CN108416012A - More structural data access methods based on semantic dependency - Google Patents

More structural data access methods based on semantic dependency Download PDF

Info

Publication number
CN108416012A
CN108416012A CN201810177500.0A CN201810177500A CN108416012A CN 108416012 A CN108416012 A CN 108416012A CN 201810177500 A CN201810177500 A CN 201810177500A CN 108416012 A CN108416012 A CN 108416012A
Authority
CN
China
Prior art keywords
user
global view
semantic
ontology
semantic dependency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810177500.0A
Other languages
Chinese (zh)
Other versions
CN108416012B (en
Inventor
王梅娟
王箭
王兆丽
韩敬利
史涯晴
惠战伟
董会
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Aeronautics and Astronautics
Army Engineering University of PLA
Original Assignee
Nanjing University of Aeronautics and Astronautics
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Aeronautics and Astronautics filed Critical Nanjing University of Aeronautics and Astronautics
Priority to CN201810177500.0A priority Critical patent/CN108416012B/en
Publication of CN108416012A publication Critical patent/CN108416012A/en
Application granted granted Critical
Publication of CN108416012B publication Critical patent/CN108416012B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • G06F16/24573Query processing with adaptation to user needs using data annotations, e.g. user-defined metadata
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/30Semantic analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • Databases & Information Systems (AREA)
  • Bioethics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Artificial Intelligence (AREA)
  • Library & Information Science (AREA)
  • Data Mining & Analysis (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The present invention discloses a kind of more structural data access methods based on semantic dependency, includes the following steps:(10) user logs in:User-ontology is marked, user semantic Dependency Set of the User-ontology based on semantic dependency is obtained;(20) user's global view is obtained:According to the User-ontology of label and user semantic Dependency Set, falls to arrange generating algorithm using global view, obtain user's global view;(30) global view updates:The dynamic change that data source privacy requirements are judged according to change mark carries out semantic association update to user's global view, obtains recombination user's global view.More structural data access methods based on semantic dependency of the present invention, information security is good, data utilization ratio is high.

