CN108416012A - More structural data access methods based on semantic dependency - Google Patents
More structural data access methods based on semantic dependency Download PDFInfo
- Publication number
- CN108416012A CN108416012A CN201810177500.0A CN201810177500A CN108416012A CN 108416012 A CN108416012 A CN 108416012A CN 201810177500 A CN201810177500 A CN 201810177500A CN 108416012 A CN108416012 A CN 108416012A
- Authority
- CN
- China
- Prior art keywords
- user
- global view
- semantic
- ontology
- semantic dependency
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 230000008859 change Effects 0.000 claims abstract description 16
- 238000005215 recombination Methods 0.000 claims abstract description 10
- 230000006798 recombination Effects 0.000 claims abstract description 10
- 230000000007 visual effect Effects 0.000 claims description 7
- 230000008707 rearrangement Effects 0.000 claims description 3
- 230000009471 action Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 101100025317 Candida albicans (strain SC5314 / ATCC MYA-2876) MVD gene Proteins 0.000 description 1
- 101150079299 MVD1 gene Proteins 0.000 description 1
- 231100000768 Toxicity label Toxicity 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2457—Query processing with adaptation to user needs
- G06F16/24573—Query processing with adaptation to user needs using data annotations, e.g. user-defined metadata
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/30—Semantic analysis
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Computational Linguistics (AREA)
- Databases & Information Systems (AREA)
- Bioethics (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Artificial Intelligence (AREA)
- Library & Information Science (AREA)
- Data Mining & Analysis (AREA)
- Medical Informatics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Document Processing Apparatus (AREA)
Abstract
The present invention discloses a kind of more structural data access methods based on semantic dependency, includes the following steps:(10) user logs in:User-ontology is marked, user semantic Dependency Set of the User-ontology based on semantic dependency is obtained;(20) user's global view is obtained:According to the User-ontology of label and user semantic Dependency Set, falls to arrange generating algorithm using global view, obtain user's global view;(30) global view updates:The dynamic change that data source privacy requirements are judged according to change mark carries out semantic association update to user's global view, obtains recombination user's global view.More structural data access methods based on semantic dependency of the present invention, information security is good, data utilization ratio is high.
Description
Technical field
The invention belongs to multi-source data access technique field, especially a kind of information security is good, data utilization ratio is high
More structural data access methods based on semantic dependency.
Background technology
Usually by effective access control, obtains user oriented and effectively access view, to ensure information security.
Traditional database structure is single, using entity object as one's own department or unit, and the relationship orderliness between entity understands have common
Pattern can be followed, therefore be to have data, data management access control that top-down mode may be used and realize collection after first having pattern
At.And big data instantly derives from a wealth of sources, and data representation format is various, complicated, using semanteme as one's own department or unit, the contact between entity
It presents unstructured, typically has pattern after prior data, the method for needing to merge with big data according to bottom-up mode
It realizes integrated.
Existing more structural data access methods such as Chinese invention patent " XML document access control of XML database system
Method and system " (application number 201210013166.8, publication date:2012.07.04) described comprising " structural belt, which has permission, matches
The logical data view DAG of confidence breath;When the control that accesses calculates, the node step-by-step calculation of logical data view DAG is visited
It asks permission, there are access rights to current path node, be just authorized to the next stage node into access path, until being accessed
The XML document;If the access in a node is refused, this access denied." step.
Above-mentioned data access method is due to excessively relying on tactic pattern of the data group at redundancy itself, and it is straight to have ignored data
The semantic association essence connect, it is low to not only result in condition judgment execution efficiency, can also cause data value overprotection, it is difficult to
Good balance is obtained between the safety and the validity of value of data-privacy protection.
Therefore, problem of the existing technology is:More structural data access methods under the premise of ensuring information security,
Data utilization ratio is low.
Invention content
The purpose of the present invention is to provide a kind of more structural data access methods based on semantic dependency, information security
Good, data utilization ratio height.
Realize that the technical solution of the object of the invention is:
A kind of more structural data access methods based on semantic dependency, include the following steps:
(10) user logs in:User-ontology is marked, obtain User-ontology based on the user semantic of semantic dependency according to
Rely collection;
(20) user's global view is obtained:According to the User-ontology of label and user semantic Dependency Set, using global view
Generating algorithm is arranged, user's global view is obtained;
(30) global view updates:The dynamic change that data source privacy requirements are judged according to change mark, to user's overall situation
View carries out semantic association update, obtains recombination user's global view.
