Extreme Blue © 2004 IBM Corporation Eunomia HDB Compliance Auditing System Architecture.

Slides:



Advertisements
Similar presentations
Yukon – What is New Rajesh Gala. Yukon – What is new.NET Framework Programming Data Types Exception Handling Batches Databases Database Engine Administration.
Advertisements

Auditing Compliance with a Hippocratic Database Javier Salinas Martín.
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 1 Introduction to Database Management.
Functions of a Database Management System. Functions of a DBMS C.J. Date n Indexing n Views n Security n Integrity n Concurrency n Backup/Recovery n Design.
Chapter 1 Introduction to Database Management. McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc. All rights reserved. Welcome! Database technology:
Overview of Database Access in.Net Josh Bowen CIS 764-FS2008.
TIBCO Designer TIBCO BusinessWorks is a scalable, extensible, and easy to use integration platform that allows you to develop, deploy, and run integration.
Objectives of the Lecture :
 Introduction Introduction  Purpose of Database SystemsPurpose of Database Systems  Levels of Abstraction Levels of Abstraction  Instances and Schemas.
Data Warehousing Seminar Chapter 5. Data Warehouse Design Methodology Data Warehousing Lab. HyeYoung Cho.
Database Design – Lecture 16
Announcements Read JDBC Project Step 5, due Monday.
MS Access Database Connection. Database? A database is a program that stores data and records in a structured and queryable format. The tools that are.
Configuring Identity Manager 2 (formerly DirXML ® ) for JDBC (w/DirXML) Jason Elsberry Software Engineer
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 6 Virtual Private Databases.
1 Oracle Database 11g – Flashback Data Archive. 2 Data History and Retention Data retention and change control requirements are growing Regulatory oversight.
Persistence Store Project Proposal.
Introduction on R-GMA Shi Jingyan Computing Center IHEP.
Midterm Exam Chapters 1,2,3,5, 6,7 (closed book) March 11, 2014.
Custom Reporting in Blackboard Learn. What happens between clicking run and getting the report? Connect to a data source Where is the information?
© Dennis Shasha, Philippe Bonnet – 2013 Communicating with the Outside.
Introduction to Database Management. 1-2 Outline  Database characteristics  DBMS features  Architectures  Organizational roles.
IT 456 Seminar 5 Dr Jeffrey A Robinson. Overview of Course Week 1 – Introduction Week 2 – Installation of SQL and management Tools Week 3 - Creating and.
Triggers A Quick Reference and Summary BIT 275. Triggers SQL code permits you to access only one table for an INSERT, UPDATE, or DELETE statement. The.
Relational Databases. Database Large collection of data in an organised format to allow access and control DBMS Database Management System - Special software.
Database Systems Microsoft Access Practical #3 Queries Nos 215.
Frontiers in Massive Data Analysis Chapter 3.  Difficult to include data from multiple sources  Each organization develops a unique way of representing.
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
Database Management System (DBMS) an Introduction DeSiaMore 1.
Views Lesson 7.
Database Systems DBMS Environment Data Abstraction.
SQL Injection Jason Dunn. SQL Overview Structured Query Language For use with Databases Purpose is to retrieve information Main Statements Select Insert.
1 Database Management Systems (DBMS). 2 Database Management Systems (DBMS) n Overview of: ä Database Management Components ä Database Systems Architecture.
1 Welcome : To the third learning sequence “ DB ACTORS “ Present learning: We shall explore the following topics: - DB limitations. - DB actors. - DB Administrator.
UNIT III - JDBC JDBC Overview – JDBC implementation – Connection class – Statements - Catching Database Results, handling database Queries. Networking–
DATABASE CONNECTIVITY TO MYSQL. Introduction =>A real life application needs to manipulate data stored in a Database. =>A database is a collection of.
IT System Administration Lesson 3 Dr Jeffrey A Robinson.
NSF DUE ; Wen M. Andrews J. Sargeant Reynolds Community College Richmond, Virginia.
Access Databases from Java Programs via JDBC Tessema M. Mengistu Department of Computer Science Southern Illinois University Carbondale
Two-Tier DW Architecture. Three-Tier DW Architecture.
Basics of JDBC Session 14.
Chapter 6 Virtual Private Databases
SeETL Demonstration 07 SQL Statement Processing 1/6/2012
SQL Query Analyzer. Graphical tool that allows you to:  Create queries and other SQL scripts and execute them against SQL Server databases. (Query window)
Last Updated : 12 th April 2004 Center of Excellence Data Warehousing Group Overview of Teradata Utilities.
IBM Express Runtime Quick Start Workshop © 2007 IBM Corporation Deploying a Solution.
Introduction to Core Database Concepts Getting started with Databases and Structure Query Language (SQL)
Physical Layer of a Repository. March 6, 2009 Agenda – What is a Repository? –What is meant by Physical Layer? –Data Source, Connection Pool, Tables and.
 Project Team: Suzana Vaserman David Fleish Moran Zafir Tzvika Stein  Academic adviser: Dr. Mayer Goldberg  Technical adviser: Mr. Guy Wiener.
Retele de senzori Curs 1 - 1st edition UNIVERSITATEA „ TRANSILVANIA ” DIN BRAŞOV FACULTATEA DE INGINERIE ELECTRICĂ ŞI ŞTIINŢA CALCULATOARELOR.
ISC321 Database Systems I Chapter 2: Overview of Database Languages and Architectures Fall 2015 Dr. Abdullah Almutairi.
9 Copyright © 2004, Oracle. All rights reserved. Getting Started with Oracle Migration Workbench.
Agenda for Today  DATABASE Definition What is DBMS? Types Of Database Most Popular Primary Database  SQL Definition What is SQL Server? Versions Of SQL.
Database: JDBC Overview
Databases (CS507) CHAPTER 2.
Module 1: SQL Server Overview
Client/Server Databases and the Oracle 10g Relational Database
Database JDBC Overview CS Programming Languages for Web Applications
Functions of a Database Management System
Database Actors Welcome : To the third learning sequence “ DB ACTORS “
RELATIONAL DATABASE MODEL
MS Access Database Connection
Client Access, Queries, Stored Procedures, JDBC
Business Application Development
SQL .. An overview lecture3.
Introduction of Week 11 Return assignment 9-1 Collect assignment 10-1
MIS2502: Data Analytics MySQL and MySQL Workbench
Data Access Layer (Con’t) (Overview)
Updating Databases With Open SQL
Updating Databases With Open SQL
Presentation transcript:

Extreme Blue © 2004 IBM Corporation Eunomia HDB Compliance Auditing System Architecture

Extreme Blue © 2004 IBM Corporation Eunomia Compliance Auditing | System Architecture Eunomia system overview Two components:  Component 1: the logging tool will record the extra information necessary to determine “who accessed which data?”  Component 2: the audit tool will retrieve this information from the logs to answer questions about data access.

Extreme Blue © 2004 IBM Corporation Eunomia Compliance Auditing | System Architecture Eunomia system overview Enterprise Application Eunomia Interface DB2 Log Retrieval API Audit Tool Requests for Personal Information Chief Privacy Officer

Extreme Blue © 2004 IBM Corporation Eunomia Compliance Auditing | System Architecture Piece 1: The Logging Tool

Extreme Blue © 2004 IBM Corporation Eunomia Compliance Auditing | System Architecture Overview of logging from 50,000 feet Enterprise Application Eunomia Interface DB2 Enterprise Application DB2 Before:After: JDBC DB2 Driver API

Extreme Blue © 2004 IBM Corporation Eunomia Compliance Auditing | System Architecture Overview of logging from 50,000 feet We want to:  minimize overhead of storing extra logging information  defer as much computation expense as possible

Extreme Blue © 2004 IBM Corporation Eunomia Compliance Auditing | System Architecture Overview of logging from 50,000 feet Solution:  query logs – record all queries for data  transaction log – record all changes to data in the database in shadow tables  at audit time, calculate from the shadow tables which information was accessed by which queries

Extreme Blue © 2004 IBM Corporation Eunomia Compliance Auditing | System Architecture Overview of query logging Enterprise Application Query Handler DataQuery Logs Query JDBC Interface Write Log

Extreme Blue © 2004 IBM Corporation Eunomia Compliance Auditing | System Architecture Overview of backlogging Personal Information Tables Shadow Tables Triggers on Update, Insert, and Delete  Shadow tables maintain a temporal log of all information stored in the actual data tables.  Suppose you want to know what the database looked like at a certain point in time.  First select the set of records that have an earlier timestamp than your desired date  From that set, then select the set of records that have the latest timestamp.

Extreme Blue © 2004 IBM Corporation Eunomia Compliance Auditing | System Architecture PACT configuration wizard  an automated tool for configuring a database to support logging  a database administrator can specify a database connection which the wizard will analyze  the wizard will generate and execute the SQL necessary to augment the existing database tables

Extreme Blue © 2004 IBM Corporation Eunomia Compliance Auditing | System Architecture Eunomia configuration wizard prompt admin for database settings analyze database tables create shadow tables populate shadow tables with current table information create query log table

Extreme Blue © 2004 IBM Corporation Eunomia Compliance Auditing | System Architecture Overview of logging from 1000 feet PACT Driver Eunomia Configuration Tool LogsData TablesShadow Tables Audit Tools Applications DBA CPO Triggers

Extreme Blue © 2004 IBM Corporation Eunomia Compliance Auditing | System Architecture Overview of logging from 100 feet JDBC Interface LogsDataShadow Tables Eunomia Interface Applications JSP/GUI Interface Log Setup Pact Configuration Wizard BacklogSQLGenerator JDBC Interface Triggers query record query and query results setup query logs read schema setup backlogs Doctor DBA

Extreme Blue © 2004 IBM Corporation Eunomia Compliance Auditing | System Architecture Piece 2: The Audit Tool

Extreme Blue © 2004 IBM Corporation Eunomia Compliance Auditing | System Architecture Overview of auditing from 50,000 feet LogsShadow Tables Log Retrieval API Audit Tool

Extreme Blue © 2004 IBM Corporation Eunomia Compliance Auditing | System Architecture Overview of auditing from 50,000 feet  Auditing tools only care about questions like “What information was accessed by doctor X on date Y, in response to query Z.” The auditing tools would love to have the log data in the following format:  Unfortunately, processing all of the query log and backlog data to put it in this format is computationally expensive. Instead, it is necessary to process the data on the fly using a SQL query rewrite engine.  This layer of complexity is hidden within the “Log Retrieval API,” which will translate the data from the log format, to the format the audit tools want to use it in. Note – table is just a quick illustration of how the auditing tools would like to get at the data. Don’t nit-pick it.

Extreme Blue © 2004 IBM Corporation Eunomia Compliance Auditing | System Architecture Overview of auditing from 1000 feet SQL Rewrite Engine JDBC and SQL Request ProcessorResult Processor Log Retrieval Layer Log Retrieval API Tools For Viewing Logs Tools for Comparing Logs Against Privacy Policies Audit Application LogsShadow Tables

Extreme Blue © 2004 IBM Corporation Eunomia Compliance Auditing | System Architecture Queries and Query Sets  An auditor may want to retrieve a set of queries, and then process and analyze the queries in a number of ways  We will create “Query” objects and Query Sets, which will represent the query information retrieved from the database.  This will eliminate repeat computation when someone wants to process a set of queries in multiple ways.

Extreme Blue © 2004 IBM Corporation Eunomia Compliance Auditing | System Architecture Queries and Query Sets Database Log Retrieval API Audit Tool JDBC: SQL and ResultSet Objects Query and QuerySet Objects