Description

More structural data access methods based on semantic dependency
Technical field
The invention belongs to multi-source data access technique field, especially a kind of information security is good, data utilization ratio is high More structural data access methods based on semantic dependency.
Background technology
Usually by effective access control, obtains user oriented and effectively access view, to ensure information security.
Traditional database structure is single, using entity object as one's own department or unit, and the relationship orderliness between entity understands have common Pattern can be followed, therefore be to have data, data management access control that top-down mode may be used and realize collection after first having pattern At.And big data instantly derives from a wealth of sources, and data representation format is various, complicated, using semanteme as one's own department or unit, the contact between entity It presents unstructured, typically has pattern after prior data, the method for needing to merge with big data according to bottom-up mode It realizes integrated.
Existing more structural data access methods such as Chinese invention patent " XML document access control of XML database system Method and system " (application number 201210013166.8, publication date:2012.07.04) described comprising " structural belt, which has permission, matches The logical data view DAG of confidence breath;When the control that accesses calculates, the node step-by-step calculation of logical data view DAG is visited It asks permission, there are access rights to current path node, be just authorized to the next stage node into access path, until being accessed The XML document;If the access in a node is refused, this access denied." step.
Above-mentioned data access method is due to excessively relying on tactic pattern of the data group at redundancy itself, and it is straight to have ignored data The semantic association essence connect, it is low to not only result in condition judgment execution efficiency, can also cause data value overprotection, it is difficult to Good balance is obtained between the safety and the validity of value of data-privacy protection.
Therefore, problem of the existing technology is:More structural data access methods under the premise of ensuring information security, Data utilization ratio is low.
Invention content
The purpose of the present invention is to provide a kind of more structural data access methods based on semantic dependency, information security Good, data utilization ratio height.
Realize that the technical solution of the object of the invention is:
A kind of more structural data access methods based on semantic dependency, include the following steps:
(10) user logs in:User-ontology is marked, obtain User-ontology based on the user semantic of semantic dependency according to Rely collection;
(20) user's global view is obtained:According to the User-ontology of label and user semantic Dependency Set, using global view Generating algorithm is arranged, user's global view is obtained;
(30) global view updates:The dynamic change that data source privacy requirements are judged according to change mark, to user's overall situation View carries out semantic association update, obtains recombination user's global view.
Compared with prior art, the present invention its remarkable advantage is:
Information security is good, data utilization ratio is high:The method of the present invention is using user agent semanteme as starting point, by authorized party Formula avoids original redundancy structure, and the data that only association and current topic are coupled with semantic dependency have as user is addressable Range is imitated, while effective acquisition authorization data, meets the needs of source data secret protection.
The present invention is described in further detail with reference to the accompanying drawings and detailed description.
Description of the drawings
Fig. 1 is that the present invention is based on the main flow charts of more structural data access methods of semantic dependency.
Fig. 2 is the flow chart of user's logon step in Fig. 1.
Fig. 3 is the flow chart that user's global view step is obtained in Fig. 1.
Fig. 4 is the flow chart that global view updates step in Fig. 1.
Fig. 5 is the semi-structured XML data structure chart of school's curricula-variable in embodiment.
Fig. 6 is that middle semantic association structure is taken as an elective course by school in embodiment.
Fig. 7 is that the completely new row's of falling global view algorithm is obtained in embodiment.
Fig. 8 is embodiment middle school student's main body semantic association global view.
Fig. 9 is the global view pattern based on students subject Primary key in embodiment
Specific implementation mode
As shown in Figure 1, the present invention is based on more structural data access methods of semantic dependency, include the following steps:
(10) user logs in:User-ontology is marked, obtain User-ontology based on the user semantic of semantic dependency according to Rely collection;
As shown in Fig. 2, (10) user's logon step includes:
(11) User-ontology marks:Family ontology is used for labeled as semantic key into one according to Role Classification and itself semanteme Walk semantic association;
(12) user semantic Dependency Set obtains:According to numerical value dependence, structure relies on and semantic association, obtains User-ontology base In the user semantic Dependency Set of semantic dependency.
(20) user's global view is obtained:According to the User-ontology of label and user semantic Dependency Set, using global view Generating algorithm is arranged, user's global view is obtained;
As shown in figure 3, described (20) acquisition user's global view step includes:
(21) user's viewdata structural rearrangement:Using semantic key as starting point, using semantic association as approach, expanding data structure Pattern recombinates, and is arranged global view pattern;
(22) the visual view of user obtains:User to meet secret protection demand falls to arrange global view pattern as data knot Structure, relating attribute obtain user's global view.
(30) global view updates:The dynamic change that data source privacy requirements are judged according to change mark, to user's overall situation View carries out semantic association update, obtains recombination user's global view.
As shown in figure 4, (30) the global view reconstitution steps include:
(31) data source privacy variation judges:Judge whether data source privacy requirements dynamically become according to change mark Change, if having altered, executes (32), otherwise, do not operate;
(32) the visual view recombination of user:Global view pattern is arranged according to the variation update of data source privacy requirements, and is obtained To user's global view of corresponding recombination.
To make those skilled in the art become apparent from understanding and reproducing the method for the present invention, school's curricula-variable has been merged with multi-source below For semi-structured XML data, the method for the present invention is described in further detail.
The semi-structured XML data structure of school's curricula-variable is as shown in figure 5, and meet essential safety requirements:
R1:Student can only access oneself elective information, cannot access non-curricula-variable journey;
(student, course [*], read, " #login~>@cno”)→Y(r),N(w)
R2:Teaching class information where student can only access oneself cannot access other teaching classes;
(student, class [*], read, " #login~>@cid”)→Y(r),N(w)
R3:Student cannot access other people information;
(student,sudent[*],read,”#login!=@sno ") → N (r), N (w)
R4:Student cannot access the phone and wage of teacher;
(student,teacher[ttel,tsalary],read,”NULL”)→N(r),N(w)
R5:Teacher cannot access other people information;
(teacher,teacher[*],read,”#login!=@tno ") → N (r), N (w)
(10) user logs in:User-ontology is marked, obtain User-ontology based on the user semantic of semantic dependency according to Rely collection;
(11) User-ontology marks:For example the Alice that the user LoginID currently logged in is student number S03 is a student, It is " student " then to mark User-ontology ONTOLOGY, and semantic key UserKey is ' S03 ', is used for further semantic association.
(12) user semantic Dependency Set obtains:
D1 indicates that the path of student performance is in example:School.course.class.student.score is mapped to T1 In, then mulitpath is corresponded to, different values is represented.What functional dependence, multivalued dependence, semantic dependency about D1 can formalize It is expressed as:
φ1:The student number of student uniquely determines a student
([school.student.@sno]→school.student)
ψ1:No. id of teaching class can determine the several students taken as an elective course
([school.course.class.@cid]→→school.course.class.student)
δ1:Course semantic dependency is in student number
@sno~>@cno
Assuming that student ' the S03 ' logged in, he has taken as an elective course course ' DB ', then@sno [' S03 ']~>@cno [' DB '] table Show:If the S03 currently logged in taken as an elective course course DB so he taken other data permissions of DB semantic dependencies.Therefore basis Numerical value relies on, structure relies on and semantic association, can obtain user semantic Dependency Set of the User-ontology based on semantic dependency.
Set 1:Functional Dependencies FD1 Σ ' based on major key
Set 2:Multivalued dependence collection MVD1 Π ' based on major key
It can be obtained based on the Functional Dependencies for logging in User major key userkey by the definition and reasoning of semantic dependency:
Set 3:Semantic dependency SD1 Γ ' based on students subject semanteme
(20) user's global view is obtained:According to the User-ontology of label and user semantic Dependency Set, using global view Generating algorithm is arranged, user's global view is obtained;
(21) user's viewdata structural rearrangement:A known course number determines a branch of instruction in school, then when a student takes To the ID permissions of institute's elective, that is, have the right to obtain and the semantic relevant data information of the course;Successively, it is with semantic key Point, using semantic association as approach, with the extension of permission, in the semantic dependency of access control function and expression user agent semanteme Under the action of function, linked groups' data structure process that we can be associated with is as shown in Figure 6.In Fig. 6,Entity Ontology;Object Object;include;relate
Specific execution algorithm is as shown in Figure 7.
(22) the visual view of user obtains:User to meet secret protection demand falls to arrange global view pattern as data knot Structure, relating attribute obtain user's global view.
After the foundation calculation acquisition completely newly arranges global view pattern, it can map to obtain specifying information, originally with student ' S03 ' Semantic association procedure for body is as shown in Figure 8.
(30) global view updates:The dynamic change that data source privacy requirements are judged according to change mark, to user's overall situation View carries out semantic association update, obtains recombination user's global view.
(31) data source privacy variation judges:Check whether change flag bit flag has update not do exercises then such as without change Make, otherwise, continues to execute;
(32) the visual view recombination of user:Such as the node of red-label in Fig. 8<ttel>With<tsalary>It is shown, it is added More consider the variation of above-mentioned R4 access controls condition, we further execute operation, can incite somebody to action<ttel>With< tsalary>Node is associated with or shielding.This embodies the lightweight flexibility of this method.It finally obtains based on student ' S03 ' Tv structure tree schemas are as shown in Figure 9.
In Tv, although also having levels structure and one-to-many subtree relationship, due to being closed with the current main body semanteme that logs in @cno and the@cid of connection are only minority compared with complete or collected works, and expressive force is not limited by former redundancy structure, which is being mapped to After XML Data, visual scale is greatly simplified control.