Compared with prior art, the present invention its remarkable advantage is:
Information security is good, data utilization ratio is high:The method of the present invention is using user agent semanteme as starting point, by authorized party
Formula avoids original redundancy structure, and the data that only association and current topic are coupled with semantic dependency have as user is addressable
Range is imitated, while effective acquisition authorization data, meets the needs of source data secret protection.
The present invention is described in further detail with reference to the accompanying drawings and detailed description.
Description of the drawings
Fig. 1 is that the present invention is based on the main flow charts of more structural data access methods of semantic dependency.
Fig. 2 is the flow chart of user's logon step in Fig. 1.
Fig. 3 is the flow chart that user's global view step is obtained in Fig. 1.
Fig. 4 is the flow chart that global view updates step in Fig. 1.
Fig. 5 is the semi-structured XML data structure chart of school's curricula-variable in embodiment.
Fig. 6 is that middle semantic association structure is taken as an elective course by school in embodiment.
Fig. 7 is that the completely new row's of falling global view algorithm is obtained in embodiment.
Fig. 8 is embodiment middle school student's main body semantic association global view.
Fig. 9 is the global view pattern based on students subject Primary key in embodiment
Specific implementation mode
As shown in Figure 1, the present invention is based on more structural data access methods of semantic dependency, include the following steps:
(10) user logs in:User-ontology is marked, obtain User-ontology based on the user semantic of semantic dependency according to
Rely collection;
As shown in Fig. 2, (10) user's logon step includes:
(11) User-ontology marks:Family ontology is used for labeled as semantic key into one according to Role Classification and itself semanteme
Walk semantic association;
(12) user semantic Dependency Set obtains:According to numerical value dependence, structure relies on and semantic association, obtains User-ontology base
In the user semantic Dependency Set of semantic dependency.
(20) user's global view is obtained:According to the User-ontology of label and user semantic Dependency Set, using global view
Generating algorithm is arranged, user's global view is obtained;
As shown in figure 3, described (20) acquisition user's global view step includes:
(21) user's viewdata structural rearrangement:Using semantic key as starting point, using semantic association as approach, expanding data structure
Pattern recombinates, and is arranged global view pattern;
(22) the visual view of user obtains:User to meet secret protection demand falls to arrange global view pattern as data knot
Structure, relating attribute obtain user's global view.
(30) global view updates:The dynamic change that data source privacy requirements are judged according to change mark, to user's overall situation
View carries out semantic association update, obtains recombination user's global view.
As shown in figure 4, (30) the global view reconstitution steps include:
(31) data source privacy variation judges:Judge whether data source privacy requirements dynamically become according to change mark
Change, if having altered, executes (32), otherwise, do not operate;
(32) the visual view recombination of user:Global view pattern is arranged according to the variation update of data source privacy requirements, and is obtained
To user's global view of corresponding recombination.
To make those skilled in the art become apparent from understanding and reproducing the method for the present invention, school's curricula-variable has been merged with multi-source below
For semi-structured XML data, the method for the present invention is described in further detail.
The semi-structured XML data structure of school's curricula-variable is as shown in figure 5, and meet essential safety requirements:
R1:Student can only access oneself elective information, cannot access non-curricula-variable journey;
(student, course [*], read, " #login~>@cno”)→Y(r),N(w)
R2:Teaching class information where student can only access oneself cannot access other teaching classes;
(student, class [*], read, " #login~>@cid”)→Y(r),N(w)
R3:Student cannot access other people information;
(student,sudent[*],read,”#login!=@sno ") → N (r), N (w)
R4:Student cannot access the phone and wage of teacher;
(student,teacher[ttel,tsalary],read,”NULL”)→N(r),N(w)
R5:Teacher cannot access other people information;
(teacher,teacher[*],read,”#login!=@tno ") → N (r), N (w)
(10) user logs in:User-ontology is marked, obtain User-ontology based on the user semantic of semantic dependency according to
Rely collection;
(11) User-ontology marks:For example the Alice that the user LoginID currently logged in is student number S03 is a student,
It is " student " then to mark User-ontology ONTOLOGY, and semantic key UserKey is ' S03 ', is used for further semantic association.
(12) user semantic Dependency Set obtains:
D1 indicates that the path of student performance is in example:School.course.class.student.score is mapped to T1
In, then mulitpath is corresponded to, different values is represented.What functional dependence, multivalued dependence, semantic dependency about D1 can formalize
It is expressed as:
φ1:The student number of student uniquely determines a student
([school.student.@sno]→school.student)
ψ1:No. id of teaching class can determine the several students taken as an elective course
([school.course.class.@cid]→→school.course.class.student)
δ1:Course semantic dependency is in student number
@sno~>@cno
Assuming that student ' the S03 ' logged in, he has taken as an elective course course ' DB ', then@sno [' S03 ']~>@cno [' DB '] table
Show:If the S03 currently logged in taken as an elective course course DB so he taken other data permissions of DB semantic dependencies.Therefore basis
Numerical value relies on, structure relies on and semantic association, can obtain user semantic Dependency Set of the User-ontology based on semantic dependency.
Set 1:Functional Dependencies FD1 Σ ' based on major key
Set 2:Multivalued dependence collection MVD1 Π ' based on major key
It can be obtained based on the Functional Dependencies for logging in User major key userkey by the definition and reasoning of semantic dependency:
Set 3:Semantic dependency SD1 Γ ' based on students subject semanteme
(20) user's global view is obtained:According to the User-ontology of label and user semantic Dependency Set, using global view
Generating algorithm is arranged, user's global view is obtained;
(21) user's viewdata structural rearrangement:A known course number determines a branch of instruction in school, then when a student takes
To the ID permissions of institute's elective, that is, have the right to obtain and the semantic relevant data information of the course;Successively, it is with semantic key
Point, using semantic association as approach, with the extension of permission, in the semantic dependency of access control function and expression user agent semanteme
Under the action of function, linked groups' data structure process that we can be associated with is as shown in Figure 6.In Fig. 6,Entity
Ontology;Object Object;include;relate
Specific execution algorithm is as shown in Figure 7.
(22) the visual view of user obtains:User to meet secret protection demand falls to arrange global view pattern as data knot
Structure, relating attribute obtain user's global view.
After the foundation calculation acquisition completely newly arranges global view pattern, it can map to obtain specifying information, originally with student ' S03 '
Semantic association procedure for body is as shown in Figure 8.
(30) global view updates:The dynamic change that data source privacy requirements are judged according to change mark, to user's overall situation
View carries out semantic association update, obtains recombination user's global view.
(31) data source privacy variation judges:Check whether change flag bit flag has update not do exercises then such as without change
Make, otherwise, continues to execute;
(32) the visual view recombination of user:Such as the node of red-label in Fig. 8<ttel>With<tsalary>It is shown, it is added
More consider the variation of above-mentioned R4 access controls condition, we further execute operation, can incite somebody to action<ttel>With<
tsalary>Node is associated with or shielding.This embodies the lightweight flexibility of this method.It finally obtains based on student ' S03 '
Tv structure tree schemas are as shown in Figure 9.
In Tv, although also having levels structure and one-to-many subtree relationship, due to being closed with the current main body semanteme that logs in
@cno and the@cid of connection are only minority compared with complete or collected works, and expressive force is not limited by former redundancy structure, which is being mapped to
After XML Data, visual scale is greatly simplified control.
Claims (4)
1. a kind of more structural data access methods based on semantic dependency, which is characterized in that include the following steps:
(10) user logs in:User-ontology is marked, user semantic Dependency Set of the User-ontology based on semantic dependency is obtained;
(20) user's global view is obtained:According to the User-ontology of label and user semantic Dependency Set, fall to arrange using global view
Generating algorithm obtains user's global view;
(30) global view updates:The dynamic change that data source privacy requirements are judged according to change mark, to user's global view
Semantic association update is carried out, recombination user's global view is obtained.
2. data access method according to claim 1, which is characterized in that (10) user's logon step includes:
(11) User-ontology marks:Family ontology is used for further language according to Role Classification and itself semanteme labeled as semantic key
Justice association;
(12) user semantic Dependency Set obtains:According to numerical value dependence, structure relies on and semantic association, obtains User-ontology and is based on language
The user semantic Dependency Set that justice relies on.
3. data access method according to claim 1, which is characterized in that described (20) obtain user's global view step
Including:
(21) user's viewdata structural rearrangement:Using semantic key as starting point, using semantic association as approach, expanding data tactic pattern
Recombination, is arranged global view pattern.
(22) the visual view of user obtains:Using meet secret protection demand user fall arrange global view pattern as data structure,
Relating attribute obtains user's global view.
