SlideShare a Scribd company logo
1 of 3
GLOBALSOFT TECHNOLOGIES 
Authorization Control for a Semantic Data 
Repository through an Inference Policy Engine 
ABSTRACT: 
Semantic models help in achieving semantic interoperability among sources of data and 
applications. The necessity to efficiently manage these types of objects has increased the 
number of specialized repositories, usually referred to as semantic databases. An increasing 
number of project initiatives have been recorded that choose to formalize application 
knowledge using ontologies and semantic data representation. Due to the various sensitivities 
of data, suitable access control mechanisms pertaining to the semantic repository should be 
put in place to ensure that only authorized users can obtain access to the information in its 
entirety.In fact, deciding what can be made available to the user without revealing 
confidential information is made even more difficult because the user may be able to apply 
logic and reasoning to infer confidential information from the knowledge being provided. In 
this paper, we design an authorization security model enforced on a semantic model’s entities 
(concepts) and also propagate on their individuals in the OWL database through an inference 
policy engine. We provide TBox access control for the construction of a TBox family and 
propagate this based on the construction of concept taxonomies. We also provide ABox label-based 
access control for facts in the domain knowledge and report experiments to evaluate 
the effects of access control on reasoning and modularization. 
EXISTING SYSTEM: 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
In this paper, we design an authorization security model enforced on a semantic model’s 
entities (concepts) and also propagate on their individuals in the OWL database through an 
inference policy engine. We provide TBox access control for the construction of a TBox 
family and propagate this based on the construction of concept taxonomies. large amount of 
data are available on the Internet, and managing it by means of traditional methods is 
becoming very difficult. Novel tools and techniques are needed to effectively administer this 
data, provide interoperability and warehousing between the numerous data supplies and 
systems, and to obtain information from the databases and warehouses on the Internet. 
. 
PROPOSED SYSTEM: 
We proposed a control model consisting of concept-level access that supports propagation 
based on the relationships among concepts for the purpose of regulating the access to data by 
individuals. Proposed policy languages similar to Rei based on Semantic Web languages like 
RDF and DAML+OIL and developed a framework, Rein, based on Rei. Finin et al. proposed 
the use of the OWL language as the formalization of the RBAC model. They provide two 
ways to formalize an RBAC role, as a class or as an attribute. The proposed mechanism is 
considered a highly structured multilayered authorization control for safeguarding semantic 
data repositories, with mechanisms that fully support content-based access control, so that the 
authorization requirements are established not only for concepts in TBox, but also for their 
individuals in the ABox. we proposed a semantic reasoner authorization model conceived to 
secure access to semantic repositories 
CONCLUSION: 
In this paper, we proposed a semantic reasoner authorization modelconceived to secure 
access to semantic repositories. The model is able to restrict access to confidential knowledge 
that is represented using ontologies and can regulate access to both the ontology’s concepts 
and their individuals. Therefore, the model fully supports contentbasedaccess control. From a 
functional perspective, the model consists of two main components: TBox access control for 
the construction of the TBox family and ABox label-based access control for facts in the 
domain knowledge. The model also supports a flexible mechanism for propagating 
authorizations through a hierarchy concept tree.
SYSTEM CONFIGURATION:- 
HARDWARE CONFIGURATION:- 
 Processor - Pentium –IV 
 Speed - 1.1 Ghz 
 RAM - 256 MB(min) 
 Hard Disk - 20 GB 
 Key Board - Standard Windows Keyboard 
 Mouse - Two or Three Button Mouse 
 Monitor - SVGA 
SOFTWARE CONFIGURATION:- 
 Operating System : Windows XP 
 Programming Language : JAVA 
 Java Version : JDK 1.6 & above.

More Related Content

Viewers also liked

Problemas de razonamiento con una incognita
Problemas de razonamiento con una incognitaProblemas de razonamiento con una incognita
Problemas de razonamiento con una incognita
Sofía Escarcega
 
Bang gia mcb_mccb_contactor_acb_hyundai_10-11-2012
Bang gia mcb_mccb_contactor_acb_hyundai_10-11-2012Bang gia mcb_mccb_contactor_acb_hyundai_10-11-2012
Bang gia mcb_mccb_contactor_acb_hyundai_10-11-2012
Lãng Quên
 
De-Fragmenting Africa Deepening Regional Trade Integration in Goods and Serv...
 De-Fragmenting Africa Deepening Regional Trade Integration in Goods and Serv... De-Fragmenting Africa Deepening Regional Trade Integration in Goods and Serv...
De-Fragmenting Africa Deepening Regional Trade Integration in Goods and Serv...
Dr Lendy Spires
 
Κόμβος Διαλειτουργικότητας- Μαραγκός Στ.- ΥΠΕΣ
Κόμβος Διαλειτουργικότητας- Μαραγκός Στ.- ΥΠΕΣΚόμβος Διαλειτουργικότητας- Μαραγκός Στ.- ΥΠΕΣ
Κόμβος Διαλειτουργικότητας- Μαραγκός Στ.- ΥΠΕΣ
OTS SA
 

Viewers also liked (12)

Problemas de razonamiento con una incognita
Problemas de razonamiento con una incognitaProblemas de razonamiento con una incognita
Problemas de razonamiento con una incognita
 
Amra
AmraAmra
Amra
 
Bang gia mcb_mccb_contactor_acb_hyundai_10-11-2012
Bang gia mcb_mccb_contactor_acb_hyundai_10-11-2012Bang gia mcb_mccb_contactor_acb_hyundai_10-11-2012
Bang gia mcb_mccb_contactor_acb_hyundai_10-11-2012
 
