Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.1 Outline Introduction Background Distributed DBMS Architecture Distributed Database Design.

Slides:



Advertisements
Similar presentations
A centre of expertise in data curation and preservation DCC Workshop: Curating sApril 24 – 25, 2006 Funded by: This work is licensed under the Creative.
Advertisements

Research Issues in Web Services CS 4244 Lecture Zaki Malik Department of Computer Science Virginia Tech
Trust Management of Services in Cloud Environments:
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Distributed DBMSPage © 1998 M. Tamer Özsu & Patrick Valduriez Outline Introduction Background Distributed DBMS Architecture Distributed Database.
1 CS 6910: Advanced Computer and Information Security Lecture on 11/2/06 Trust in P2P Systems Ahmet Burak Can and Bharat Bhargava Center for Education.
Presenter: Nguyen Ba Anh HCMC University of Technology Information System Security Course.
CTO Office Reliability & Security Distinctions and Interactions Hal Lockhart BEA Systems.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
6. Trust Negotiations and Trading Privacy for Trust * Presented by: Prof. Bharat Bhargava Department of Computer Sciences and Center for Education and.
Lecture 1: Overview modified from slides of Lawrie Brown.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
1 Trust and Privacy in Authorization Bharat Bhargava Yuhui Zhong Leszek Lilien CERIAS Security Center CWSA Wireless Center Department of CS and ECE Purdue.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
Private and Trusted Interactions * Bharat Bhargava, Leszek Lilien, and Dongyan Xu {bb, llilien, Department of Computer.
Distributed DBMSPage © 1998 M. Tamer Özsu & Patrick Valduriez Outline Introduction Background Distributed DBMS Architecture Distributed Database.
Distributed DBMSPage © 1998 M. Tamer Özsu & Patrick Valduriez Outline Introduction Background Distributed DBMS Architecture Distributed Database.
Trust, Privacy, and Security Moderator: Bharat Bhargava Purdue University.
Distributed DBMSPage © 1998 M. Tamer Özsu & Patrick Valduriez Outline Introduction Background Distributed DBMS Architecture Distributed Database.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust, Privacy, and Security Moderator: Bharat Bhargava 1 Coordinators: Bharat Bhargava 1, Csilla Farkas 2, and Leszek Lilien 1 1 Purdue University and.
/16/2015 9:20:53 PM 9. Role-Based Access Control (RBAC) Role Classification Algorithm Prof. Bharat Bhargava Center for Education and Research in.
Using Digital Credentials On The World-Wide Web M. Winslett.
Distributed DBMSPage 5. 1 © 1998 M. Tamer Özsu & Patrick Valduriez Outline Introduction Background Distributed DBMS Architecture  Distributed Database.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Using Entropy to Trade Privacy for Trust Yuhui Zhong Bharat Bhargava {zhong, Department of Computer Sciences Purdue University This work.
Security in Databases. 2 Outline review of databases reliability & integrity protection of sensitive data protection against inference multi-level security.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
PRIVACY, TRUST, and SECURITY Bharat Bhargava (moderator)
Hippocratic Databases Paper by Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu CS 681 Presented by Xi Hua March 1st,Spring05.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Distributed DBMSPage © 1998 M. Tamer Özsu & Patrick Valduriez Outline Introduction Background Distributed DBMS Architecture Distributed Database.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SEC835 Database and Web application security Information Security Architecture.
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
PART THREE E-commerce in Action Norton University E-commerce in Action.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Database Design - Lecture 1
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.1 Outline Introduction Background Distributed DBMS Architecture Distributed Database Design.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Privacy Preserving Cross-Domain Data Dissemination (with adaptable service selection) Northrop Grumman TechFest June 2015 PI: Prof. Bharat Bhargava Purdue.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
CSCE 824 Secure and Distributed Database Management Systems FarkasCSCE 8241.
Database Security Outline.. Introduction Security requirement Reliability and Integrity Sensitive data Inference Multilevel databases Multilevel security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Identity Assurance Emory University Security Conference March 26, 2008.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 1.1 Outline n Introduction Background Distributed DBMS Architecture Distributed Database.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.1 Outline Introduction Background Distributed DBMS Architecture Distributed Database Design.
Computer Security Introduction
CS457 Introduction to Information Security Systems
Presented by Edith Ngai MPhil Term 3 Presentation
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Cyber Issues Facing Medical Practice Managers
Introduction to Cryptography
Formalization of Trust, Fraud, and Vulnerability Analysis
Introduction to the PACS Security
Trust-based Privacy Preservation for Peer-to-peer Data Sharing
Presentation transcript:

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.1 Outline Introduction Background Distributed DBMS Architecture Distributed Database Design Distributed Query Processing Distributed Transaction Management n Building Distributed Database Systems (RAID) Mobile Database Systems Privacy, Trust, and Authentication Peer to Peer Systems

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.2 Useful References B. Bhargava and L. Lilien, Private and Trusted Collaborations, in Proceedings of Secure Knowledge Management (SKM), Amherst, NY, Sep W. Wang, Y. Lu, and B. Bhargava, On Security Study of Two Distance Vector Routing Protocols for Mobile Ad Hoc Networks, in Proc. of IEEE Intl. Conf. on Pervasive Computing and Communications (PerCom), Dallas-Fort Worth, TX, March B. Bhargava, Y. Zhong, and Y. Lu, Fraud Formalization and Detection, in Proc. of 5th Intl. Conf. on Data Warehousing and Knowledge Discovery (DaWaK), Prague, Czech Republic, September B. Bhargava, C. Farkas, L. Lilien, and F. Makedon, Trust, Privacy, and Security, Summary of a Workshop Breakout Session at the National Science Foundation Information and Data Management (IDM) Workshop held in Seattle, Washington, September , 2003, CERIAS Tech Report , CERIAS, Purdue University, November P. Ruth, D. Xu, B. Bhargava, and F. Regnier, E-Notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities, in Proc. of the Second International Conference on Trust Management (iTrust), Oxford, UK, March 2004.

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.3 Motivation Sensitivity of personal data  82% willing to reveal their favorite TV show  Only 1% willing to reveal their SSN Business losses due to privacy violations  Online consumers worry about revealing personal data  This fear held back $15 billion in online revenue in 2001 Federal Privacy Acts to protect privacy  E.g., Privacy Act of 1974 for federal agencies  Still many examples of privacy violations even by federal agencies  JetBlue Airways revealed travellers’ data to federal gov’t  E.g., Health Insurance Portability and Accountability Act of 1996 (HIPAA)

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.4 Privacy and Trust Privacy Problem  Consider computer-based interactions  From a simple transaction to a complex collaboration  Interactions involve dissemination of private data  It is voluntary, “pseudo-voluntary,” or required by law  Threats of privacy violations result in lower trust  Lower trust leads to isolation and lack of collaboration Trust must be established  Data – provide quality an integrity  End-to-end communication – sender authentication, message integrity  Network routing algorithms – deal with malicious peers, intruders, security attacks

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.5 Fundamental Contributions Provide measures of privacy and trust Empower users (peers, nodes) to control privacy in ad hoc environments  Privacy of user identification  Privacy of user movement Provide privacy in data dissemination  Collaboration  Data warehousing  Location-based services Tradeoff between privacy and trust  Minimal privacy disclosures  Disclose private data absolutely necessary to gain a level of trust required by the partner system

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.6 Outline 1.Assuring privacy in data dissemination 2.Privacy-trust tradeoff 3.Privacy metrics

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page Privacy in Data Dissemination “Guardian:” Entity entrusted by private data owners with collection, storage, or transfer of their data  owner can be a guardian for its own private data  owner can be an institution or a system Guardians allowed or required by law to share private data  With owner’s explicit consent  Without the consent as required by law  research, court order, etc. “Data” (Private Data) Guardian 2 Second Level Guardian 1 Original Guardian Guardian 3 Guardian 5 Third-level Guardian 6 Guardian 4 “Owner” (Private Data Owner)

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.8 Problem of Privacy Preservation Guardian passes private data to another guardian in a data dissemination chain  Chain within a graph (possibly cyclic) Owner privacy preferences not transmitted due to neglect or failure  Risk grows with chain length and milieu fallibility and hostility If preferences lost, receiving guardian unable to honor them

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.9 Challenges Ensuring that owner’s metadata are never decoupled from his data  Metadata include owner’s privacy preferences Efficient protection in a hostile milieu  Threats - examples  Uncontrolled data dissemination  Intentional or accidental data corruption, substitution, or disclosure  Detection of data or metadata loss  Efficient data and metadata recovery  Recovery by retransmission from the original guardian is most trustworthy

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.10 Proposed Approach A.Design self-descriptive private objects B.Construct a mechanism for apoptosis of private objects apoptosis = clean self-destruction C.Develop proximity-based evaporation of private objects

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.11 A. Self-descriptive Private Objects Comprehensive metadata include:  owner’s privacy preferences  guardian privacy policies  metadata access conditions  enforcement specifications  data provenance  context-dependent and other components How to read and write private data For the original and/or subsequent data guardians How to verify and modify metadata How to enforce preferences and policies Who created, read, modified, or destroyed any portion of data Application-dependent elements Customer trust levels for different contexts Other metadata elements

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.12 Notification in Self-descriptive Objects Self-descriptive objects simplify notifying owners or requesting their permissions  Contact information available in the data provenance component Notifications and requests sent to owners immediately, periodically, or on demand  Via pagers, SMSs, , mail, etc.

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.13 Transmitting complete objects between guardians is inefficient  They describe all foreseeable aspects of data privacy  For any application and environment Solution: prune transmitted metadata  Use application and environment semantics along the data dissemination chain Optimization of Object Transmission

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.14 B. Apoptosis of Private Objects Assuring privacy in data dissemination  In benevolent settings: use atomic self-descriptive object with retransmission recovery  In malevolent settings: when attacked object threatened with disclosure, use apoptosis (clean self-destruction) Implementation  Detectors, triggers, code  False positive  Dealt with by retransmission recovery  Limit repetitions to prevent denial-of-service attacks  False negatives

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.15 C. Proximity-based Evaporation of Private Data Perfect data dissemination not always desirable  Example:Confidential business data shared within an office but not outside Idea:Private data evaporate in proportion to their “distance” from their owner  “Closer” guardians trusted more than “distant” ones  Illegitimate disclosures more probable at less trusted “distant” guardians  Different distance metrics  Context-dependent

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.16 Examples of one-dimensional distance metrics  Distance ~ business type  Distance ~ distrust level: more trusted entities are “closer” Multi-dimensional distance metrics  Security/reliability as one of dimensions Examples of Metrics Insurance Company B Bank I - Original Guardian Insurance Company C Insurance Company A Bank II Bank III Used Car Dealer 1 Used Car Dealer 2 Used Car Dealer 3 If a bank is the original guardian, then: -- any other bank is “closer” than any insurance company -- any insurance company is “closer” than any used car dealer

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.17 Distorted data reveal less, protecting privacy Examples: accuratemore and more distorted Evaporation Implemented as Controlled Data Distortion 250 N. Salisbury Street West Lafayette, IN 250 N. Salisbury Street West Lafayette, IN [home address] [home phone] Salisbury Street West Lafayette, IN 250 N. University Street West Lafayette, IN [office address] [office phone] somewhere in West Lafayette, IN P.O. Box 1234 West Lafayette, IN [P.O. box] [office fax]

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.18 Context-dependent apoptosis for implementing evaporation  Apoptosis detectors, triggers, and code enable context exploitation Conventional apoptosis as a simple case of data evaporation  Evaporation follows a step function  Data self-destructs when proximity metric exceeds predefined threshold value Evaporation as Apoptosis Generalization

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.19 Outline 1.Assuring privacy in data dissemination 2.Privacy-trust tradeoff 3.Privacy metrics

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page Privacy-trust Tradeoff Problem  To build trust in open environments, users provide digital credentials that contain private information  How to gain a certain level of trust with the least loss of privacy? Challenges  Privacy and trust are fuzzy and multi-faceted concepts  The amount of privacy lost by disclosing a piece of information is affected by:  Who will get this information  Possible uses of this information  Information disclosed in the past

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.21 Proposed Approach A.Formulate the privacy-trust tradeoff problem B.Estimate privacy loss due to disclosing a set of credentials C.Estimate trust gain due to disclosing a set of credentials D.Develop algorithms that minimize privacy loss for required trust gain

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.22 A. Formulate Tradeoff Problem Set of private attributes that user wants to conceal Set of credentials  Subset of revealed credentials R  Subset of unrevealed credentials U Choose a subset of credentials NC from U such that:  NC satisfies the requirements for trust building  PrivacyLoss( NC + R ) – PrivacyLoss( R ) is minimized

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.23 Formulate Tradeoff Problem - cont.1 If multiple private attributes are considered:  Weight vector { w 1, w 2, …, w m } for private attributes  Privacy loss can be evaluated using:  The weighted sum of privacy loss for all attributes  The privacy loss for the attribute with the highest weight

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.24 B. Estimate Privacy Loss Query-independent privacy loss  Provided credentials reveal the value of a private attribute  User determines her private attributes Query-dependent privacy loss  Provided credentials help in answering a specific query  User determines a set of potential queries that she is reluctant to answer

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.25 Privacy Loss Estimation Methods Probability method  Query-independent privacy loss  Privacy loss is measured as the difference between entropy values  Query-dependent privacy loss  Privacy loss for a query is measured as difference between entropy values  Total privacy loss is determined by the weighted average  Conditional probability is needed for entropy evaluation  Bayes networks and kernel density estimation will be adopted Lattice method  Estimate query-independent loss  Each credential is associated with a tag indicating its privacy level with respect to an attribute a j  Tag set is organized as a lattice  Privacy loss measured as the least upper bound of the privacy levels for candidate credentials

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.26 C. Estimate Trust Gain Increasing trust level  Adopt research on trust establishment and management Benefit function B(trust_level)  Provided by service provider or derived from user’s utility function Trust gain  B(trust_level new ) - B(tust_level prev )

Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.27 D. Minimize Privacy Loss for Required Trust Gain Can measure privacy loss (B) and can estimate trust gain (C) Develop algorithms that minimize privacy loss for required trust gain  User releases more private information  System’s trust in user increases  How much to disclose to achieve a target trust level?