This way the access control uses the great amount
of computational overhead at startup time, building
the personalized views for all the users. However,
these views has only to be generated once and then
stored in-memory, leading to a very short response
time when the user submits his query. At the same
time, the user is not aware of the access control mech-
anism, making the process totally transparent. To pre-
vent possible security issues, we have to protect script
execution on Tinkerpop, or an expert user could easily
bypass the SubGraphStrategy otherwise.
6 CONCLUSIONS AND FUTURE
WORK
We find out that in the state of the art there are not
efficient, flexible and general-purpose access control
models for property graphs. We propose an approach
based on graph traversal over specific patterns and on
the creation of a subgraph using a Tinkerpop feature
to address this issue. This is a preliminary model on
the top of which it has to be build a more complete
access control policy that includes write, delete and
own rights. We left as a future work also an extensive
test of the scalability of the model.
REFERENCES
Abel, F., De Coi, J. L., Henze, N., Koesling, A. W., Krause,
D., and Olmedilla, D. (2007). Enabling advanced and
context-dependent access control in rdf stores. In The
Semantic Web, pages 1–14. Springer.
Alotaibi, A. A., Alotaibi, R. M., and Hamza, N. Access
control models in nosql databases: An overview.
Berners-Lee, T., Hendler, J., Lassila, O., et al. (2001). The
semantic web. Scientific american, 284(5):28–37.
Brandes, U., Eiglsperger, M., Lerner, J., and Pich, C.
(2013). Graph markup language (GraphML).
Damiani, E., De Capitani di Vimercati, S., Paraboschi, S.,
and Samarati, P. (2002). A fine-grained access con-
trol system for xml documents. ACM Transactions on
Information and System Security (TISSEC), 5(2):169–
202.
Goncalves, M., Vidal, M.-E., and Endris, K. M. (2019).
Pure: A privacy aware rule-based framework over
knowledge graphs. In International Conference on
Database and Expert Systems Applications, pages
205–214. Springer.
Hollenbach, J., Presbrey, J., and Berners-Lee, T. (2009). Us-
ing rdf metadata to enable access control on the social
semantic web. In Proceedings of the Workshop on
Collaborative Construction, Management and Link-
ing of Structured Knowledge (CK2009), volume 514,
page 167.
Jain, A. and Farkas, C. (2006). Secure resource descrip-
tion framework: an access control model. In Proceed-
ings of the eleventh ACM symposium on Access con-
trol models and technologies, pages 121–129. ACM.
Jajodia, S., Samarati, P., Sapino, M., and Subrahmanian,
V. S. (2001). Flexible support for multiple access con-
trol policies. ACM Transactions on Database Systems
(TODS), 26(2):214–260.
Kagal, L., Finin, T., and Joshi, A. (2003). A policy based
approach to security for the semantic web. In In-
ternational semantic web conference, pages 402–418.
Springer.
Kirrane, S. (2015). Linked data with access control. In
Workshop on. pp, volume 14, page 23.
Kirrane, S., Mileo, A., and Decker, S. (2017). Access con-
trol and the resource description framework: A survey.
Semantic Web, 8(2):311–352.
Liao, F., Ma, L., and Yang, D. (2019). Research on con-
struction method of knowledge graph of us military
equipment based on bilstm model. In 2019 Inter-
national Conference on High Performance Big Data
and Intelligent Systems (HPBD&IS), pages 146–150.
IEEE.
Morgado, C., Baioco, G. B., Basso, T., and Moraes, R.
(2018). A security model for access control in graph-
oriented databases. In 2018 IEEE International Con-
ference on Software Quality, Reliability and Security
(QRS), pages 135–142. IEEE.
Piplai, A., Mittal, S., Joshi, A., Finin, T., Holt, J., Zak,
R., et al. (2019). Creating cybersecurity knowledge
graphs from malware after action reports.
Rotmensch, M., Halpern, Y., Tlimat, A., Horng, S., and
Sontag, D. (2017). Learning a health knowledge graph
from electronic medical records. Scientific reports,
7(1):1–11.
Sahafizadeh, E. and Nematbakhsh, M. A. (2015). A sur-
vey on security issues in big data and nosql. Ad-
vances in Computer Science: an International Jour-
nal, 4(4):68–72.
Sandhu, R. S. and Samarati, P. (1994). Access control: prin-
ciple and practice. IEEE communications magazine,
32(9):40–48.
Shi, L., Li, S., Yang, X., Qi, J., Pan, G., and Zhou, B.
(2017). Semantic health knowledge graph: Semantic
integration of heterogeneous medical knowledge and
services. BioMed research international, 2017.
Stojanov, R., Gramatikov, S., Mishkovski, I., and Trajanov,
D. (2017). Linked data authorization platform. IEEE
Access, 6:1189–1213.
Szekely, P., Knoblock, C. A., Slepicka, J., Philpot, A.,
Singh, A., Yin, C., Kapoor, D., Natarajan, P., Marcu,
D., Knight, K., et al. (2015). Building and using a
knowledge graph to combat human trafficking. In
International Semantic Web Conference, pages 205–
221. Springer.
Thakkar, H., Punjani, D., Lehmann, J., and Auer, S. (2018).
Two for one: Querying property graph databases us-
ing sparql via gremlinator. In Proceedings of the
1st ACM SIGMOD Joint International Workshop on
Graph Data Management Experiences & Systems
(GRADES) and Network Data Analytics (NDA), pages
1–5.
A Fine-grained Access Control Model for Knowledge Graphs
601