Secure Data with relationships to public data

High Level Design Question.

I am working on a knowledge graph application specific for R&D organizations and there are basically 2 types of data: proprietary and public. The proprietary would be all the internally generated data and relationships while the public comes from open sources such as the patent database and journal articles.

If the there is only one entity than there is no concern, but what are the options is there are two clients and then there is a need to keep the proprietary data separate. The challenge is the public data and is it possible to have a layer of public data that is accessible by both and can have relationships to that data, but not available to other clients.
The goal is that there will be significant effort and data that resides in the public layer and replicating it for every client and maintaining it all the instances becomes problematic.
So is it possible within Neo4J to have security controlled access to certain data and shared access to others with the relationships to the public data also under security control?

For example: if client A has created a relationship to a patent 1234567 in their security space perhaps indicating that it is relevant for their business, could that relationship be hidden from other clients even if they can see patent 1234567 and the relationships it has in the public space such as prior art citations.

Andy

I suggest you look at the fine-grained access capabilities.

Not sure how Gary's recommendation works if you have an integrated multi-tenant solution with integrations like SCIM where you manage very little about the user.

Depending upon the system's complexity, and types of queries, you can implement a simple ReBAC model:

(:User) -[:worksFor]-> (:Organisation) -[:has]-> (:Object)

(you can add roles)

And your queries could start something like:

MATCH (u:User)-[:worksFor]->(:Organisation) 
  WHERE u.identifier = 'someuuid'
  // ... you can add your roles ...
  // ... query to find your object in the right org ...