Protection Policy Implementation using Web Ontology Language

Protection Policy Implementation using Web Ontology Language

  IJETT-book-cover           
  
© 2022 by IJETT Journal
Volume-70 Issue-8
Year of Publication : 2022
Authors : Lingala Thirupathi, Venkata Nageswara Rao Padmanabhuni
DOI : 10.14445/22315381/IJETT-V70I8P246

How to Cite?

Lingala Thirupathi, Venkata Nageswara Rao Padmanabhuni, "Protection Policy Implementation using Web Ontology Language," International Journal of Engineering Trends and Technology, vol. 70, no. 8, pp. 453-462, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I8P246

Abstract
This article is an experiment leveraging web ontology language to develop and evaluate Mandatory Access Control with Bell-La Padula (BLP) attributes for a Multi-Level Protection lattice model. The semantic web is built on top of the www to make data machine-readable so data processing and administration can be improved. The Web ontology language is a semantic web computational logic-based language for representing complex knowledge in a semantic format. Construct dominance relationships between variables within the lattice model and run different queries to see if the subject with security clearance can read or write to the object with security classification using the Multi-level protection (MLP) ontology. Furthermore, the ontology would only enable information to move from items with lower categorization to entities with higher classification by utilizing BLP characteristics.

Keywords
MLP, OWL, ontology, Security, Semantic Web.

Reference
[1] Sanger D.E, Perlroth N, Thrush G, & Rappeport A, 2018. [Online]. Available: https://www.nytimes.com/2018/12/11/us/politics/trump-china-trade.html
[2] Thomas, Jason, “A Case Study Analysis of the US Office of Personnel Management Data Breech,” 2019. 10.13140/RG.2.2.36670.23360.
[3] Basile, Cataldo & Lioy, Antonio & Scozzi, Salvatore & Vallini, Marco, “Ontology-Based Policy Translation,” vol. 63, pp. 117-126, 2009. 10.1007/978-3-642-04091-7_15.
[4] Talib, A., Alomary, F., Alwadi, H. and Albusayli, R, “Ontology-Based Cyber Security Policy Implementation in Saudi Arabia,” Journal of Information Security, vol. 9, pp. 315-333, 2018. Doi: 10.4236/jis.2018.94021.
[5] Välja, M., Heiding, F., Franke, U. et al., “Automating Threat Modeling using an Ontology Framework. Cybersecur,” vol. 3, pp. 19, 2020. https://doi.org/10.1186/s42400-020-00060-8.
[6] Panossian, Garo, "Multi-Level Secure Data Dissemination," Electronic Theses, Projects, and Dissertations, vol. 946, https://scholarworks.lib.csusb.edu/etd/946.
[7] Roy, S., Dayan, G.S., Devaraja Holla, V, “Modeling Industrial Business Processes for Querying and Retrieving Using OWL+SWRL,” In: Panetto, H., Debruyne, C., Proper, H., Ardagna, C., Roman, D., Meersman R. Eds., On the Move to Meaningful Internet Systems. OTM 2018 Conferences, OTM 2018. Lecture Notes in Computer Science, vol. 11230, 2018. Springer, Cham. https://doi.org/10.1007/978-3-030-02671-4_31.
[8] Lingala Thirupathi and Venkata Nageswara Rao Padmanabhuni, "Multi-level Protection (Mlp) Policy Implementation using Graph Database," International Journal of Advanced Computer Science and Applications (IJACSA), vol. 12, no. 3, 2021. http://dx.doi.org/10.14569/IJACSA.2021.0120350.
[9] Chen, J., Hu, P., Jimenez-Ruiz, E. et al., “OWL2Vec*: Embedding of OWL Ontologies,” Mach Learn, vol. 110, pp. 1813–1845, 2021. https://doi.org/10.1007/s10994-021-05997-6.
[10] Minh Hoang Lien Vo & Quang Hoang, “Transformation of UML Class Diagram into OWL Ontology,” Journal of Information and Telecommunication, vol. 4, no. 1, pp. 1-16, 2020. DOI: 10.1080/24751839.2019.1686681.
[11] Chatterjee A, Prinz A, Gerdes M, Martinez S, “An Automatic Ontology-Based Approach to Support Logical Representation of Observable and Measurable Data for Healthy Lifestyle Management: Proof-of-Concept Study,” J Med Internet Res, vol. 23, no. 4, pp. e24656, 2021. [Online]. Available: https://www.jmir.org/2021/4/e24656, DOI: 10.2196/24656.
[12] Husáková, Martina, and Vladimír Bureš, "Formal Ontologies in Information Systems Development: A Systematic Review," Information vol. 11, no. 2, pp. 66, 2020. https://doi.org/10.3390/info11020066.
[13] Maxat Kulmanov, Fatima Zohra Smaili, Xin Gao, “Robert Hoehndorf, Semantic Similarity and Machine Learning with Ontologies,” Briefings in Bioinformatics, vol. 22, no. 4, 2021. https://doi.org/10.1093/bib/bbaa199.
[14] Bani-Hani, Anoud; Adedugbe, Oluwasegun; Benkhelifa, Elhadj; and Majdalawieh, Munir, "Fandet Semantic Model: An OWL Ontology for Context-Based Fake News Detection on Social Media," All Works, 4756, 2021. https://zuscholars.zu.ac.ae/works/4756.
[15] Faezeh Mostajabi, Ali Asghar Safaei, Amir Sahafi, “A Systematic Review of Data Models for the Big Data Problem,” IEEE Access, vol. 9, pp. 128889-128904, 2021. 10.1109/ACCESS.2021.3112880.
[16] Ben Mahria, B., Chaker, I. & Zahi A, “A Novel Approach for Learning Ontology from Relational Database: From the Construction to the Evaluation, J Big Data, vol. 8, pp. 25, 2021. https://doi.org/10.1186/s40537-021-00412-2
[17] [Online]. Available: https://documentation.mindsphere.io/MindSphere/howto/howto-create-ontology-owl.html
[18] [Online]. Available: https://go-protege-tutorial.readthedocs.io/en/latest/ObjectProperties.html
[19] [Online]. Available: https://ontology101tutorial.readthedocs.io/en/latest/OWL_ClassRestrictions.html
[20] [Online]. Available: https://docs.oracle.com/cd/E24693_01/appdev.11203/e11828/owl_concepts.htm.