4. data access method according to claim 1, which is characterized in that (30) the global view reconstitution steps packet
It includes:
(31) data source privacy variation judges:Judge whether data source privacy requirements dynamically change according to change mark, if
Have altered, then execute (32), otherwise, does not operate;
(32) the visual view recombination of user:Row's global view pattern is fallen according to the variation update of data source privacy requirements, and is obtained pair
The user's global view that should be recombinated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810177500.0A CN108416012B (en) | 2018-03-05 | 2018-03-05 | Multi-structured data access method based on semantic dependence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810177500.0A CN108416012B (en) | 2018-03-05 | 2018-03-05 | Multi-structured data access method based on semantic dependence |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108416012A true CN108416012A (en) | 2018-08-17 |
CN108416012B CN108416012B (en) | 2020-06-19 |
Family
ID=63129747
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810177500.0A Active CN108416012B (en) | 2018-03-05 | 2018-03-05 | Multi-structured data access method based on semantic dependence |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108416012B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101866286A (en) * | 2010-04-26 | 2010-10-20 | 中国科学院深圳先进技术研究院 | PaaS collaboration system based on semantic relatedness and method thereof |
CN102426519A (en) * | 2011-08-26 | 2012-04-25 | 北京邮电大学 | Linked data-based multiplexing method of business process execution language (BPEL) templates and services and system thereof |
US20130144889A1 (en) * | 2011-12-05 | 2013-06-06 | International Business Machines Corporation | Semantic and Contextual Searching of Knowledge Repositories |
CN106909696A (en) * | 2017-03-27 | 2017-06-30 | 浙江工业大学 | A kind of colleges and universities' data assembled view automatic generation method based on data, services dependency graph |
-
2018
- 2018-03-05 CN CN201810177500.0A patent/CN108416012B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101866286A (en) * | 2010-04-26 | 2010-10-20 | 中国科学院深圳先进技术研究院 | PaaS collaboration system based on semantic relatedness and method thereof |
CN102426519A (en) * | 2011-08-26 | 2012-04-25 | 北京邮电大学 | Linked data-based multiplexing method of business process execution language (BPEL) templates and services and system thereof |
US20130144889A1 (en) * | 2011-12-05 | 2013-06-06 | International Business Machines Corporation | Semantic and Contextual Searching of Knowledge Repositories |
CN106909696A (en) * | 2017-03-27 | 2017-06-30 | 浙江工业大学 | A kind of colleges and universities' data assembled view automatic generation method based on data, services dependency graph |
Also Published As
Publication number | Publication date |
---|---|
CN108416012B (en) | 2020-06-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110597943B (en) | Interest point processing method and device based on artificial intelligence and electronic equipment | |
Ding et al. | Application of Internet of Things and virtual reality technology in college physical education | |
CN106919689A (en) | Professional domain knowledge mapping dynamic fixing method based on definitions blocks of knowledge | |
CN105824619A (en) | Code generator integrated based on Spring MVC framework, Apache Shiro framework and MyBatis framework | |
CN108509807A (en) | A kind of the table data authority control system and method for based role | |
CN105653725A (en) | MYSQL database mandatory access control self-adaptive optimization method based on conditional random fields | |
CN108932278A (en) | Interactive method and system based on semantic frame | |
Trojahn et al. | A cooperative approach for composite ontology mapping | |
CN104915412B (en) | A kind of method and system of dynamic management data library connection | |
Wang et al. | S-store: An engine for large rdf graph integrating spatial information | |
Chen | Delineating the spatial boundaries of megaregions in China: A city network perspective | |
CN106844934A (en) | Smart city planning and designing expert system and smart city planning and designing method | |
CN106529323A (en) | Multilevel security model access control data fusion method | |
CN103617265A (en) | Ontology query engine optimizing system based on ontology semantic information | |
CN103870548B (en) | The access control method of spatial database | |
CN108416012A (en) | More structural data access methods based on semantic dependency | |
CN108364246A (en) | A kind of Student Information Management System | |
CN106020923A (en) | SELinux strategy compiling method and system | |
Schmidt et al. | Pleasantly consuming linked data with rdf data descriptions | |
Chen et al. | Impact of heterogeneity on opinion dynamics: Heterogeneous interaction model | |
Gao et al. | Family background, parent involvement, and shadow education participation of middle school students: Empirical analysis from CEPS2015 data | |
CN109145633A (en) | Track data method for secret protection, electronic equipment, storage medium and system | |
Woermann et al. | Ethnic and racial valorisations in Nigeria and South Africa: How ubuntu may harm or help | |
Zhang et al. | Semantic web and geospatial unique features based geospatial data integration | |
Karadimce et al. | A framework for declarative updates and constraint maintenance in Object-Oriented databases |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210422 Address after: Yudaojie Qinhuai District of Nanjing City, Jiangsu Province, No. 29 210016 Patentee after: Nanjing University of Aeronautics and Astronautics Patentee after: ARMY ENGINEERING University OF PLA Address before: Yudaojie Nanjing 210016 Jiangsu province No. 29 Patentee before: Nanjing University of Aeronautics and Astronautics |
|
TR01 | Transfer of patent right |