38
DISTRIBUTED DATABASE SECURITY Prepared by :- 1) Mohammed Siddig Ahmed. 2) Omer Salih Dawood. 3) Mohammed zein. “STATE-OF-THE-ART”

DISTRIBUTED DATABASE

Embed Size (px)

Citation preview

Page 1: DISTRIBUTED DATABASE

DISTRIBUTED DATABASE SECURITY

Prepared by :-1) Mohammed Siddig Ahmed.2) Omer Salih Dawood.3) Mohammed zein.

“STATE-OF-THE-ART”

Page 2: DISTRIBUTED DATABASE

introduction

– The developments in computer networking technology and database systems technology resulted in the development of distributed databases in the late 1970s.

– There are various architectural for a distributed database systems :-

1. the control is centralized while the data is distributed.2. the data as well as control are distributed.3. Multidatabase architectures .4. non-multidatabase approach(no local database

management systems (DBMSs))

Page 3: DISTRIBUTED DATABASE

Multilevel Security

• Much of the work in secure distributed database systems has focused on multilevel security.

• the early work in the field began with the US. Air Force Summer Study .

• approaches based on distributed data and centralized control architectures were proposed.

• Prototypes based on these approaches were also developed during the late 1980s and early 1990s

Page 4: DISTRIBUTED DATABASE

Multilevel Security Con.

• Two approaches were proposed at the Summer Study:-– the Partitioned approach .• trusted front-end database system is connected to non-

trusted back-end.

– second approach was examined where data is replicated.• In this approach, the unclassified data is replicated at

the Secret and Top-Secret databases, and the Secret data is replicated at the Top-Secret database

Page 5: DISTRIBUTED DATABASE

Inference Problem

• This problem has been discussed a great deal over the past three decades.

• An extensive investigation of the inference problem for distributed database systems began around 1992.

• There is still work on this problem especially with emerging technologies such as data warehousing, data mining and the web.

Page 6: DISTRIBUTED DATABASE

Hippocratic databases

• During the late of 1990s and early and mid of 2000s .

• These databases are designed such that data collection and disclosure are only performed with the consent of the user who’s data is in question.

Page 7: DISTRIBUTED DATABASE

trusted mediator

• At the same time the trusted mediator databases has received a great deal of attention

• the TIHI (Trusted Interoperation of Healthcare Information) project uses a trusted mediator to determine which queries should or should not be allowed .– several commercial systems.

• Google Health.• Microsoft HealthVault,

Page 8: DISTRIBUTED DATABASE

Blind comparer

• During the mid and late of 2000s .• share privacy-sensitive data across distinct

organizations.• allowing organizations to keep their legacy

databases and maintain ownership of the data that they currently store

Page 9: DISTRIBUTED DATABASE

Blind comparer

Page 10: DISTRIBUTED DATABASE

Improve Blind comparer

• On the late of 2000s.• to make the blind comparer more secure it

was better to use fake queries and declassification techniques

Page 11: DISTRIBUTED DATABASE

FEDERATED DATABASE SECURITY

“STATE OF THE ART”

Page 12: DISTRIBUTED DATABASE

• Introduction.• A federated database system .• Characteristics of Federated Database

Systems :Distribution.Heterogeneity .Autonomy .

Page 13: DISTRIBUTED DATABASE

Multidatabase systems can be classified into two types based on the autonomy

Page 14: DISTRIBUTED DATABASE

• Five-level Schema Architecture for Federated Databases: Local schema . Component schema. Export schema . Federated schema .

External schema . • Federated Database Security:

Page 15: DISTRIBUTED DATABASE

Federated Database Security State of The Art :

Federated Database Security in 80th:

Federated Database Security in 90th focused on: access control . identity management . Authorization.

Page 16: DISTRIBUTED DATABASE
Page 17: DISTRIBUTED DATABASE

Federated Database Security in millennium : access control . identity management . Authorization. Concurrency control .

Page 18: DISTRIBUTED DATABASE

INTEGRATED DISTRIBUTED DATABASE SECURITY“STATE OF THE ART”

Page 19: DISTRIBUTED DATABASE

Integrated Distributed Database

• A common problem within most large corporations is the diversity of database systems.

• multi-vendor database servers.• components of security (availability, integrity,

confidentiality).

Page 20: DISTRIBUTED DATABASE

Research Directions (1998)

• Security is an important issue in health care environments where large amounts of highly sensitive personal data are processed.

• appeared in the late nineties methodology based on the combination of DAC and MAC security models and uses hierarchies of user roles and data sets

Page 21: DISTRIBUTED DATABASE

User Role Hierarchies

Page 22: DISTRIBUTED DATABASE

Fragmentation and allocation

Page 23: DISTRIBUTED DATABASE

Fragmentation and allocation

Page 24: DISTRIBUTED DATABASE

Beginning of the millennium

Page 25: DISTRIBUTED DATABASE

Research Directions (2002)

New architecture that uses mediators and a primitive ticket-based authorization model to manage disparate policies in information enclaves.

Page 26: DISTRIBUTED DATABASE

Heterogeneous information system

Page 27: DISTRIBUTED DATABASE

Mediation Infrastructure

• A middleware architecture for security policy mediation in information enclaves. It begins by assessing existing technology for software interoperability.

Page 28: DISTRIBUTED DATABASE

Mediator & primitive authorization

• Mediators can be used in conjunction with other integration technologies to achieve a standard architecture for security policy coordination .