Claims (4)

1. a kind of more structural data access methods based on semantic dependency, which is characterized in that include the following steps:
(10) user logs in:User-ontology is marked, user semantic Dependency Set of the User-ontology based on semantic dependency is obtained;
(20) user's global view is obtained:According to the User-ontology of label and user semantic Dependency Set, fall to arrange using global view Generating algorithm obtains user's global view;
(30) global view updates:The dynamic change that data source privacy requirements are judged according to change mark, to user's global view Semantic association update is carried out, recombination user's global view is obtained.
2. data access method according to claim 1, which is characterized in that (10) user's logon step includes:
(11) User-ontology marks:Family ontology is used for further language according to Role Classification and itself semanteme labeled as semantic key Justice association;
(12) user semantic Dependency Set obtains:According to numerical value dependence, structure relies on and semantic association, obtains User-ontology and is based on language The user semantic Dependency Set that justice relies on.
3. data access method according to claim 1, which is characterized in that described (20) obtain user's global view step Including:
(21) user's viewdata structural rearrangement:Using semantic key as starting point, using semantic association as approach, expanding data tactic pattern Recombination, is arranged global view pattern.
(22) the visual view of user obtains:Using meet secret protection demand user fall arrange global view pattern as data structure, Relating attribute obtains user's global view.
4. data access method according to claim 1, which is characterized in that (30) the global view reconstitution steps packet It includes:
(31) data source privacy variation judges:Judge whether data source privacy requirements dynamically change according to change mark, if Have altered, then execute (32), otherwise, does not operate;
(32) the visual view recombination of user:Row's global view pattern is fallen according to the variation update of data source privacy requirements, and is obtained pair The user's global view that should be recombinated.
CN201810177500.0A 2018-03-05 2018-03-05 Multi-structured data access method based on semantic dependence Active CN108416012B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810177500.0A CN108416012B (en) 2018-03-05 2018-03-05 Multi-structured data access method based on semantic dependence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810177500.0A CN108416012B (en) 2018-03-05 2018-03-05 Multi-structured data access method based on semantic dependence

Publications (2)

Publication Number Publication Date
CN108416012A true CN108416012A (en) 2018-08-17
CN108416012B CN108416012B (en) 2020-06-19

Family

ID=63129747

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810177500.0A Active CN108416012B (en) 2018-03-05 2018-03-05 Multi-structured data access method based on semantic dependence

Country Status (1)

Country Link
CN (1) CN108416012B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101866286A (en) * 2010-04-26 2010-10-20 中国科学院深圳先进技术研究院 PaaS collaboration system based on semantic relatedness and method thereof
CN102426519A (en) * 2011-08-26 2012-04-25 北京邮电大学 Linked data-based multiplexing method of business process execution language (BPEL) templates and services and system thereof
US20130144889A1 (en) * 2011-12-05 2013-06-06 International Business Machines Corporation Semantic and Contextual Searching of Knowledge Repositories
CN106909696A (en) * 2017-03-27 2017-06-30 浙江工业大学 A kind of colleges and universities' data assembled view automatic generation method based on data, services dependency graph

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101866286A (en) * 2010-04-26 2010-10-20 中国科学院深圳先进技术研究院 PaaS collaboration system based on semantic relatedness and method thereof
CN102426519A (en) * 2011-08-26 2012-04-25 北京邮电大学 Linked data-based multiplexing method of business process execution language (BPEL) templates and services and system thereof
US20130144889A1 (en) * 2011-12-05 2013-06-06 International Business Machines Corporation Semantic and Contextual Searching of Knowledge Repositories
CN106909696A (en) * 2017-03-27 2017-06-30 浙江工业大学 A kind of colleges and universities' data assembled view automatic generation method based on data, services dependency graph

Also Published As

Publication number Publication date
CN108416012B (en) 2020-06-19

Similar Documents

Publication Publication Date Title
CN110597943B (en) Interest point processing method and device based on artificial intelligence and electronic equipment
Ding et al. Application of Internet of Things and virtual reality technology in college physical education
CN106919689A (en) Professional domain knowledge mapping dynamic fixing method based on definitions blocks of knowledge
CN105824619A (en) Code generator integrated based on Spring MVC framework, Apache Shiro framework and MyBatis framework
CN108509807A (en) A kind of the table data authority control system and method for based role
CN105653725A (en) MYSQL database mandatory access control self-adaptive optimization method based on conditional random fields
CN108932278A (en) Interactive method and system based on semantic frame
Trojahn et al. A cooperative approach for composite ontology mapping
CN104915412B (en) A kind of method and system of dynamic management data library connection
Wang et al. S-store: An engine for large rdf graph integrating spatial information
Chen Delineating the spatial boundaries of megaregions in China: A city network perspective
CN106844934A (en) Smart city planning and designing expert system and smart city planning and designing method
CN106529323A (en) Multilevel security model access control data fusion method
CN103617265A (en) Ontology query engine optimizing system based on ontology semantic information
CN103870548B (en) The access control method of spatial database
CN108416012A (en) More structural data access methods based on semantic dependency
CN108364246A (en) A kind of Student Information Management System
CN106020923A (en) SELinux strategy compiling method and system
Schmidt et al. Pleasantly consuming linked data with rdf data descriptions
Chen et al. Impact of heterogeneity on opinion dynamics: Heterogeneous interaction model
Gao et al. Family background, parent involvement, and shadow education participation of middle school students: Empirical analysis from CEPS2015 data
CN109145633A (en) Track data method for secret protection, electronic equipment, storage medium and system
Woermann et al. Ethnic and racial valorisations in Nigeria and South Africa: How ubuntu may harm or help
Zhang et al. Semantic web and geospatial unique features based geospatial data integration
Karadimce et al. A framework for declarative updates and constraint maintenance in Object-Oriented databases

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210422

Address after: Yudaojie Qinhuai District of Nanjing City, Jiangsu Province, No. 29 210016

Patentee after: Nanjing University of Aeronautics and Astronautics

Patentee after: ARMY ENGINEERING University OF PLA

Address before: Yudaojie Nanjing 210016 Jiangsu province No. 29

Patentee before: Nanjing University of Aeronautics and Astronautics

TR01 Transfer of patent right