Security Implications of Distributed Database Management System Models
|
|
|
- Theresa Henry
- 10 years ago
- Views:
Transcription
1 Security Implications of Distributed Database Management System Models 1 * Dr.C.Sunil Kumar, 2 J.Seetha, 3 S.R.Vinotha 1,2,3 Anna University, Chennai, India 1 [email protected], 2 [email protected], 3 [email protected] Abstract. Security features must be addressed when escalating a distributed database. The choice between the object oriented and the relational data model, several factors should be considered. The most important of these factors are single and multilevel access controls (MAC), protection and integrity maintenance. While determining which distributed database replica will be more secure for a particular function, the choice should not be made exclusively on the basis of available security features. One should also query the effectiveness and efficiency of the delivery of these characteristics. In this paper, the security strengths and weaknesses of both database models and the thorough problems initiate in the distributed environment are conversed. Keywords: DDBMS, RDBMS, CDBMS, Security, Integrity * Corresponding address: Dr.Charupalli Sunil Kumar, Dhanalakshmi College of Engineering, Anna University, Chennai, India, [email protected], Tel: Introduction As distributed networks become more accepted, the requirement for improvement in distributed database management systems becomes even more important [1]. A distributed system varies from a centralized system in one key respect: The data and often the control of the data are spread out over two or more physically separate locations. Distributed database management systems (DDBMS) are center to many security threats additional to those present in a centralized database management system (CDBMS). In addition, the expansion of sufficient distributed database security has been difficult by the relatively recent opening of the object-oriented database model. This new replica cannot be ignored. It has been created to address the growing difficulty of the data stored in present database systems. The development of relational database security procedures and standards is a more grown-up field than for the object-oriented model [9]. This is mainly due to the fact that object-oriented databases are relatively new [2]. The relative immaturity of the object-oriented model is particularly obvious in distributed applications. Incompatible standards are an example: Developers have not embraced a single set of standards for distributed object-oriented databases, while standards for relational databases are well established. One suggestion of this inequality is the inadequacy of controls in multilevel heterogeneous distributed object-oriented systems [3, 4].In this paper; in general will review the security concerns of databases and distributed databases in particular. The security problems found in both models will be examined and the security problems unique to each system will be examined. Finally, the comparison is 20
2 done relative merits of each model with respect to security. 2. DBMS Security Components 2.1 General Database Security Concerns The distributed database has all of the security apprehensions of a single-location database plus several additional problem areas. The investigation begins with a review of the security elements general to all database systems and those concerns specific to distributed systems. A secure database must satisfy the following requirements. It must have substantial integrity (protection from data loss caused by power failures or natural disasters), It must have logical integrity (protection of the logical structure of the database), It must be obtainable when needed, The system must have an review system, It must have fundamental integrity (accurate data), Access must be controlled to some degree depending on the kindliness of the data, A system must be in place to validate the users of the system, and Sensitive data must be protected from implication [8]. The following discussion focuses on requirements discussed above, since these security areas are directly affected by the choice of DBMS model. The key objective of these requirements is to ensure that data stored in the DBMS is protected from illegal examination, illegal modification, and from erroneous updates. This can be accomplished by using access controls, concurrency controls, updates using the twophase commit procedure and inference reduction strategies. The level of access limit depends on the sensitivity of the data and the degree to which the developer sticks to the principal of least benefit. Typically, a network is maintained in the DBMS that stores the access human rights of individual users. When a user logs on, the interface obtains the specific privileges for the user. The access permission may be predicated on the satisfaction of one or more of the following criteria: i. Availability of data: Unavailability of data is commonly caused by the locking of a particular data part by another subject, which forces the requesting subject to wait in a queue. ii. Adequacy of access: Only authorized users may analyze and or modify the data. In a single level system, this is relatively easy to implement. If the user is unauthorized, the operating system does not allow system access. On a multilevel system, access control is considerably more difficult to implement, because the DBMS must implement the optional access privileges of the user. iii. Assurance of authenticity: This includes the restriction of access to normal working hours to help ensure that the registered user is authentic. It also includes a usage analysis which is used to determine if the current use is consistent with the needs of the registered user, thereby reducing the probability of an inference attack. Concurrency controls help to ensure the integrity of the data. These controls normalize the manner in which the data is used when more than one user is using the same data part. These are particularly important in the effective management of a distributed system, because, in many cases, no single DBMS controls data access. If effective concurrency controls are not integrated into the distributed system, several problems can arise. The three possible sources of concurrency problems are identified: (1) Lost update: A successful update was accidentally erased by another user. (2) Unsynchronized transactions that break integrity constraints. (3) Unrepeatable read: Data retrieved is erroneous because it 21