• The primitive authorization model architecture provides a common foundation for policy facilitates and coordination

Page 29: DISTRIBUTED DATABASE

Ticket-based Authorization Model Architecture

Page 30: DISTRIBUTED DATABASE

At the end of 2006

Page 31: DISTRIBUTED DATABASE

Research Directions (2006)

• Some researchers develop “Mediator” to map different policies. The deficiency is its lower efficiency. They proposed the concept of “authority propagation” to realize the integration AC policies.

Page 32: DISTRIBUTED DATABASE

Authority Propagating Tree (APT) Model

Use “tree” to express the ministration of authorities for Graph Theory offer convenient means describing attribution flows.

The Advantages of APT1. It can represent RBAC, MAC and DAC policies.2. It can track the whole authority granting history.

Because of the above advantages the APT can generate a new access control model .

Page 33: DISTRIBUTED DATABASE

Integrated Database Access ControlModel (DBIAC)

• Model ElementsAccess Attribute Security Level Request element Access Request Access Decision Time

Page 34: DISTRIBUTED DATABASE

Integrated Database Access ControlModel (DBIAC)

• Model ComponentsAccess Set Object hierarchyRole hierarchy APTFunctions

Page 35: DISTRIBUTED DATABASE

References1. http://www.utdallas.edu/~bxt043000/Publications/Journal-Papers/DAS/J3_Multilevel_securit

y_issues_in_distributed_database_management_systems.pdf2. www.gbv.de/dms/tib-ub-hannover/016971752.pdf3. M. Siegenthaler and K. Birman, “Sharing private information across distributed databases,” in

submitted for publication, 2009.4. http://www.utdallas.edu/~bxt043000/Publications/Journal-Papers/DAS/J25_Security_Constra

int_Processing_in_a_Multilevel_Secure_Distributed_Database_Management_System.pdf5. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Hippocratic databases,” 2002, pp. 143–154.6. K. LeFevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu, and D. DeWitt, “Limiting

disclosure in hippocratic databases,” in VLDB ’04: Proceedings of the Thirtieth international conference on Very large databases. VLDB Endowment, 2004, pp. 108–119.

7. G. Wiederhold, M. Bilello, V. Sarathy, and X. Qian, “A security mediator for health care information,” in Proceedings of the 1996 AMIA Conference, 1996, pp. 120–124.

Page 36: DISTRIBUTED DATABASE

References8. Google Health, “http://www.google.com/health.”9. Microsoft HealthVault, http://www.healthvault.com/.10. M. Siegenthaler and K. Birman, “Sharing private information across distributed

databases,” in submitted for publication, 2009.11. -Susanne Busse, Ralf-Detlef Kutsche, Ulf Leser, Herbert Weber, Federated

Information Systems:Concepts, Terminology and Architectures, Technische Universit.t Berlin,1999.

12. JAMES A. LARSON, Federated Database Systems for Managing Distributed,13. Heterogeneous, and Autonomous Databases’, 1990.14. W. Eßmayr, G. Pernul, A M. Tjoa, A Security Concept for Federated Database

Systems, 1st Int. Congress on Ethical, Legal, and Social Aspects of Digital Information, Monte-Carlo, Monaco, March 1997.

15. Sabrina De Capitani di Vimercati ,Pierangela Samarati, Access Control in Federated Systems.

Page 37: DISTRIBUTED DATABASE

References16. Eugene F. Fodor, Deriving Global Authorizations for Federated Databases.1999.17. Ajoy Kumar, Federated Identity Management,2004.18. Arun Kumar Yadav, An Approach for Ensuring Concurrency Control of Global

Transactions in Heterogeneous Distributed Database,2010.19. http://en.wikipedia.org/wiki/Federated_database_system.20. Marie Khair, Ioannis Mavridis & George Pangalos, Design of secure distributed

medical database systems, Database and Expert Systems Applications, 9th International Conference, DEXA'98 Vienna, Austria, August 24–28, 1998.

21. John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi,Security Policy Coordination for Heterogeneous Information Systems, IEEE 6 Aug 2002.

22. LIU Xin, HAN Zhen & SHEN Chang-Xiang,An Integrated Access Control Model of Distributed Database Systems, First International Conference on Innovative Computing, Information and Control - Volume III (ICICIC'06), 2006.

Page 38: DISTRIBUTED DATABASE

References23. Bell, D.E., and La Padula, L.J. “Secure Computer Systems: A Refinement of the

Mathematical Fundations” [J],ESD-TR-73-278, Vol.III, AD 780 528, Electronic Systems Division, Air Force System Command, Hanscom AFB, Bedford, Massachusetts, November. 1974.

24. R.S. Sandhu, E.J.Coyne, H.L.Feinstein. Role Based Access Control Models. IEEE Computer, February 1996. Vol 29( 2): 38-47.

25. E.Bertino, S.Jajodia, P.Samarati. Supporting Multiple Access Control Policies in Databases System. In: IEEE Symposium on Security and Privacy. Oakland, California. 1996.

26. Liuyi, Database and Information System Security[M, Science Press, China,2000.27. Xin LIU, Zhen HAN, etc., Research On the Extended Confidential Level of BLP

Model, Proceedings of KES 2005, Knowledge-Based Intelligent Information and Engineering Systems PartIV, Pps257-262.

28. Jiang Zongli, Jiang Shouxu, Formal Language and Automata Theory, Tsinghua University Press,2003.