An Agent-Based Approach to Inference Prevention in Distributed Database System Xue Ying Chen Department of Computer Science.

Slides:



Advertisements
Similar presentations
Configuration management
Advertisements

Research Issues in Web Services CS 4244 Lecture Zaki Malik Department of Computer Science Virginia Tech
CHAPTER OBJECTIVE: NORMALIZATION THE SNOWFLAKE SCHEMA.
Chapter 1 Overview of Databases and Transaction Processing.
Chapter 3 Data Modeling Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent.
Distributed databases
GI Systems and Science January 30, Points to Cover  Recap of what we covered so far  A concept of database Database Management System (DBMS) 
Agent Caching in APHIDS CPSC 527 Computer Communication Protocols Project Presentation Presented By: Jake Wires and Abhishek Gupta.
Managing Data Resources
Overview of Databases and Transaction Processing Chapter 1.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Views Chapter 12. What Are Views? A virtual table that comprises the fields of one or more tables in the database It is a virtual table since it does.
11 3 / 12 CHAPTER Databases MIS105 Lec14 Irfan Ahmed Ilyas.
Introduction to Databases Transparencies
Institut für Softwarewissenschaft - Universität WienP.Brezany 1 Toward Knowledge Discovery in Databases Attached to Grids Peter Brezany Institute for Software.
1 Computer Systems & Architecture Lesson 1 1. The Architecture Business Cycle.
SESSION 7 MANAGING DATA DATARESOURCES. File Organization Terms and Concepts Field: Group of words or a complete number Record: Group of related fields.
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
DATABASE MANAGEMENT SYSTEM ARCHITECTURE
Module 3: Business Information Systems Chapter 11: Knowledge Management.
The Design Discipline.
1 Distributed and Parallel Databases. 2 Distributed Databases Distributed Systems goal: –to offer local DB autonomy at geographically distributed locations.
Databases From A to Boyce Codd. What is a database? It depends on your point of view. For Manovich, a database is a means of structuring information in.
Chapter 2 CIS Sungchul Hong
David M. Kroenke’s Chapter One: Introduction Part Two Database Processing: Fundamentals, Design, and Implementation.
STORING ORGANIZATIONAL INFORMATION— DATABASES CIS 429—Chapter 7.
Database System Concepts and Architecture
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
Database Management. ICT5 Database Administration (DBA) The DBA’s tasks will include the following: 1. The design of the database. After the initial design,
CODD’s 12 RULES OF RELATIONAL DATABASE
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 20 Object-Oriented.
Implicit An Agent-Based Recommendation System for Web Search Presented by Shaun McQuaker Presentation based on paper Implicit:
High Level Architecture Overview and Rules Thanks to: Dr. Judith Dahmann, and others from: Defense Modeling and Simulation Office phone: (703)
Programming using C# Joins SQL Injection Stored Procedures
Databases From A to Boyce Codd. What is a database? It depends on your point of view. For Manovich, a database is a means of structuring information in.
Software Architecture and Design Dr. Aldo Dagnino ABB, Inc. US Corporate Research Center October 23 rd, 2003.
Lecture2: Database Environment Prepared by L. Nouf Almujally & Aisha AlArfaj 1 Ref. Chapter2 College of Computer and Information Sciences - Information.
File Systems and Databases Lecture 1. Files and Databases File: A collection of records or documents dealing with one organization, person, area or subject.
 Three-Schema Architecture Three-Schema Architecture  Internal Level Internal Level  Conceptual Level Conceptual Level  External Level External Level.
Lecture2: Database Environment Prepared by L. Nouf Almujally 1 Ref. Chapter2 Lecture2.
IMS 4212: Database Implementation 1 Dr. Lawrence West, Management Dept., University of Central Florida Physical Database Implementation—Topics.
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
DataBase Management System What is DBMS Purpose of DBMS Data Abstraction Data Definition Language Data Manipulation Language Data Models Data Keys Relationships.
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
MANAGING DATA RESOURCES ~ pertemuan 7 ~ Oleh: Ir. Abdul Hayat, MTI.
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
Distributed Database. Introduction A major motivation behind the development of database systems is the desire to integrate the operational data of an.
Computer Systems & Architecture Lesson 4 8. Reconstructing Software Architectures.
DATABASE MANAGEMENT SYSTEM ARCHITECTURE
Chapter 9 Database Systems © 2007 Pearson Addison-Wesley. All rights reserved.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 21 November 2, 2004.
Managing Data Resources. File Organization Terms and Concepts Bit: Smallest unit of data; binary digit (0,1) Byte: Group of bits that represents a single.
Ch- 8. Class Diagrams Class diagrams are the most common diagram found in modeling object- oriented systems. Class diagrams are important not only for.
Issues in Ontology-based Information integration By Zhan Cui, Dean Jones and Paul O’Brien.
Chapter 1 Overview of Databases and Transactions.
Session 1 Module 1: Introduction to Data Integrity
 Distributed Database Concepts  Parallel Vs Distributed Technology  Advantages  Additional Functions  Distribution Database Design  Data Fragmentation.
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
Chapter 1 Overview of Databases and Transaction Processing.
Managing Data Resources File Organization and databases for business information systems.
Model-Driven Analysis Frameworks for Embedded Systems
MANAGING DATA RESOURCES
Overview of Databases and Transaction Processing
Chapter 20 Object-Oriented Analysis and Design
MANAGING DATA RESOURCES
Database Systems Instructor Name: Lecture-3.
Interpret the execution mode of SQL query in F1 Query paper
Lecture 1 File Systems and Databases.
Presentation transcript:

An Agent-Based Approach to Inference Prevention in Distributed Database System Xue Ying Chen Department of Computer Science

The Structure of Presentation An example Background on distributed database inference The agent-based approach to implementation Conclusion

An Example of Distributed Database Inference

Background on Distributed Database Inference The possible interactions for two databases (in the form of relational tables, with schemes R 1 (a 1 ; a 2 ; … ; a k ), and R 2 (b 1 ; b 2 ; … ; b l )) are the following: R 2 augments R 1 with data records. R 2 augments R 1 with different attributes. R 2 augments and changes both records and attributes of R 1.

Background on Distributed Database Inference A set of requirements for the architecture of the Rational Downgrader mechanism: The architecture must allow downgrading strategies to be computed infrequently and reused. The architecture must enable the execution of downgrading strategies to be distributed in the same manner as the storage of data. The architecture must be cleanly separated from each of the database management systems and be based on a standard communication protocol.

The Agent-Based Approach to Implementation Design of the inference prevention agent: the inference prevention agent will be a production system that is associated with a particular database in the distributed database application. The facts in the agent's production system are the records in the database. The rules are generated by the Rule Generator, which will be described in detail later. The rules check for certain combinations of values in attributes and specify attributes that should be hidden.

The Agent-Based Approach to Implementation Example: The agent contains RULE 1: IF H = `y' AND T = `y' THEN HIDE H Suppose that we have an agent that contains RULE 1, and a Low user specifies the query: SELECT H,T FROM TABLE 1 WHERE KEY = 3 The agent would then make the following SQL query to the local database management engine: SELECT * FROM TABLE 1 WHERE KEY = 3

The Agent-Based Approach to Implementation

Agent communication: As part of the agent design, each agent will be given an attribute directory that species which databases contain which attributes. The contents of this directory will be specified at rule generation time.

The Agent-Based Approach to Implementation Suppose that, for example, the rule in question were as follows: RULE 2: IF H = `y' AND T = `y' AND Y = `y' THEN HIDE H AND I Let us say that Agent receives the query from the Low user: SELECT H FROM TABLE 1 WHERE H = `y' Agent will make a broader query from its local database. SELECT * FROM TABLE 1 WHERE H = `y' Which produces the result shown in Table 9. Agent consults its directory and discovers that the database responsible for Y (thyroid) is TABLE 5. However, TABLE 5 should not send the entire set of records for which Y = `y' because this may be prohibitively large. Agent can specify these records using the key that the local database and TABLE 5 shares. The SQL for such an operation in this example would be: SELECT Y FROM TABLE 5 WHERE Y = `y' AND (KEY = 3 OR KEY = 8 OR KEY = 18 OR KEY = 20)

The Agent-Based Approach to Implementation

Design of rule generator: The Rule Generator executes far more infrequently than the agents. Its purpose is to create new agents from time to time so that the inference prevention strategy may closely reflect the probability dependency relationships among the databases in the system. In order to perform its task, it needs a comprehensive view of the entire distributed database system. Such a view may be constructed by performing an outer join on the key that the databases share, as shown in Table 10.

The Agent-Based Approach to Implementation

Design of rule generator: The rules are derived from the trained Bayesian net by analyzing the influence of an attribute on the sensitive target attribute. There are many possible approaches to deriving filtering rules from a Bayesian net. Our approach has been to use conditional probability as a measure of the influence of an attribute on a sensitive target attribute. In Figure 5, for a given inference prevention threshold τ, we compute and record those modifications where α > τ.

The Agent-Based Approach to Implementation

Conclusion Our rationale for favoring the agent-based approach is summarized by the following list of advantages: Since the agents work in parallel and are local to the databases, the performance benefit of distribution is not lost. There is no bottleneck through which all queries must pass. Similarly, the survivability benefit of distribution is not lost. The potential single point of failure represented by a centralized Rational Downgrader is avoided. The compartmentalization provided by a distributed scheme is preserved. Databases can prevent the inference of sensitive data in other databases without knowing exactly what the nature of that data is. Interoperability is insured. Heterogeneous databases can participate in the inference prevention if they are compliant with the SQL standard. A separation of concerns is maintained. Changes to the inference prevention scheme do not require changes to the database management systems.

Reference An Agent-Based Approach To Inference Prevention In Distributed Database Systems James Tracy, Liwu Chang, Ira S. Moskowits