3 was obtained during an update. Each of these problems can be reduced or eliminated by implementing a suitable locking method or a timestamp method. Special problems exist for a DBMS that has multilevel access. In a multilevel access system, users are limited from having complete data access. Policies restricting user access to certain data parts may result from secrecy requirements, or they may result from loyalty to the principal of least privilege (a user only has access to relevant information). Access policies for multilevel systems are typically referred to as either open or closed. In an open system, all the data is considered unclassified unless access to a particular data element is expressly prohibited. A closed system is just the opposite. In this case, access to all data is prohibited unless the user has specific access privileges. Classification of data parts is not a simple job. This is due, in part, to contradictory goals. The first goal is to provide the database user with access to all non-sensitive data. The second goal is to protect sensitive data from unauthorized inspection. Another problem is data security classification. There is no clear-cut way to classify data. the complexity of the problem are demonstrated: They state that when classifying a data part, there are three proportions: The data may be confidential The existence of the data may be confidential The reason for classifying the data may be confidential The first dimension is the easiest to handle. Access to a classified data item is simply starved of. The other two dimensions require more thought and more creative strategies. For example, if an unauthorized user requests a data item whose existence is classified, how does the system respond? A poorly planned response would allow the user to make inferences about the data that would potentially compromise it. Protection from inference is one of the unsolved problems in secure multilevel database design. Several inference protection strategies are listed. These include data suppression, logging every move users make, and perturbation of data. the only practical strategy for the distributed environment that maintains data accuracy is suppression will be discussed later. 2.2 Security Problems Unique to DDBMS Centralized or Decentralized Approval In developing a distributed database, one of the first questions to answer is where to grant system access. The two strategies are outlined: (1) Users are granted system access at their home location. (2) Users are granted system access at the remote location. The first case is easier to handle. It is no harder to implement than a centralized access strategy. The success of this strategy depends on reliable communication between the different locations (the remote location must receive all of the necessary authorized information). Since many different locations can grant access, the probability of unauthorized access increases. Once one location has been compromised, the entire system is compromised. If each location maintains access control for all users, the impact of the compromise of a single location is reduced. The second strategy, while possibly more secure, has several disadvantages. Probably the most obvious is the additional processing overhead required, particularly if the given process requires the participation of several locations. Furthermore, the maintenance of replicated clearance tables is computationally expensive and more prone to error. Finally, the replication of passwords, even though they're encrypted, increases the risk of theft. A third possibility is to centralize the granting of access privileges at nodes called policy servers. These servers are arranged in a network. When a policy server receives a request for access, all members of the network determine whether to authorize the access of the 22
4 user. It is believed that separating the approval system from the application interface reduces the likelihood of compromise. Integrity The protection of integrity is much harder in a heterogeneous distributed database than in a homogeneous one. The degree of central control states the level of difficulty with integrity constraints. The homogeneous distributed database has strong central control and has identical DBMS schema. If the nodes in the distributed network are heterogeneous, several problems can occur that will intimidate the integrity of the distributed data. They list three problem areas: contradictions between local integrity constraints Difficulties in specifying worldwide integrity constraints Inconsistencies between local and global limitations The local integrity constraints are clear to differ in a heterogeneous distributed database. The differences curtail from differences in the individual institutions. These inconsistencies can cause problems, particularly with difficult queries that rely on more than one database. Development of global integrity constraints can abolish conflicts between individual databases. Yet these are not always easy to implement. Global integrity constraints on the other hand are separated from the individual organizations. It may not always be realistic to change the organizational structure in order to make the distributed database consistent. Ultimately, this will lead to inconsistencies between local and global constraints. Conflict resolution depends on the level of central control. If there is strong global control, the global integrity constraints will take priority. If central control is weak, local integrity constraints will. 3. Relational Database Protection 3.1 Security Concerns Access Controls The most ordinary form of access control in a relational database is the view. The view is a logical table, which is created with the SQL VIEW command. This table contains data from the database obtained by additional SQL commands such as JOIN and SELECT. If the database is unclassified, the source for the view is the entire database. If, on the other hand, the database is subject to multilevel classification, then the source for the view is that subset of the database that is at or below the classification level of the user. Users can read or modify data in their view, but the view prohibits users from accessing data at a classification level above their own. In fact, if the view is properly designed, a user at a