Top 10 Signs of the Textpocalypse
Top 10 Signs of the TextpocalypseTop 10 Signs of the Textpocalypse
Top 10 Signs of the Textpocalypse
 
여행 TIP과 여행 "앱"
여행 TIP과  여행 "앱"여행 TIP과  여행 "앱"
여행 TIP과 여행 "앱"
 
Manka Restaurant in Machu Picchu
Manka Restaurant in Machu PicchuManka Restaurant in Machu Picchu
Manka Restaurant in Machu Picchu
 
Museo Cristobal Balenciaga, Getaria (GUIPUZCOA)
Museo Cristobal Balenciaga, Getaria (GUIPUZCOA)Museo Cristobal Balenciaga, Getaria (GUIPUZCOA)
Museo Cristobal Balenciaga, Getaria (GUIPUZCOA)
 
Mirada tactil 1
Mirada tactil 1Mirada tactil 1
Mirada tactil 1
 
Ferrara 02 maggio 2013 Modulo 1 Pianificazione
Ferrara 02 maggio 2013  Modulo 1 PianificazioneFerrara 02 maggio 2013  Modulo 1 Pianificazione
Ferrara 02 maggio 2013 Modulo 1 Pianificazione
 
De-Fragmenting Africa Deepening Regional Trade Integration in Goods and Serv...
 De-Fragmenting Africa Deepening Regional Trade Integration in Goods and Serv... De-Fragmenting Africa Deepening Regional Trade Integration in Goods and Serv...
De-Fragmenting Africa Deepening Regional Trade Integration in Goods and Serv...
 
Ivan aparell respiratori
Ivan aparell respiratoriIvan aparell respiratori
Ivan aparell respiratori
 
Κόμβος Διαλειτουργικότητας- Μαραγκός Στ.- ΥΠΕΣ
Κόμβος Διαλειτουργικότητας- Μαραγκός Στ.- ΥΠΕΣΚόμβος Διαλειτουργικότητας- Μαραγκός Στ.- ΥΠΕΣ
Κόμβος Διαλειτουργικότητας- Μαραγκός Στ.- ΥΠΕΣ
 

More from IEEEBEBTECHSTUDENTSPROJECTS

More from IEEEBEBTECHSTUDENTSPROJECTS (20)

2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
 
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
 
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
 

Recently uploaded

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 

Recently uploaded (20)

HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 

2014 IEEE JAVA NETWORK SECURITY PROJECT Authorization control for a semantic data repository through an inference policy engine

  • 1. GLOBALSOFT TECHNOLOGIES Authorization Control for a Semantic Data Repository through an Inference Policy Engine ABSTRACT: Semantic models help in achieving semantic interoperability among sources of data and applications. The necessity to efficiently manage these types of objects has increased the number of specialized repositories, usually referred to as semantic databases. An increasing number of project initiatives have been recorded that choose to formalize application knowledge using ontologies and semantic data representation. Due to the various sensitivities of data, suitable access control mechanisms pertaining to the semantic repository should be put in place to ensure that only authorized users can obtain access to the information in its entirety.In fact, deciding what can be made available to the user without revealing confidential information is made even more difficult because the user may be able to apply logic and reasoning to infer confidential information from the knowledge being provided. In this paper, we design an authorization security model enforced on a semantic model’s entities (concepts) and also propagate on their individuals in the OWL database through an inference policy engine. We provide TBox access control for the construction of a TBox family and propagate this based on the construction of concept taxonomies. We also provide ABox label-based access control for facts in the domain knowledge and report experiments to evaluate the effects of access control on reasoning and modularization. EXISTING SYSTEM: IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. In this paper, we design an authorization security model enforced on a semantic model’s entities (concepts) and also propagate on their individuals in the OWL database through an inference policy engine. We provide TBox access control for the construction of a TBox family and propagate this based on the construction of concept taxonomies. large amount of data are available on the Internet, and managing it by means of traditional methods is becoming very difficult. Novel tools and techniques are needed to effectively administer this data, provide interoperability and warehousing between the numerous data supplies and systems, and to obtain information from the databases and warehouses on the Internet. . PROPOSED SYSTEM: We proposed a control model consisting of concept-level access that supports propagation based on the relationships among concepts for the purpose of regulating the access to data by individuals. Proposed policy languages similar to Rei based on Semantic Web languages like RDF and DAML+OIL and developed a framework, Rein, based on Rei. Finin et al. proposed the use of the OWL language as the formalization of the RBAC model. They provide two ways to formalize an RBAC role, as a class or as an attribute. The proposed mechanism is considered a highly structured multilayered authorization control for safeguarding semantic data repositories, with mechanisms that fully support content-based access control, so that the authorization requirements are established not only for concepts in TBox, but also for their individuals in the ABox. we proposed a semantic reasoner authorization model conceived to secure access to semantic repositories CONCLUSION: In this paper, we proposed a semantic reasoner authorization modelconceived to secure access to semantic repositories. The model is able to restrict access to confidential knowledge that is represented using ontologies and can regulate access to both the ontology’s concepts and their individuals. Therefore, the model fully supports contentbasedaccess control. From a functional perspective, the model consists of two main components: TBox access control for the construction of the TBox family and ABox label-based access control for facts in the domain knowledge. The model also supports a flexible mechanism for propagating authorizations through a hierarchy concept tree.
  • 3. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.