skip to main content
research-article

Balancing Expressiveness and Inexpressiveness in View Design

Published:15 November 2021Publication History
Skip Abstract Section

Abstract

We study the design of data publishing mechanisms that allow a collection of autonomous distributed data sources to collaborate to support queries. A common mechanism for data publishing is via views: functions that expose derived data to users, usually specified as declarative queries. Our autonomy assumption is that the views must be on individual sources, but with the intention of supporting integrated queries. In deciding what data to expose to users, two considerations must be balanced. The views must be sufficiently expressive to support queries that users want to ask—the utility of the publishing mechanism. But there may also be some expressiveness restrictions. Here, we consider two restrictions, a minimal information requirement, saying that the views should reveal as little as possible while supporting the utility query, and a non-disclosure requirement, formalizing the need to prevent external users from computing information that data owners do not want revealed. We investigate the problem of designing views that satisfy both expressiveness and inexpressiveness requirements, for views in a restricted information systems - query languages (conjunctive queries), and for arbitrary views.

REFERENCES

  1. [1] Abiteboul Serge, Hull Richard, and Vianu Victor. 1995. Foundations of Databases. Addison-Wesley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Arenas Marcelo, Barceló Pablo, and Reutter Juan L.. 2011. Query Languages for Data Exchange: Beyond Unions of Conjunctive Queries. Theory Comput. Syst. 49, 2 (2011), 489564. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Baget Jean-François, Garreau Fabien, Mugnier Marie-Laure, and Rocher Swan. 2014. Extending acyclicity notions for existential rules. In Proceedings of the ECAI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Baget Jean-François, Mugnier Marie-Laure, Rudolph Sebastian, and Thomazo Michaël. 2011. Walking the complexity lines for generalized guarded existential rules. In Proceedings of the IJCAI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Bárány Vince, Benedikt Michael, and Cate Balder Ten. 2018. Some model theory of guarded nengation. J. Symbol. Logic 83, 4 (2018), 13071344.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Bater Johes, Elliott Gregory, Eggen Craig, Goel Satyender, Kho Abel N., and Rogers Jennie. 2017. SMCQL: Secure query processing for private data networks. In Proceedings of the VLDB.Google ScholarGoogle Scholar
  7. [7] Benedikt Michael, Bourhis Pierre, Jachiet Louis, and Thomazo Michaël. 2019. Reasoning about disclosure in data integration in the presence of source constraints. In Proceedings of the IJCAI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Benedikt Michael, Bourhis Pierre, Cate Balder ten, and Puppis Gabriele. 2016. Querying visible and invisible information. In Proceedings of the LICS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Benedikt Michael, Grau Bernardo Cuenca, and Kostylev Egor V.. 2018. Logical foundations of information disclosure in ontology-based data integration. Artif. Intell. 262 (2018), 5295.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Benedikt Michael, Cate Balder ten, and Tsamoura Efi. 2016. Generating plans from proofs. In Proceedings of the TODS.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Bonatti Piero A. and Sauro Luigi. 2013. A confidentiality model for ontologies. In Proceedings of the ISWC. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Calvanese Diego, Giacomo Giuseppe De, Lenzerini Maurizio, and Rosati Riccardo. 2012. View-based query answering in description logics: Semantics and complexity. J. Comput. Syst. Sci. 78, 1 (2012), 2646. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Chaum David, Crépeau Claude, and Damgard Ivan. 1988. Multiparty unconditionally secure protocols. In Proceedings of the STOC. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Grau Bernardo Cuenca, Horrocks Ian, Krötzsch Markus, Kupke Clemens, Magka Despoina, Motik Boris, and Wang Zhe. 2013. Acyclicity notions for existential rules and their application to query answering in ontologies. J. Artific. Intell. Res. 47 (2013), 741808. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Deutsch A., Nash A., and Remmel J.. 2008. The chase revisited. In Proceedings of the PODS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Dwork Cynthia. 2006. Differential privacy. In Proceedings of the ICALP. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Dwork Cynthia and Roth Aaron. 2014. The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9, 3&4 (Aug. 2014), 211407. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Fagin Ronald, Kolaitis Phokion G., Miller Renee J., and Popa Lucian. 2005. Data exchange: Semantics and query answering. Theor. Comput. Sci. 336, 1 (2005), 89124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Gogacz Tomasz and Marcinkowski Jerzy. 2015. The hunt for a red spider: Conjunctive query determinacy is undecidable. In Proceedings of the LICS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Gogacz Tomasz and Marcinkowski Jerzy. 2016. Red spider meets a rainworm: Conjunctive query finite determinacy is undecidable. In Proceedings of the PODS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Halevy Alon Y.. 2001. Answering queries using views: A survey. Very Large Data Base J. 10, 4 (2001), 270294. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Johnson David S. and Klug Anthony C.. 1984. Testing containment of conjunctive queries under functional and inclusion dependencies. J. Comput. Syst. Sci. 28, 1 (1984).Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Koutris Paraschos, Upadhyaya Prasang, Balazinska Magdalena, Howe Bill, and Suciu Dan. 2015. Query-based data pricing. J. ACM 62, 5 (2015). Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Li Chao, Li Daniel Yang, Miklau Gerome, and Suciu Dan. 2017. A theory of pricing private data. Commun. ACM 60, 12 (2017), 7986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Maier D., Mendelzon A. O., and Sagiv Y.. 1979. Testing implications of data dependencies. Trans. Database Syst. 4, 4 (1979), 455469. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Marnette B.. 2009. Generalized schema-mappings: From termination to tractability. In Proceedings of the PODS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Nash Alan and Deutsch Alin. 2007. Privacy in GLAV information integration. In Proceedings of the ICDT. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Nash Alan, Segoufin Luc, and Vianu Victor. 2010. Views and queries: Determinacy and rewriting. Trans. Database Syst. 35, 3 (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Onet A.. 2013. The chase procedure and its applications in data exchange. In Proceedings of the DEIS. 137.Google ScholarGoogle Scholar

Index Terms

  1. Balancing Expressiveness and Inexpressiveness in View Design

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Database Systems
      ACM Transactions on Database Systems  Volume 46, Issue 4
      December 2021
      169 pages
      ISSN:0362-5915
      EISSN:1557-4644
      DOI:10.1145/3492445
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 November 2021
      • Accepted: 1 September 2021
      • Revised: 1 May 2021
      • Received: 1 July 2020
      Published in tods Volume 46, Issue 4

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text

    HTML Format

    View this article in HTML Format .

    View HTML Format