lower classification level will be unaware that data exists at a higher classification level. Classification of data and development of legal views become much more complex when the security goal includes the reduction of the threat of inference attacks. Implication is typically made from data at a lower classification level that has been derived from higher level data. The key to this relationship is the derivation rule, which is defined as the operation that creates the derived data. A derivation rule also specifies the access class of the derived data. To reduce the potential for inference, however, the data elements that are inputs to the derivation must be examined to determine whether one or more of these elements are at the level of the derived data. If this is the case, no inference problem exists. If, however, all the elements are at a lower level than the derived data, then one or more of the derivation inputs must be promoted to a higher classification level. The use of classification constraints to counter implication, beyond the protections provided by the view, requires additional computation. One way that constraint processing can be implemented is discussed. In their model, constraints are processed in three phases. Some constraints are processed during design (these may be updated later), others are processed when the database is queried to authorize access 23
5 and counter inference, and many are processed during the update phase. Their strategy relies on two implication engines, one for query processing and one for update processing. Essentially, the implication engines are middlemen, which operate between the DBMS and the interface (see Figure 1). Figure 1. Constraint processing The two implication engines work by evaluating the current task according to a set of rules and determining a course of act. The implication engine for updates dynamically revises the security constraints of the database as the security conditions of the organization change and as the security characteristics of the data stored in the database change. The implication engine for query processing evaluates each entity requested in the query, all the data released in a specific period that is at the security level of the current query, and relevant data available externally at the same security level. This is called the knowledge base. The processor evaluates the potential inferences from the union of the knowledge base and the query s potential response. If the user s security level dominates the security levels of all of the potential inferences, the response is allowed. The integrity constraints in the relational model can be divided into two categories: (1) implied constraints and (2) open constraints. Implied constraints which include domain, relational, and referential constraints enforce the rules of the relational model. Open constraints impose the rules of the organization served by the DBMS. As such, Open constraints are one of the two key elements of security protection in the relational replica. Global Views As in the centralized relational database, access control in the distributed environment is gifted with the view. Instead of developing the view from local relations, it is developed from the global relations of the distributed database. Accordingly, it is referred to as a global view. The view mechanism is even more important in the distributed environment because the problem is typically more complex and while centralized databases may not be maintained as multilevel access systems, a distributed database is more likely to require the control of information. Although global views are successful at data control and to a lesser extent at implication protection, their use can be computationally costly. One of the key problems with a relational distributed database is the computation required to execute a complex query. Since each view is unique, a different query is necessary for each view. This additional transparency is partially balance by query optimizers. Nonetheless, the addition of global views adds computing time to a process that already takes too long. In an effort to provide additional implication protection beyond the global view, it extends their classification constraint processing model to the distributed environment. As with the centralized model, implication engines are added to the standard distributed database architecture at each location. Their model assumes that the distributed database is homogeneous. In this case, the implication engines at the 24
6 user's location processes the query and update constraints. Only a small amount of overhead is added. If the distributed database is heterogeneous, however, then the processing overhead would be prohibitively expensive since the implication engines at each location involved in the action would need to process the security constraints for all the local data. Considering the processing demands already in place in a relational database management system (RDBMS), this appears to be impractical. 4. Object-Oriented Database Security 4.1 Object-Oriented Databases While it is not the aim of this paper to present a detailed description of the object-oriented model, the reader may be unfamiliar with the fundamentals of an object-oriented database. For this reason, a brief look at the object-oriented model s basic structure is viewed. The basic element of an object-oriented database is the object. An object is defined by a class. In essence, classes are the blueprints for objects. In the object-oriented model, classes are arranged in a hierarchy. The root class is found at the top of the hierarchy. This is the parent class for all other classes in the model. We say that a class that is the descendent from a parent inherits the properties of the parent class. As needed, these properties can be modified and extended in the descendent class. An object is composed of two basic elements: variables and methods. An object holds three basic variables types: (1) Object class: This variable keeps a record of the parent class that defines the object. (2) Object ID (OID): A record of the specific object instance. The OID is also kept in an OID table. The OID table provides a map for finding and accessing data in the object-oriented database. It is seen that it also has special significance in creating a secure database. (3) Data stores: These variables store data in much the same way that attributes store data in a relational tuple. Methods are the actions that can be performed by the object and the actions that can be performed on the data stored in the object variables. Methods perform two basic functions: They communicate with other objects and they perform reads and updates on the data in the object. Methods communicate with other objects by sending messages. When a message is sent to an object, the receiving object creates a subject. Subjects execute methods; objects do not. If the subject has suitable clearance, the message will cause the subject to execute a method in the receiving object. Often, when the action at the called object ends, the subject will execute a method that sends a message to the calling object indicating that the action has ended. Methods perform all reading and writing of the data in an object. For this reason, the data is encapsulated in the object. This is one of the important differences between object-oriented and relational databases. All control for access, modification, and integrity start at the object level. For example, if no method exists for updating a particular object's variable, then the value of that variable is constant. Any change in this condition must be made at the object level. See Figure 2 for a schematic view of the objectoriented model. 25
7 Figure 2. The object-oriented model. 4.2 Security Issues Access Controls As with the relational model, access is controlled by classifying elements of the database. The basic element of this classification is the object. Access permission is granted if the user has sufficient security clearance to access the methods of an object. It describes a security model that effectively explains the access control concepts in the object-oriented model. Their model is based on six security properties: Property 1 (Hierarchy Property). The level of an object must control that of its class object. Property 2 (Subject Level Property). The security level of a subject dominates the level of the invoking subject and it also dominates the level of the home object. Property 3 (Object Locality Property). A subject can execute methods or read or write variables only in its home object. Property 4 (Property) A subject may write into its home object only if its security is equal to that of the object. Property 5 (Return value property) A subject can send a return value to its invoking subject only if it is at the same security level as the invoking subject. Property 6 (Object creation property) the security level of a newly-created object dominates the level of the subject that requested the creation Integrity As with classification constraints, integrity constraints are also executed at the object level. These constraints are similar to the explicit constraints used in the relational model. The difference is in execution. An object-oriented database maintains integrity before and after an update by executing constraint checking methods on the affected objects. A relational DBMS takes a more global approach [5]. One of the benefits of encapsulation is that subjects from remote objects do not have access to a called object's data. This is a real advantage that is not present in the relational DBMS. It is noted that an object oriented system derives a significant benefit to database integrity from encapsulation. This benefit stems from modularity. Since the objects are encapsulated, an object can be changed without affecting the data in another object. So, the process that contaminated one element is less likely to affect another element of the database. There are many obstacles to the successful implementation of a distributed object-oriented database. The association of the object-oriented DDBMS is more complex than the relational DDBMS. In a relational DDBMS, the role of client and server is maintained. This makes the development of multilevel 26
8 access controls easier. Since the roles of client and server are not well defined in the object-oriented model, control of system access and multilevel access is more difficult. System access control for the object-oriented DDBMS can be handled at the host location in a procedure similar to that described for the relational DDBMS. Since there is no clear definition of client and server, however, the use of replicated multisite approval would be impractical. Multilevel access control problems arise when developing effective and efficient authorization algorithms for subjects that need to send messages to multiple objects across several geographically separate locations. There are currently no universally accepted means for enforcing subject authorization in a pure object-oriented distributed environment. This means that, while individual members have developed their own authorization systems, there is no pure object-oriented vendor-independent standard which allows object-oriented database management systems (OODBMS) from different vendors (a heterogeneous distributed system) to communicate in a secure manner. Without subject authorization, the controls described in the previous section cannot be enforced. Since inheritance allows one object to inherit the properties of its parent, the database is easily compromised. So, without effective standards, there is no way to enforce multilevel classification. It is noted that one standard does exist, called OSF DCE (Open Software Foundation's Distributed Computing Environment), that is vendor-independent, but is not strictly an object-oriented database standard. While it does provide subject authorization, it treats the distributed object environment as a client/server environment as is done in the relational model. The major integrity concern in a distributed environment that is not a concern in the centralized database is the distribution of individual objects [6]. Recall that a RDBMS allows the fragmentation of tables across sites in the system. It is less desirable to allow the fragmentation of objects because this can break encapsulation. For this reason, fragmentation should be explicitly forbidden with an integrity constraint. 6. Conclusion Database security issues are discussed in general and how the database model affects database system security in particular. It has seen that security protections for OODBMS and RDBMS are quite different. Each replica has important strengths and weaknesses. Currently, the RDBMS is the better choice for a distributed application. This is due to the relative maturity of the relational model and the existence of universally accepted standards. The recent emergences of mixture models that combine the features of the two models discussed raise many new security questions. For example, Informix s Illustra combines a relational database schema with the capability to store and query complex data types [7]. They call this system an object-relational database. They include subject authorization strategies for heterogeneous distributed systems, inference prevention strategies for both centralized and distributed database systems, and distributed object-oriented database security standards. Acknowledgements The author would like to express their sincere gratitude to the Management of Dhanalakshmi College of Engineering, Chennai for their constant encouragement and co-operation. References : [1] Bell, David and Jane Grisom, Distributed Database Systems. Workinham, England: Addison Wesley, [2] Bertino, Elisa, Data Hiding and Security in Object-Oriented Databases, In proceedings Eighth International Conference on Data Engineering, , February [3] Denning, Dorothy E. et al., Views for Multilevel Database Security, In IEEE Transactions on Software Engineering, vse-13 n2, pp , February [4] Denning, Dorothy. E. et al., A Multilevel Relational Data Model. In Proceedings IEEE Symposium 27
9 on Security and Privacy, pp ,1987. [5] Haigh, J. T. et al., The LDV Secure Relational DBMS Model, In Database Security, IV: Status and Prospects, S. Jajodia and C.E. Landwehr eds., pp , North Holland: Elsevier, [6] Herbert, Andrew, Distributing Objects, In Distributed Open Systems, F.M.T. Brazier and D. Johansen eds., pp , Los Alamitos: IEEE Computer Press, [7] Illustra Object Relational Database Management System, Informix white paper from the Illustra Document Database, [8] Jajodia, Sushil and Ravi Sandhu, Polyinstantiation Integrity in Multilevel Relations, In Proceedings IEEE Symposium on Research in Security and Privacy, pp , [9] Millen, Jonathan K., Teresa F. Lunt, Security for Object-oriented Database Systems, In Proceedings IEEE Symposium on Research in Security and Privacy, pp ,1992. Biography Dr. C.Sunil Kumar did his B.E (CSE) degree from University of Madras, in 1998, M.Tech (CSE) degree from SRM University, Chennai, India, in 2005 and Ph.D (C.S.E) from J TUH, Kukatpally, Hyderabad in 2012 in the area of Distributed Databases: a Case Study on Healthcare Information Systems. Currently, he is Professor & HOD in Computer Science & Engineering Department, Dhanalakshmi college of Engineering, Chennai, India. He has guided more than 40 B.Tech and M.Tech projects. He has contributed 22 Research Publications at International/National Journals and Conferences. His research interests are Distributed Databases, Object Oriented Technologies and Information Free download this article and more information 28
SECURITY MODELS FOR OBJECT-ORIENTED DATA BASES
82-10-44 DATA SECURITY MANAGEMENT SECURITY MODELS FOR OBJECT-ORIENTED DATA BASES James Cannady INSIDE: BASICS OF DATA BASE SECURITY; Discretionary vs. Mandatory Access Control Policies; Securing a RDBMS
Concepts of Database Management Seventh Edition. Chapter 7 DBMS Functions
Concepts of Database Management Seventh Edition Chapter 7 DBMS Functions Objectives Introduce the functions, or services, provided by a DBMS Describe how a DBMS handles updating and retrieving data Examine
TRANSMAT Trusted Operations for Untrusted Database Applications
TRANSMAT Trusted Operations for Untrusted Database s Dan Thomsen Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113, USA email: [email protected] Abstract This paper presents a technique
Objectives. Distributed Databases and Client/Server Architecture. Distributed Database. Data Fragmentation
Objectives Distributed Databases and Client/Server Architecture IT354 @ Peter Lo 2005 1 Understand the advantages and disadvantages of distributed databases Know the design issues involved in distributed
Database and Data Mining Security
Database and Data Mining Security 1 Threats/Protections to the System 1. External procedures security clearance of personnel password protection controlling application programs Audit 2. Physical environment
DATABASE SECURITY, INTEGRITY AND RECOVERY
DATABASE SECURITY, INTEGRITY AND RECOVERY DATABASE SECURITY, INTEGRITY AND RECOVERY Database Security and Integrity Definitions Threats to security and integrity Resolution of problems DEFINITIONS SECURITY:
chapater 7 : Distributed Database Management Systems
chapater 7 : Distributed Database Management Systems Distributed Database Management System When an organization is geographically dispersed, it may choose to store its databases on a central database
Distributed Database Management Systems for Information Management and Access
464 Distributed Database Management Systems for Information Management and Access N Geetha Abstract Libraries play an important role in the academic world by providing access to world-class information
B.Com(Computers) II Year DATABASE MANAGEMENT SYSTEM UNIT- V
B.Com(Computers) II Year DATABASE MANAGEMENT SYSTEM UNIT- V 1 1) What is Distributed Database? A) A database that is distributed among a network of geographically separated locations. A distributed database
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
How Can Data Sources Specify Their Security Needs to a Data Warehouse?
How Can Data Sources Specify Their Security Needs to a Data Warehouse? Arnon Rosenthal The MITRE Corporation [email protected] Edward Sciore Boston College (and MITRE) [email protected] Abstract In current warehouse
Database security. André Zúquete Security 1. Advantages of using databases. Shared access Many users use one common, centralized data set
Database security André Zúquete Security 1 Advantages of using databases Shared access Many users use one common, centralized data set Minimal redundancy Individual users do not have to collect and maintain
14 Databases. Source: Foundations of Computer Science Cengage Learning. Objectives After studying this chapter, the student should be able to:
14 Databases 14.1 Source: Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: Define a database and a database management system (DBMS)
1 File Processing Systems
COMP 378 Database Systems Notes for Chapter 1 of Database System Concepts Introduction A database management system (DBMS) is a collection of data and an integrated set of programs that access that data.
An Overview of Distributed Databases
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 207-214 International Research Publications House http://www. irphouse.com /ijict.htm An Overview
Polyinstantiation in Relational Databases with Multilevel Security
Polyinstantiation in Relational Databases with Multilevel Security Andro Galinovi King ICT d.o.o., Buzinski prilaz 10, 10010 Zagreb, Croatia E-mail: [email protected] Vlatka Anton i University
Trusted RUBIX TM. Version 6. Multilevel Security in Trusted RUBIX White Paper. Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM TEL +1-202-412-0152
Trusted RUBIX TM Version 6 Multilevel Security in Trusted RUBIX White Paper Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM Infosystems Technology, Inc. 4 Professional Dr - Suite 118 Gaithersburg, MD
Database Management. Chapter Objectives
3 Database Management Chapter Objectives When actually using a database, administrative processes maintaining data integrity and security, recovery from failures, etc. are required. A database management
Oracle Database Security
breaking through barriers to progress By Raman Jathar an award winning '2004 Future 50 Company' 18650 W. Corporate Drive Suite 120 Brookfield, WI 53045 262.792.0200 Database Security Lately, database security
Distributed Databases
Distributed Databases Chapter 1: Introduction Johann Gamper Syllabus Data Independence and Distributed Data Processing Definition of Distributed databases Promises of Distributed Databases Technical Problems
Computer Security (EDA263 / DIT 641)
Computer Security (EDA263 / DIT 641) Lecture 12: Database Security Erland Jonsson Department of Computer Science and Engineering Chalmers University of Technology Sweden Outline Introduction to databases
5-Layered Architecture of Cloud Database Management System
Available online at www.sciencedirect.com ScienceDirect AASRI Procedia 5 (2013 ) 194 199 2013 AASRI Conference on Parallel and Distributed Computing and Systems 5-Layered Architecture of Cloud Database
Database Security. Soon M. Chung Department of Computer Science and Engineering Wright State University [email protected].
Database Security Soon M. Chung Department of Computer Science and Engineering Wright State University [email protected] 937-775-5119 Goals of DB Security Integrity: Only authorized users should be
Distributed Architectures. Distributed Databases. Distributed Databases. Distributed Databases
Distributed Architectures Distributed Databases Simplest: client-server Distributed databases: two or more database servers connected to a network that can perform transactions independently and together
VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203.
VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year & Semester : II / III Section : CSE - 1 & 2 Subject Code : CS 6302 Subject Name : Database
CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University
CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure
Overview RDBMS-ORDBMS- OODBMS
Overview RDBMS-ORDBMS- OODBMS 1 Database Models Transition Hierarchical Data Model Network Data Model Relational Data Model ER Data Model Semantic Data Model Object-Relational DM Object-Oriented DM 2 Main
Technical Proposition. Security
Technical Proposition ADAM Software NV The global provider of media workflow and marketing technology software ADAM Software NV adamsoftware.net [email protected] Why Read this Technical Proposition?
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Access Control Models Part I. Murat Kantarcioglu UT Dallas
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Models Part I Murat Kantarcioglu UT Dallas Introduction Two main categories: Discretionary Access Control Models (DAC) Definition:
TECHNIQUES FOR DATA REPLICATION ON DISTRIBUTED DATABASES
Constantin Brâncuşi University of Târgu Jiu ENGINEERING FACULTY SCIENTIFIC CONFERENCE 13 th edition with international participation November 07-08, 2008 Târgu Jiu TECHNIQUES FOR DATA REPLICATION ON DISTRIBUTED
Database Security and Authorization
Database Security and Authorization 1 Database Security and Authorization 1.1 Introduction to Database Security Issues 1.2 Types of Security 1.3 Database Security and DBA 1.4 Access Protection, User Accounts,
Data Mining Techniques for Banking Applications
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 4, April 2015, PP 15-20 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Data
B.Sc (Computer Science) Database Management Systems UNIT-V
1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used
ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.
ORACLE DATABASE SECURITY Cristina-Maria Titrade 1 Abstract This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
Chapter 8 A secure virtual web database environment
Chapter 8 Information security with special reference to database interconnectivity Page 146 8.1 Introduction The previous three chapters investigated current state-of-the-art database security services
Evolution of Distributed Database Management System
Evolution of Distributed Database Management System During the 1970s, corporations implemented centralized database management systems to meet their structured information needs. Structured information
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS
THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS David L. Spooner Computer Science Department Rensselaer Polytechnic Institute Troy, New York 12180 The object-oriented programming
Concepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches
Concepts of Database Management Seventh Edition Chapter 9 Database Management Approaches Objectives Describe distributed database management systems (DDBMSs) Discuss client/server systems Examine the ways
Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006
Oracle Database Security Nathan Aaron ICTN 4040 Spring 2006 Introduction It is important to understand the concepts of a database before one can grasp database security. A generic database definition is
Chapter 3. Database Environment - Objectives. Multi-user DBMS Architectures. Teleprocessing. File-Server
Chapter 3 Database Architectures and the Web Transparencies Database Environment - Objectives The meaning of the client server architecture and the advantages of this type of architecture for a DBMS. The
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
Security in Database Systems
Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
DATABASE MANAGEMENT SYSTEM
REVIEW ARTICLE DATABASE MANAGEMENT SYSTEM Sweta Singh Assistant Professor, Faculty of Management Studies, BHU, Varanasi, India E-mail: [email protected] ABSTRACT Today, more than at any previous
Division of IT Security Best Practices for Database Management Systems
Division of IT Security Best Practices for Database Management Systems 1. Protect Sensitive Data 1.1. Label objects containing or having dedicated access to sensitive data. 1.1.1. All new SCHEMA/DATABASES
4-06-60 DBMS Recovery Procedures Frederick Gallegos Daniel Manson
4-06-60 DBMS Recovery Procedures Frederick Gallegos Daniel Manson Payoff When a DBMS crashes, all or a portion of the data can become unusable, Appropriate procedures must be followed to restore, validate,
Distributed Databases in a Nutshell
Distributed Databases in a Nutshell Marc Pouly [email protected] Department of Informatics University of Fribourg, Switzerland Priciples of Distributed Database Systems M. T. Özsu, P. Valduriez Prentice
Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn
Best Practices, Procedures and Methods for Access Control Management Michael Haythorn July 13, 2013 Table of Contents Abstract... 2 What is Access?... 3 Access Control... 3 Identification... 3 Authentication...
Using SAS as a Relational Database
Using SAS as a Relational Database Yves DeGuire Statistics Canada Come out of the desert of ignorance to the OASUS of knowledge Introduction Overview of relational database concepts Why using SAS as a
Modern Databases. Database Systems Lecture 18 Natasha Alechina
Modern Databases Database Systems Lecture 18 Natasha Alechina In This Lecture Distributed DBs Web-based DBs Object Oriented DBs Semistructured Data and XML Multimedia DBs For more information Connolly
Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill
Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill CSE 367 Independent Study Final Project Report Prof. Steve Demurjian December, 13 2001 Hui Wang Lisa
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
DATABASE SECURITY - ATTACKS AND CONTROL METHODS
DATABASE SECURITY - ATTACKS AND CONTROL METHODS Emil BURTESCU 1 PhD, Associate Professor, Department of Accounting and Management Informatics, University of Pitesti, Pitesti, Romania E-mail: [email protected],
RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER
RaySafe S1 SECURITY WHITEPAPER Contents 1. INTRODUCTION 2 ARCHITECTURE OVERVIEW 2.1 Structure 3 SECURITY ASPECTS 3.1 Security Aspects for RaySafe S1 Data Collector 3.2 Security Aspects for RaySafe S1 cloud-based
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
When an organization is geographically dispersed, it. Distributed Databases. Chapter 13-1 LEARNING OBJECTIVES INTRODUCTION
Chapter 13 Distributed Databases LEARNING OBJECTIVES After studying this chapter, you should be able to: Concisely define each of the following key terms: distributed database, decentralized database,
How to Choose Between Hadoop, NoSQL and RDBMS
How to Choose Between Hadoop, NoSQL and RDBMS Keywords: Jean-Pierre Dijcks Oracle Redwood City, CA, USA Big Data, Hadoop, NoSQL Database, Relational Database, SQL, Security, Performance Introduction A
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation
Chapter 2. Data Model. Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel
Chapter 2 Data Model Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel 1 In this chapter, you will learn: Why data models are important About the basic data-modeling
Database Systems Introduction Dr P Sreenivasa Kumar
Database Systems Introduction Dr P Sreenivasa Kumar Professor CS&E Department I I T Madras 1 Introduction What is a Database? A collection of related pieces of data: Representing/capturing the information
Distributed Databases. Concepts. Why distributed databases? Distributed Databases Basic Concepts
Distributed Databases Basic Concepts Distributed Databases Concepts. Advantages and disadvantages of distributed databases. Functions and architecture for a DDBMS. Distributed database design. Levels of
Database Replication with Oracle 11g and MS SQL Server 2008
Database Replication with Oracle 11g and MS SQL Server 2008 Flavio Bolfing Software and Systems University of Applied Sciences Chur, Switzerland www.hsr.ch/mse Abstract Database replication is used widely
Object Oriented Databases (OODBs) Relational and OO data models. Advantages and Disadvantages of OO as compared with relational
Object Oriented Databases (OODBs) Relational and OO data models. Advantages and Disadvantages of OO as compared with relational databases. 1 A Database of Students and Modules Student Student Number {PK}
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS Manying Qiu, Virginia State University, [email protected] Steve Davis, Clemson University, [email protected] ABSTRACT People considering improvements in database
United States Citizenship and Immigration Services (USCIS) Enterprise Service Bus (ESB)
for the United States Citizenship and Immigration Services (USCIS) June 22, 2007 Contact Point Harry Hopkins Office of Information Technology (OIT) (202) 272-8953 Reviewing Official Hugo Teufel III Chief
Database System Architecture & System Catalog Instructor: Mourad Benchikh Text Books: Elmasri & Navathe Chap. 17 Silberschatz & Korth Chap.
Database System Architecture & System Catalog Instructor: Mourad Benchikh Text Books: Elmasri & Navathe Chap. 17 Silberschatz & Korth Chap. 1 Oracle9i Documentation First-Semester 1427-1428 Definitions
Extended RBAC Based Design and Implementation for a Secure Data Warehouse
Extended RBAC Based Design and Implementation for a Data Warehouse Dr. Bhavani Thuraisingham The University of Texas at Dallas [email protected] Srinivasan Iyer The University of Texas
ISSN: 2321-7782 (Online) Volume 3, Issue 7, July 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 7, July 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements
Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements Sebastian Staamann, Director Security Products, PrismTech OMG's Eighth Workshop on Distributed Object
Distributed Databases
C H A P T E R 12 Distributed Databases Learning Objectives After studying this chapter, you should be able to: Concisely define the following key terms: distributed database, decentralized database, location
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY
CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY 2.1 Introduction In this chapter, I am going to introduce Database Management Systems (DBMS) and the Structured Query Language (SQL), its syntax and usage.
ITM661 Database Systems. Database Security and Administration
ITM661 Database Systems Database Security and Administration Outline Introduction to Database Security Issues Types of Security Threats to databases Database Security and DBA Access Protection, User Accounts,
IT OUTSOURCING SECURITY
IT OUTSOURCING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]
INFORMATION SYSTEMS SPECIALIST 8 1488
INFORMATION SYSTEMS SPECIALIST 8 1488 SERIES DESCRIPTION The INFORMATION SYSTEMS SPECIALIST (ISS) classification series has eight levels that describe technical and professional non-supervisory positions
ISM 318: Database Systems. Objectives. Database. Dr. Hamid R. Nemati
ISM 318: Database Systems Dr. Hamid R. Nemati Department of Information Systems Operations Management Bryan School of Business Economics Objectives Underst the basics of data databases Underst characteristics
A Multidatabase System as 4-Tiered Client-Server Distributed Heterogeneous Database System
A Multidatabase System as 4-Tiered Client-Server Distributed Heterogeneous Database System Mohammad Ghulam Ali Academic Post Graduate Studies and Research Indian Institute of Technology, Kharagpur Kharagpur,
Enhanced Model of SQL Injection Detecting and Prevention
Enhanced Model of SQL Injection Detecting and Prevention Srinivas Baggam, Assistant Professor, Department of Computer Science and Engineering, MVGR College of Engineering, Vizianagaram, India. [email protected]
International Journal on Recent and Innovation Trends in Computing and Communication ISSN 2321 8169. Volume: 1 Issue: 1 23 28 DATABASE SECURITY
DATABASE SECURITY Kamaljeet Kaur Computer Science & Engineering Department Guru Nanak Dev Engg. College, Ludhiana. Punjab-India [email protected] Abstract Ensuring the security of databases is a complex
SOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems
SOFT 437 Software Performance Analysis Ch 5:Web Applications and Other Distributed Systems Outline Overview of Web applications, distributed object technologies, and the important considerations for SPE
Secure Cloud Transactions by Performance, Accuracy, and Precision
Secure Cloud Transactions by Performance, Accuracy, and Precision Patil Vaibhav Nivrutti M.Tech Student, ABSTRACT: In distributed transactional database systems deployed over cloud servers, entities cooperate
Computer Security (EDA263 / DIT 641)
Computer Security (EDA263 / DIT 641) Lecture in EDA263: Database Security Erland Jonsson Department of Computer Science and Engineering Chalmers University of Technology Sweden Outline Introduction to
ADDING A NEW SITE IN AN EXISTING ORACLE MULTIMASTER REPLICATION WITHOUT QUIESCING THE REPLICATION
ADDING A NEW SITE IN AN EXISTING ORACLE MULTIMASTER REPLICATION WITHOUT QUIESCING THE REPLICATION Hakik Paci 1, Elinda Kajo 2, Igli Tafa 3 and Aleksander Xhuvani 4 1 Department of Computer Engineering,
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
A Study on Security and Privacy in Big Data Processing
A Study on Security and Privacy in Big Data Processing C.Yosepu P Srinivasulu Bathala Subbarayudu Assistant Professor, Dept of CSE, St.Martin's Engineering College, Hyderabad, India Assistant Professor,
