representation formalisms to the modeling and reasoning of IaC
files. In particular, description logics allow for a succinct and natural description
of these configuration files, and the open-world assumption captures the dis-
tributed nature of the cloud, where a newly deployed portion of infrastructure
could connect to pre-existing resources not necessarily owned by the same user
and whose configuration is only partially known. In previous work, we used the
expressive ALCOIQ to model and reason about AWS CloudFormation, Ama-
zon Web Services proprietary Infrastructure as Code framework [6,5]. Here, we
suggest a lightweight DL that is specifically tailored for cloud infrastructure.

Core-closed Knowledge Bases We devise an extension of DL-LiteF that allows
for combining a core part that is completely defined (closed-world) and interacts
with a partially known environment (open-world). We introduce the so-called
“core-closed” knowledge bases, which are DL-LiteF KBs defined as the tuple
K = hT , A, S, Mi, built from a standard KB hT , Ai and a core hS, Mi. The
set S contains DL-LiteF axioms representing the core structural cloud specifi-
cations for each type of resource that can be deployed, and the set M contains
positive concept and role assertions representing the core user configuration.
Syntactically, M is similar to an ABox A but, differently from A, it is assumed
to be complete with respect to the specifications S. As usual, hT , Ai encodes the
incomplete terminological and assertional knowledge that, in our setting, may
refer to both the (closed) core and the surrounding (open) world. We consider
various reasoning problems over core-closed KBs and study their combined and
?
     Full paper to appear in KR 2021.
??
     Copyright c 2021 for this paper by its authors. Use permitted under Creative Com-
     mons License Attribution 4.0 International (CC BY 4.0).
2       Claudia Cauli, Magdalena Ortiz, and Nir Piterman

data complexity [12]. As per standard DL-LiteF results [4], we show that satisfi-
ability of core-closed KBs (i) can be reduced to consistency of the functionality
axioms and of the axioms in the negative closure of T and S, and (ii) it is
FOL-reducible. We also show that when dropping the unique name assumption
on individuals not in the core satisfiability of DL-LiteF core-closed KBs with
inequalities is AC0 in data complexity and P-complete in combined complexity.

Verification of Security Properties In security, we seek query languages to ex-
press that mitigations to security threats must be present (vs. may be absent)
and vulnerabilities may be present (vs. must be absent). Such a requirement
calls for efficient decision procedures for query satisfiability, in addition to query
entailment. To reason about mitigations and vulnerabilities, we introduce Must
and May conjunctive queries and devise a simple logical language for the specifi-
cation of such properties. Technically, properties that must hold are resolved via
query entailment and properties that may hold are resolved via query satisfiabil-
ity. Regarding query entailment, as a result of the tight correspondence between
the standard and the core-closed setting w.r.t. canonical model construction and
query reformulation, we show that answering conjunctive queries in core-closed
DL-LiteF KBs is FOL-reducible. Regarding query satisfiability, we show that
computing whether a tuple t is a sat-answer of a given query can be solved in
logarithmic space in the core portion of the KB. We define a query language that
allows for Boolean combinations of Must/May queries. Such a Boolean combi-
nation is a query that connects nested union of conjunctive queries in the scope
of a Must or a May operator. Intuitively, the reasoning needed for answering
the nested queries (either through entailment or satisfiability) can be decoupled
from the reasoning needed to answer the higher-level Boolean combination.

 Many authors have advocated for combining open- and closed-world reasoning
in DLs in a variety of ways, e.g., [1,3,7,8]; for example, via closed predicates [7].
Our combination of open- and closed-world reasoning was tailored specifically for
our application domain, and it is not obvious whether it can be easily expressed
using the usual closed predicates, due to the presence of terms that are closed
over part of the domain but open on the rest. One of the major challenges
of extending DLs with closed predicates relates to complexity: they could be
simulated in expressive DLs with nominals (ALCO and beyond), but for such
logics satisfiability is at least ExpTime-hard [2] and conjunctive query entailment
2ExpTime-hard [11]. Unfortunately, query answering with closed predicates is
also intractable in data complexity or FOL rewritable only under special safety
restrictions that make the presence of the closed predicates irrelevant [10,9].
    In our implementation of closed-world reasoning, core-closed KBs resemble
safe KBs and are FOL rewritable, but the partial closed-world assumption plays
an important role, particularly in the query satisfiability problem that arises
from the May queries. For future work, we are interested in including more
complex knowledge in the Tbox while still keeping (data) complexity tractable.
Complex role inclusions would be required to reason about dataflow, which is
                                    Title Suppressed Due to Excessive Length           3

a central aspect of security. Non-monotone extensions would be needed to be
considered in order to reason about permissions and access policies.


References
 1. Baader, F., Hollunder, B.: Embedding defaults into terminological knowledge
    representation formalisms. J. of Automated Reasoning 14(1), 149–180 (1995).
    https://doi.org/10.1007/BF00883932, https://doi.org/10.1007/BF00883932
 2. Baader, F., Horrocks, I., Lutz, C., Sattler, U.: An Introduction to Description
    Logic. Cambridge University Press (2017)
 3. Borgwardt, S., Forkel, W.: Closed-world semantics for conjunctive queries with
    negation over ELH \bot ontologies. In: JELIA. Lecture Notes in Computer Sci-
    ence, vol. 11468, pp. 371–386. Springer (2019)
 4. Calvanese, D., Giacomo, G.D., Lembo, D., Lenzerini, M., Rosati, R.: Tractable
    reasoning and efficient query answering in description logics: The DL-Lite family.
    J. Autom. Reason. 39(3), 385–429 (2007)
 5. Cauli, C., Li, M., Piterman, N., Tkachuk, O.: Pre-deployment security assessment
    for cloud services through semantic reasoning. In: Computer Aided Verification -
    33rd International Conference, CAV 2021, Proceedings. Springer (2021), to appear.
 6. CloudFORMAL: Prototype Implementation (2020), http://github.com/
    claudiacauli/CloudFORMAL, Last accessed on 2020-10-15
 7. Franconi, E., Ibáñez-Garcı́a, Y.A., Seylan, I.: Query answering with
    dboxes is hard. Electr. Notes Theor. Comput. Sci. 278, 71–84 (2011).
    https://doi.org/10.1016/j.entcs.2011.10.007,          https://doi.org/10.1016/j.
    entcs.2011.10.007
 8. Gaggl, S.A., Rudolph, S., Schweizer, L.: Fixed-domain reasoning for description
    logics. In: Kaminka, G.A., Fox, M., Bouquet, P., Hüllermeier, E., Dignum, V.,
    Dignum, F., van Harmelen, F. (eds.) Proc. of the 22nd Eur. Conf. on Artifi-
    cial Intelligence (ECAI 2016). Frontiers in Artificial Intelligence and Applications,
    vol. 285, pp. 819–827. IOS Press (2016). https://doi.org/10.3233/978-1-61499-672-
    9-819, https://doi.org/10.3233/978-1-61499-672-9-819
 9. Lutz, C., Seylan, I., Wolter, F.: Ontology-based data access with closed predi-
    cates is inherently intractable(sometimes). In: Proc. Int. Joint Conf. on Artificial
    Intelligence (IJCAI’2013). pp. 1024–1030. IJCAI/AAAI (2013)
10. Lutz, C., Seylan, I., Wolter, F.: The data complexity of ontology-mediated
    queries with closed predicates. Logical Methods in Computer Science
    15(3) (2019). https://doi.org/10.23638/LMCS-15(3:23)2019, https://doi.org/
    10.23638/LMCS-15(3:23)2019
11. Ngo, N., Ortiz, M., Šimkus, M.: Closed predicates in description logics: Results on
    combined complexity. In: Proc. Int. Conf. on the Principles of Knowledge Repre-
    sentation and Reasoning (KR 2016). pp. 237–246. AAAI Press (2016)
12. Vardi, M.Y.: The complexity of relational query languages (extended abstract). In:
    STOC. pp. 137–146. ACM (1982)