Skip to main content

Formalizing DIKW Architecture for Modeling Security and Privacy as Typed Resources

  • Conference paper
  • First Online:

Abstract

Currently the content of security protection has been expanded multiple sources. The security protection especially of the implicit content from multiple sources poses new challenges to the collection, identification, customization of protection strategies, modeling, etc. We are enlightened by the potential of DIKW (Data, Information, Knowledge, Wisdom) architecture to express semantic of natural language content and human intention. But currently there lacks formalized semantics for the DIKW architecture by itself which poses a challenge for building conceptual models on top of this architecture. We proposed a formalization of the elements of DIKW. The formalization centers the ideology of modeling Data as multiple dimensional hierarchical Types related to observable existence of the Sameness, Information as identification of Data with explicit Difference, Knowledge as applying Completeness of the Type, and Wisdom as variability prediction. Based on this formalization, we propose a solution framework for security concerns centering Type transitions in Graph, Information Graph and Knowledge Graph.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   60.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Appelt, D.E.: FASTUS: a finite-state processor for information extraction from real-world text. In: Proceedings of IJCAI 1993, pp. 1172–1178 (1993)

    Google Scholar 

  2. Pearson, P.D., Hansen, J., Gordon, C.J.: The effect of background knowledge on young children’s comprehension of explicit and implicit information. J. Literacy Res. 11(3), 201–209 (1979)

    Google Scholar 

  3. Chen, M., et al.: Data, information, and knowledge in visualization. IEEE Comput. Graph. Appl. 29(1), 12–19 (2008)

    Article  Google Scholar 

  4. Zins, C.: Conceptual approaches for defining data, information, and knowledge. J. Assoc. Inf. Sci. Technol. 58(4), 479–493 (2014)

    Article  Google Scholar 

  5. Duan, Y., Fu, X., Hu, Q., Gu, Y.: An ontology definition framework for model driven development. In: Gavrilova, M.L., et al. (eds.) ICCSA 2006. LNCS, vol. 3983, pp. 746–755. Springer, Heidelberg (2006). https://doi.org/10.1007/11751632_81

    Chapter  Google Scholar 

  6. Grishman, R.: Information extraction: techniques and challenges. In: Pazienza, M.T. (ed.) SCIE 1997. LNCS, vol. 1299, pp. 10–27. Springer, Heidelberg (1997). https://doi.org/10.1007/3-540-63438-X_2

    Chapter  Google Scholar 

  7. Hundepool, A., et al.: Statistical Disclosure Control. Wiley, New York (2012)

    Book  Google Scholar 

  8. Kant, I.: Critique of Pure Reason. Cambridge University Press, Cambridge (1998)

    Book  Google Scholar 

  9. Shao, L., Duan, Y., Cui, L., Zou, Q., Sun, X.: A pay as you use resource security provision approach based on data graph, information graph and knowledge graph. In: Yin, H., et al. (eds.) IDEAL 2017. LNCS, vol. 10585, pp. 444–451. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-68935-7_48

    Chapter  Google Scholar 

  10. Frank, D.: McSherry: privacy integrated queries: an extensible platform for privacy-preserving data analysis. Commun. ACM 53(9), 89–97 (2010)

    Article  Google Scholar 

  11. Schopenhauer, A.: The world as will and representation. Kenyon Rev. 20(3/4), 44–46 (1998)

    Google Scholar 

  12. Soria-Comas, J., Domingo-Ferrer, J.: Big data privacy: challenges to privacy principles and models. Data Sci. Eng. 1(1), 21–28 (2016)

    Article  Google Scholar 

  13. Duan, Y., Shao, L., Hu, G., Zhou, Z., Zou, Q., Lin, Z.: Specifying architecture of knowledge graph with data graph, information graph, knowledge graph and wisdom graph. In: International Conference on Software Engineering Research, pp. 327–332. IEEE (2017)

    Google Scholar 

  14. Aamodt, A., et al.: Different roles and mutual dependencies of data, information, and knowledge—an AI perspective on their integration. Data Know. Eng. 16(3), 191–222 (1995)

    Article  Google Scholar 

  15. Tarr, P., Ossher, H., Harrison, W., Sutton Jr., S.M.: N degrees of separation: multi-dimensional separation of concerns. In: International Conference on Software Engineering, vol. 3, pp. 107–119. IEEE (1999)

    Google Scholar 

Download references

Acknowledgement

We acknowledge Hainan Project No. ZDYF2017128, NSFC under Grant (No. 61363007, No. 61662021, and No. 61502294), Zhejiang Province medical and health science and technology platform project No. 2017KY497.*refers correspondence.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuanyuan Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Duan, Y., Zhan, L., Zhang, X., Zhang, Y. (2019). Formalizing DIKW Architecture for Modeling Security and Privacy as Typed Resources. In: Gao, H., Yin, Y., Yang, X., Miao, H. (eds) Testbeds and Research Infrastructures for the Development of Networks and Communities. TridentCom 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 270. Springer, Cham. https://doi.org/10.1007/978-3-030-12971-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-12971-2_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-12970-5

  • Online ISBN: 978-3-030-12971-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics