-
Knowledge Graphs Evolution and Preservation -- A Technical Report from ISWS 2019
Authors:
Nacira Abbas,
Kholoud Alghamdi,
Mortaza Alinam,
Francesca Alloatti,
Glenda Amaral,
Claudia d'Amato,
Luigi Asprino,
Martin Beno,
Felix Bensmann,
Russa Biswas,
Ling Cai,
Riley Capshaw,
Valentina Anita Carriero,
Irene Celino,
Amine Dadoun,
Stefano De Giorgis,
Harm Delva,
John Domingue,
Michel Dumontier,
Vincent Emonet,
Marieke van Erp,
Paola Espinoza Arias,
Omaima Fallatah,
Sebastián Ferrada,
Marc Gallofré Ocaña
, et al. (49 additional authors not shown)
Abstract:
One of the grand challenges discussed during the Dagstuhl Seminar "Knowledge Graphs: New Directions for Knowledge Representation on the Semantic Web" and described in its report is that of a: "Public FAIR Knowledge Graph of Everything: We increasingly see the creation of knowledge graphs that capture information about the entirety of a class of entities. [...] This grand challenge extends this fur…
▽ More
One of the grand challenges discussed during the Dagstuhl Seminar "Knowledge Graphs: New Directions for Knowledge Representation on the Semantic Web" and described in its report is that of a: "Public FAIR Knowledge Graph of Everything: We increasingly see the creation of knowledge graphs that capture information about the entirety of a class of entities. [...] This grand challenge extends this further by asking if we can create a knowledge graph of "everything" ranging from common sense concepts to location based entities. This knowledge graph should be "open to the public" in a FAIR manner democratizing this mass amount of knowledge." Although linked open data (LOD) is one knowledge graph, it is the closest realisation (and probably the only one) to a public FAIR Knowledge Graph (KG) of everything. Surely, LOD provides a unique testbed for experimenting and evaluating research hypotheses on open and FAIR KG. One of the most neglected FAIR issues about KGs is their ongoing evolution and long term preservation. We want to investigate this problem, that is to understand what preserving and supporting the evolution of KGs means and how these problems can be addressed. Clearly, the problem can be approached from different perspectives and may require the development of different approaches, including new theories, ontologies, metrics, strategies, procedures, etc. This document reports a collaborative effort performed by 9 teams of students, each guided by a senior researcher as their mentor, attending the International Semantic Web Research School (ISWS 2019). Each team provides a different perspective to the problem of knowledge graph evolution substantiated by a set of research questions as the main subject of their investigation. In addition, they provide their working definition for KG preservation and evolution.
△ Less
Submitted 22 December, 2020;
originally announced December 2020.
-
Hihooi: A Database Replication Middleware for Scaling Transactional Databases Consistently
Authors:
Michael A. Georgiou,
Aristodemos Paphitis,
Michael Sirivianos,
Herodotos Herodotou
Abstract:
With the advent of the Internet and Internet-connected devices, modern business applications can experience rapid increases as well as variability in transactional workloads. Database replication has been employed to scale performance and improve availability of relational databases but past approaches have suffered from various issues including limited scalability, performance versus consistency…
▽ More
With the advent of the Internet and Internet-connected devices, modern business applications can experience rapid increases as well as variability in transactional workloads. Database replication has been employed to scale performance and improve availability of relational databases but past approaches have suffered from various issues including limited scalability, performance versus consistency tradeoffs, and requirements for database or application modifications. This paper presents Hihooi, a replication-based middleware system that is able to achieve workload scalability, strong consistency guarantees, and elasticity for existing transactional databases at a low cost. A novel replication algorithm enables Hihooi to propagate database modifications asynchronously to all replicas at high speeds, while ensuring that all replicas are consistent. At the same time, a fine-grained routing algorithm is used to load balance incoming transactions to available replicas in a consistent way. Our thorough experimental evaluation with several well-established benchmarks shows how Hihooi is able to achieve almost linear workload scalability for transactional databases.
△ Less
Submitted 22 March, 2020; v1 submitted 16 March, 2020;
originally announced March 2020.
-
Constructive Non-Linear Polynomial Cryptanalysis of a Historical Block Cipher
Authors:
Nicolas T. Courtois,
Marios Georgiou
Abstract:
One of the major open problems in symmetric cryptanalysis is to discover new specif i c types of invariant properties which can hold for a larger number of rounds of a block cipher. We have Generalised Linear Cryptanalysis (GLC) and Partitioning Cryptanalysis (PC). Due to double-exponential combinatorial explosion of the number of possible invariant properties systematic exploration is not possibl…
▽ More
One of the major open problems in symmetric cryptanalysis is to discover new specif i c types of invariant properties which can hold for a larger number of rounds of a block cipher. We have Generalised Linear Cryptanalysis (GLC) and Partitioning Cryptanalysis (PC). Due to double-exponential combinatorial explosion of the number of possible invariant properties systematic exploration is not possible and extremely few positive working examples of GLC are known. Our answer is to work with polynomial algebraic invariants which makes partitions more intelligible. We have developed a constructive algebraic approach which is about making sure that a certain combination of polynomial equations is zero. We work with an old block cipher from 1980s which has particularly large hardware complexity compared to modern ciphers e.g. AES. However all this complexity is not that useful if we are able to construct powerful non-linear invariants which work for any number of rounds. A key feature of our invariant attacks is that we are able to completely eliminate numerous state and key bits. We also construct invariants for the (presumably stronger) KT1 keys. Some of these lead to powerful ciphertext-only correlation attacks.
△ Less
Submitted 7 February, 2019;
originally announced February 2019.
-
Weak Keys and Cryptanalysis of a Cold War Block Cipher
Authors:
Marios Georgiou
Abstract:
T-310 is a cipher that was used for encryption of governmental communications in East Germany during the final years of the Cold War. Due to its complexity and the encryption process,there was no published attack for a period of more than 40 years until 2018 by Nicolas T. Courtois et al. in [10]. In this thesis we study the so called 'long term keys' that were used in the cipher, in order to expos…
▽ More
T-310 is a cipher that was used for encryption of governmental communications in East Germany during the final years of the Cold War. Due to its complexity and the encryption process,there was no published attack for a period of more than 40 years until 2018 by Nicolas T. Courtois et al. in [10]. In this thesis we study the so called 'long term keys' that were used in the cipher, in order to expose weaknesses which will assist the design of various attacks on T-310.
△ Less
Submitted 19 January, 2019;
originally announced January 2019.