Database Security and Authorization By Yazmin Escoto Rodriguez Christine Tannuwidjaja.

Slides:



Advertisements
Similar presentations
Transform an ER Model into a Relational Database Schema
Advertisements

Entity-Relationship (ER) Modeling
Rasool Jalili; 2 nd semester ; Database Security, Sharif Uni. of Tech. The Jajodia & Sandhu model Jajodia & Sandhu (1991), a model for the application.
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Lecture 8 Access Control (cont)
Jan. 2014Dr. Yangjun Chen ACS Database security and authorization (Ch. 22, 3 rd ed. – Ch. 23, 4 th ed. – Ch. 24, 6 th )
Chapter 11 Database Security: An Introduction Copyright © 2004 Pearson Education, Inc.
Database Management System
Database Security - Farkas 1 Database Security and Privacy.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 7 Data Modeling Using the Entity- Relationship (ER) Model.
Security Fall 2006McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
Sicurezza Informatica Prof. Stefano Bistarelli
8/28/97Information Organization and Retrieval Files and Databases University of California, Berkeley School of Information Management and Systems SIMS.
View n A single table derived from other tables which can be a base table or previously defined views n Virtual table: doesn’t exist physically n Limitation.
LOGICAL DATABASE DESIGN
Data Modeling Using the Entity-Relationship Model
DeSiamorewww.desiamore.com/ifm1 Database Management Systems (DBMS)  B. Computer Science and BSc IT Year 1.
CSE314 Database Systems Data Modeling Using the Entity- Relationship (ER) Model Doç. Dr. Mehmet Göktürk src: Elmasri & Navanthe 6E Pearson Ed Slide Set.
CSC271 Database Systems Lecture # 6. Summary: Previous Lecture  Relational model terminology  Mathematical relations  Database relations  Properties.
Information storage: Introduction of database 10/7/2004 Xiangming Mu.
Database. Basic Definitions Database: A collection of related data. Database Management System (DBMS): A software package/ system to facilitate the creation.
1 Confidentiality Policies September 21, 2006 Lecture 4 IS 2150 / TEL 2810 Introduction to Security.
Database Security John Ortiz. Lecture 23Database Security2 Secure Passwords  Two main requirements for choosing a secure password:  1) MUST be easy.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
9/14/2012ISC329 Isabelle Bichindaritz1 Database System Life Cycle.
Concepts and Terminology Introduction to Database.
Polyinstantiation Problem
1 Polyinstantiation. 2 Definition and need for polyinstantiation Sea View model Jajodia – Sandhu model.
Chapter 12 Information Systems. 2 Managing Information Information system Software that helps the user organize and analyze data Electronic spreadsheets.
Next-generation databases Active databases: when a particular event occurs and given conditions are satisfied then some actions are executed. An active.
Chapter 11 Database Security: An Introduction Copyright © 2004 Pearson Education, Inc.
DATABASE SECURITY MODULE 5.
Relational Database. Database Management System (DBMS)
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
DeSiamorePowered by DeSiaMore1 Database Management Systems (DBMS)  B. Computer Science and BSc IT Year 1.
Msigwaemhttp//:msigwaem.ueuo.com/1 Database Management Systems (DBMS)  B. Computer Science and BSc IT Year 1.
Copyright © 2007 Ramez Elmasri and Shamkant B. Navathe Chapter 6 Data Integrity and Security.
Data modeling using the entity-relationship model Chapter 3 Objectives How entities, tuples, attributes and relationships among entities are represented.
UNIT_2 1 DATABASE MANAGEMENT SYSTEM[DBMS] [Unit: 2] Prepared By Lavlesh Pandit SPCE MCA, Visnagar.
WXGE 6101 DATABASE CONCEPTS & IMPLEMENTATIONS. Lesson Overview The Relational Model Terminology of relational model. Properties of database relations.
Academic Year 2014 Spring Academic Year 2014 Spring.
Chapter 11 Database Security: An Introduction Copyright © 2004 Pearson Education, Inc.
The Relational Model. 2 Relational Model Terminology u A relation is a table with columns and rows. –Only applies to logical structure of the database,
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 7 Data Modeling Using the Entity- Relationship (ER) Model.
Trustworthy Semantic Web Dr. Bhavani Thuraisingham The University of Texas at Dallas Inference Problem March 4, 2011.
DBMS ER model-2 Week 6-7.
Entity Relationship Diagram (ERD). Objectives Define terms related to entity relationship modeling, including entity, entity instance, attribute, relationship.
Modeling Security-Relevant Data Semantics Xue Ying Chen Department of Computer Science.
EntityRelationshipDiagrams. Entity Relationship Models The E-R (entity-relationship) data model views the real world as a set of basic objects (entities)
David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation Appendix H: The Semantic Object Model.
Enhanced Entity-Relationship and UML Modeling. 2.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Database Security and Authorization Introduction to DB Security Access Controls Database Security and the DBA Discretionary Access Control The privileges.
Database Security Database System Implementation CSE 507 Some slides adapted from Navathe et. Al.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke1 The Relational Model Chapter 3.
Introduction: Databases and Database Systems Lecture # 1 June 19,2012 National University of Computer and Emerging Sciences.
IST 210 Security. IST 210 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed to. E.g., A student can’t.
Data Modeling Using the Entity- Relationship (ER) Model
Database System Implementation CSE 507
Logical Database Design and the Rational Model
Entity- Relationship (ER) Model
Database Security and Authorization
Building Trustworthy Semantic Webs
The Jajodia & Sandhu model
Data Model.
DATABASE SECURITY For CSCL (BIM).
Building Trustworthy Semantic Webs
The Jajodia & Sandhu model
Presentation transcript:

Database Security and Authorization By Yazmin Escoto Rodriguez Christine Tannuwidjaja

Main Types of Security:  Enforce security of portions of a database against unauthorized access  - Database Security and Authorization Subsystem  Prevent unauthorized persons from accessing the system itself  - Access Control  Control the access to statistical databases  - Statistical Database Security  Protect sensitive data that is being transmitted via some type of communications  - Data Encryption

Database Security and Authorization Subsystem  Discretionary Security Mechanisms - concerned with defining, modeling, and enforcing access to information  Mandatory Security Mechanisms for Multilevel Security - requires that data items and users are assigned to certain security labels

Mandatory Access Control Elements: OBJECTS CLASSIFICATIONS -- class(o)-- SUBJECTS CLEARANCE --clear(s)-- Levels : Top Secret, Secret, Confidential, Unclassified

Mandatory Access Control Rules:  Simple Property: subject s is allowed to read data item d if clear(s) ≥ class(d)  *-property: subject s is allowed to write data item d if clear(s) ≤ class(d)  Simple Property protects information from unauthorized access  *-property protects data from contamination or unauthorized modification

Multilevel Security Databases- example Set up: we have: - subject x with clear(x) = TS - subject y with clear(y) = S - subject z with clear(z) = U Project NameTopicLocationTC Black, TSDatabases, TSLos Angeles, TSTS Silver, SSupply Chain, SNew York, SS Gold, UInventories, SAtlanta, SS Indigo, UTelecommunication, UAustin, UU

Multilevel Security Databases- example Project NameTopicLocationTC Black, TSDatabases, TSLos Angeles, TSTS Silver, SSupply Chain, SNew York, SS Gold, UInventories, SAtlanta, SS Indigo, UTelecommunication, UAustin, UU Project NameTopicLocationTC Silver, SSupply Chain, SNew York, SS Gold, UInventories, SAtlanta, SS Indigo, UTelecommunication, UAustin, UU

Multilevel Security Databases- example Project NameTopicLocationTC Black, TSDatabases, TSLos Angeles, TSTS Silver, SSupply Chain, SNew York, SS Gold, UInventories, SAtlanta, SS Indigo, UTelecommunication, UAustin, UU Project NameTopicLocationTC Gold, U-, U U Indigo, UTelecommunication, UAustin, UU

Multilevel Security Databases- example  subject z wants to insert the next tuple Project NameTopicLocationTC Black, TSDatabases, TSLos Angeles, TSTS Silver, SSupply Chain, SNew York, SS Gold, UInventories, SAtlanta, SS Indigo, UTelecommunication, UAustin, UU Silver, ULinear Programming, UOmaha, UU Polyinstantiation : the existence of multiple data objects with the same key

Multilevel Security Databases- example Project NameTopicLocationTC Gold, U-, U U Indigo, UTelecommunication, UAustin, UU  subject z wants to replace the null values with certain data items Project NameTopicLocationTC Black, TSDatabases, TSLos Angeles, TSTS Silver, SSupply Chain, SNew York, SS Gold, UInventories, SAtlanta, SS Indigo, UTelecommunication, UAustin, UU Gold, UMarkov Chain, UNew Jersey, UU

Security Relevant Knowledge Entity Relationship -- describes the structural part of the database Data Flow Diagram -- represents the functions the system should perform Classification Constraints To assign to security classifications concepts of schemas: - ones that classify items - ones that classify query results

System Object What is it? Entity type Specialization type Relationship type In security it is the target of protection Notation O(A 1..,A n ) - A i (i=1..N) is an attribute and is defined over domain D i Has an identity property (key attributes) A ⊆ (A 1,..,A n )

Multilevel Secure Application MAJOR QUESTION: Which way should the attributes and occurrences of O be assigned to proper security classifications? CLASSIFICATION RESULT: Security object O  multilevel security object O m Performed by means of security constraints

Graphical Extensions to the ER N X P (U)(Co)(S) [U..S][Co..TS] (TS) Secrecy Levels Ranges of Secrecy Levels Aggregation leading to TS (N..constant) Inference leading to Co Evaluation of predicate P Security dependency

SSN Name Dep Salary Title Function SSN Date Client Subject EmployeeProject Is Assigned to (0,N)(0,M) ER Diagram

Object Classification Constraints – Simple Constraints Let X be a set of attributes of security object O (X ⊆ {A 1,…,A n }) SiC (O(X))=C, (C ∈ SL) Results in a multilevel object O m (A 1, C 1,…, A n, C n,TC) where C i =C ∀ A i ∈ X, C i left unchanged for A i ∉ X Application to ER: - SiC(Is Assigned to,{Function},S) - assigns property Function of relationship “Is Assigned to” to a classification of secret.

SSN Name Dep Salary Title Function SSN Date Client Subject EmployeeProject Is Assigned to (0,N)(0,M) ER Diagram – classifying properties of security objects

Object Classification Constraints – Content-based Constraints Let A i be an attribute of security object O with domain D i, let P be a predicate defined on A i and let X ⊆ {A i,…,A n } CbC (O(X), P: A i θ a) = C or CbC (O(X), P: A i θ A j ) = C (θ ∈ {=,≠,,≤,≥}, a ∈ D i, i ≠ j, C ∈ SL) For any instance o of security object O(A 1,…,A n ) for which a predicate evaluates into true the transformation into o(a 1,c 1,…,a n,c n,tc) is performed Classifications are assigned in a way that c i = C in the case A i ∈ X, c i left unchanged otherwise Application to ER: - CbC (Employee, {SSN, Name}, Salary, ‘≥’, ‘100’, Co)) - represents the semantic that properties SSN and Name of employees with a salary ≥ 100 are treated as confidential information

SSN Name Dep Salary Title Function SSN Date Client Subject EmployeeProject Is Assigned to P (0,N)(0,M) ER Diagram – classifying properties of security objects

Object Classification Constraints – Complex Constraints Let O, O ’ be two security objects and the existence of an instance o of O is dependent on the existence of a corresponding occurrence o ’ of O ’ where the k values of the identifying property K’ of o’ are identical to k values of attributes of o (foreign key) Let P(O ’ ) be a valid predicate defined on o’ and let X ⊆ {A 1,…,A n } be an attribute set of O CoC (O(X), P(O ’ )) = C (C ∈ SL) For every instance o of security object O(A 1,…,A n ) for which a predicate evaluates into true in the related object o’ of O ’ the transformation into o(a 1,c 1,…,a n,c n,tc) is performed Classifications are assigned in a way that c i = C in the case A i ∈ X, c i left unchanged otherwise

Object Classification Constraints – Complex Constraints (con’t) Application to ER: - CoC (Is Assigned to, {SSN}, Project, Subject, ‘=‘, ‘Research’, S) - individual assignment data (SSN) is regarded as secret information in the case the assignment refers to a project with Subject = ‘Research’

SSN Name Dep Salary Title Function SSN Date Client Subject EmployeeProject Is Assigned to P P (0,N)(0,M) ER Diagram – classifying properties of security objects

Object Classification Constraints – Level-based Constraints Let level (A i ) be a function that returns the classification c i of the value of attribute Ai in object o(a 1,c 1,…,a n,c n,tc) of a multilevel security object O m Let X be a set of attributes of O m such that X ⊆ {A 1,…,A n } LbC (O(X)) = level (A i ) Result for every object o(a 1,c 1,…,a n,c n,tc) to the assignment c j = c i in the case A j ∈ X Application to ER: - LbC (Project, {Client}, Subject) - states that property Client of security object Project must always have the same classification as the property Subject of the Project

SSN Name Dep Salary Title Function SSN Date Client Subject EmployeeProject Is Assigned to P P (0,N)(0,M) ER Diagram – classifying properties of security objects

Query Result Classification Constraints – Association-based Constraints Let O (A 1,…A n ) be a security object with identifying property K Let X (X ⊆ {A 1,…,A n } (K ⋂ X = {}) be a set of attributes of O AbC (O (K,X)) = C (C ∈ SL) Results in the assignment of security level C to the retrieval result of each query that takes X together with identifying property K Application to ER: - AbC (Employee, {Salary}, Co) - the salary of an individual person is confidential - the value of salaries without the information which employee gets what salary is unclassified

SSN Name Dep Salary Title Function SSN Date Client Subject EmployeeProject Is Assigned to (0,N)(0,M) ER Diagram – classifying query results [Co]

Query Result Classification Constraints – Aggregation Constraints Let count(O) be a function that returns the number of instances referenced by a particular query and belonging to security object O (A 1,…,A n ) Let X (X ⊆ {A 1,…,A n }) be sensitive attributes of O AgC (O, (X, count(O) > n = C (C ∈ SL, n ∈ N) Result into the classification C for the retrieval result of a query in the case count(O) > n, i.e. the number of instances of O referenced by a query accessing properties X exceeds the value n

Query Result Classification Constraints – Aggregation Constraints (con’t) Application to ER: - AgC (Is Assigned to, {Title}, ‘3’, S) - the information which employee is assigned to what projects is regarded as unclassified - aggregating all assignments for a certain project and thereby inferring which team is responsible for what project is considered secret

SSN Name Dep Salary Title Function SSN Date Client Subject EmployeeProject Is Assigned to (0,N)(0,M) ER Diagram – classifying query results [Co] 3

Query Result Classification Constraints – Inference Constraints Let PO be the set of multilevel objects involved in a potential logical inference Let O, O ’ be two particular objects from PO with corresponding multilevel representation O (A 1,C 1,…,A n,C n,TC) and O ’ (A ’ 1,C ’ 1,…,A ’ n,C ’ n,TC ’ ) Let X ⊆ {A 1,…,A n } and Y ⊆ {A ’ 1,…,A ’ n }) IfC (O(X), O ’ (Y)) = C Results into the assignment of security level C to the retrieval result of each query that takes Y together with the properties in X

Query Result Classification Constraints – Inference Constraints (con’t) Application to ER: - IfC (Employee, {Dep}, Project, {Subject}, Co) - consider the situation where the information which employee is assigned to what projects is considered as confidential - from having access to the department an employee works for and to the subject of a project, users may infer which department may be responsible for the project and thus may conclude which employee are involved

SSN Name Dep Salary Title Function SSN Date Client Subject EmployeeProject Is Assigned to (0,N)(0,M) ER Diagram – classifying query results X [Co] 3

QUESTION?