Database Security DBMS Features Statistical Database Security.

Slides:



Advertisements
Similar presentations
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Advertisements

Database Management System MIS 520 – Database Theory Fall 2001 (Day) Lecture 13.
Statistical database security Special purpose: used only for statistical computations. General purpose: used with normal queries (and updates) as well.
Database Management System
Information Security Principles & Applications
Topic Denormalisation S McKeever Advanced Databases 1.
Monday, 08 June 2015Dr. Mohamed Osman1 What is Database Administration A high level function (technical Function) that is responsible for ► physical DB.
Oct 31, 2000Database Management -- Fall R. Larson Database Management: Introduction to Terms and Concepts University of California, Berkeley School.
Database management concepts Database Management Systems (DBMS) An example of a database (relational) Database schema (e.g. relational) Data independence.
Dr. Leszek Lilien Department of Computer Science
Security in Databases. 2 Srini & Nandita (CSE2500)DB Security Outline review of databases reliability & integrity protection of sensitive data protection.
Chapter 11 Data Management Layer Design
Chapter 12 Information Systems Nell Dale John Lewis.
Security in Databases. 2 Outline review of databases reliability & integrity protection of sensitive data protection against inference multi-level security.
Functions of a Database Management System. Functions of a DBMS C.J. Date n Indexing n Views n Security n Integrity n Concurrency n Backup/Recovery n Design.
Last time Finish OTR Database Security Introduction to Databases
Information systems and databases Database information systems Read the textbook: Chapter 2: Information systems and databases FOR MORE INFO...
Access 2007 ® Use Databases How can Access help you to find and use information?
IST Databases and DBMSs Todd S. Bacastow January 2005.
IT 221: Introduction to Information Security Principles Lecture 11: Database Security For Educational Purposes Only Revised: November 13, 2002.
Lecture 2 The Relational Model. Objectives Terminology of relational model. How tables are used to represent data. Connection between mathematical relations.
Chapter 4 The Relational Model.
DATABASE MANAGEMENT SYSTEMS BASIC CONCEPTS 1. What is a database? A database is a collection of data which can be used: alone, or alone, or combined /
Chapter 6 – Database Security  Integrity for databases: record integrity, data correctness, update integrity  Security for databases: access control,
 Definition  Components  Advantages  Limitations Contents  DBMS DBMS  Functions Functions  Architecture Architecture.
Chapter 1 Overview of Database Concepts Oracle 10g: SQL
Database Security And Audit. Databasics Data is stored in form of files Record : is a one related group of data (in a row) Schema : logical structure.
Chapter 6 – Database Security  Integrity for databases: record integrity, data correctness, update integrity  Security for databases: access control,
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design, 2 nd Edition Copyright 2003 © John Wiley & Sons, Inc. All rights reserved.
Sensitive Data  Data that should not be made public  What if some but not all of the elements of a DB are sensitive Inherently sensitiveInherently sensitive.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 5 “Database and Cloud Security”.
Physical Database Design Chapter 6. Physical Design and implementation 1.Translate global logical data model for target DBMS  1.1Design base relations.
Lecture 2 An Overview of Relational Database IST 318 – DB Admin.
Chapter 12 Information Systems. 2 Managing Information Information system Software that helps the user organize and analyze data Electronic spreadsheets.
CSCE 548 Secure Software Development Weak Password-Based Systems Store and Protect Data Securely Information Leakage Failure to Handle Errors Correctly.
Introduction to: 1.  Goal[DEN83]:  Provide frequency, average, other statistics of persons  Challenge:  Preserving privacy[DEN83]  Interaction between.
Computer Security: Principles and Practice
Databases Collections of data. Set of rules to organize data. Types ◦ Relational: use (rows) & columns to organize. ◦ Object oriented: complex data (audio,
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 5 – Database Security.
Next-generation databases Active databases: when a particular event occurs and given conditions are satisfied then some actions are executed. An active.
INFORMATION MANAGEMENT Unit 2 SO 4 Explain the advantages of using a database approach compared to using traditional file processing; Advantages including.
Databases Shortfalls of file management systems Structure of a database Database administration Database Management system Hierarchical Databases Network.
Security Control Methods for Statistical Database Li Xiong CS573 Data Privacy and Security.
Database Security Outline.. Introduction Security requirement Reliability and Integrity Sensitive data Inference Multilevel databases Multilevel security.
Inference Problem Privacy Preserving Data Mining.
File and Database Design Class 22. File and database design: 1. Choosing the storage format for each attribute from the logical data model. 2. Grouping.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 21 November 2, 2004.
Programming Logic and Design Fourth Edition, Comprehensive Chapter 16 Using Relational Databases.
CSCE 548 Secure Software Development Information Leakage + Failing to Handle Errors.
Introduction Database Security Overview. Readings This lecture: This lecture: –Textbook: Chapter 5.2 –Lecture materials from CSCE 522, Nov. 3, Lecture.
Copyright (c) 2014 Pearson Education, Inc. Introduction to DBMS.
Trustworthy Semantic Web Dr. Bhavani Thuraisingham The University of Texas at Dallas Inference Problem March 4, 2011.
Inference Problem. Access Control Policies Direct access Information flow Not addressed: indirect data access CSCE Farkas 2 Lecture 19.
Inference Problem Privacy Preserving Data Mining.
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 7 Module 7 Data Base Security  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Writing Secure Programs. Program Security CSCE Farkas/Eastman - Fall Program Flaws Taxonomy of flaws: how (genesis) when (time) where (location)
Database Security Database System Implementation CSE 507 Some slides adapted from Navathe et. Al.
1 The Relational Data Model David J. Stucki. Relational Model Concepts 2 Fundamental concept: the relation  The Relational Model represents an entire.
Database System Implementation CSE 507
Data and Applications Security Developments and Directions
Functions of a Database Management System
Week 12 Option 3: Database Design
Chapter 8 Data Base Security
Inference and Flow Control
Database Security Jagdish S. Gangolly School of Business
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Webs
Data and Applications Security Developments and Directions
Trustworthy Semantic Web
Security in Computing, Fifth Edition
Presentation transcript:

Database Security DBMS Features Statistical Database Security

Database security CSCE Eastman/Farkas - Fall Security Concerns Data Integrity Data Confidentiality Access control Inference control Data Availability

Database security CSCE Eastman/Farkas - Fall Topics in Text What is a database? Basic definitions for relational DBs DBMS security functionality Inference attacks Multilevel secure databases

Database security CSCE Eastman/Farkas - Fall Security Concerns Data Integrity Information assurance Data Confidentiality Access control Inference control Data Availability

Database security CSCE Eastman/Farkas - Fall Security Requirements Physical database integrity Logical database integrity Element integrity Auditability Access control User authentication Availability

Database security CSCE Eastman/Farkas - Fall Some Techniques and Tools Two-phase commit Intent phase/commit phase Shadow values Backups Audit trails Concurrency management

Database security CSCE Eastman/Farkas - Fall Checking Data Element level Range checks Tuple/record level State constraints Transition constraints Relation/file level Duplicate key checks Database level

Database security CSCE Eastman/Farkas - Fall Indirect Information Flow Covert channels Inference channels

Database security CSCE Eastman/Farkas - Fall Communication Channels Overt Channel: designed into a system and documented in the user's manual Covert Channel: not documented. Covert channels may be deliberately inserted into a system, but most such channels are accidents of the system design.

Database security CSCE Eastman/Farkas - Fall Covert Channel Need: Two active participants Encoding schema Example: sender modulates the CPU utilization level with the data stream to be transmitted Sender: repeat get a bit to send if the bit is 1 wait one second (don't use CPU time) else busy wait one second (use CPU time) endif until done

Database security CSCE Eastman/Farkas - Fall Covert Channel Types Timing Channel: based on system times Storage channels: not time related communication Can be turned into each other

Database security CSCE Eastman/Farkas - Fall Covert Channel Protection Noise Synchronization Protection (user state, system state) Removal Slow down Audit

Database security CSCE Eastman/Farkas - Fall Inference Channels + Meta-data Sensitive Information Non-sensitive information =

Database security CSCE Eastman/Farkas - Fall Inference Channels Statistical Database Inferences General Purpose Database Inferences

Database security CSCE Eastman/Farkas - Fall Statistical Databases Goal: provide aggregate information about groups of individuals E.g., average GPA of students Security risk: specific information about a particular individual E.g., GPA of student John Smith Meta-data Working knowledge about the attributes Supplementary knowledge (not stored in database)

Database security CSCE Eastman/Farkas - Fall Types of Statistics Macro-statistics: collections of related statistics presented in 2- dimensional tables Micro-statistics: Individual data records used for statistics after identifying information is removed

Database security CSCE Eastman/Farkas - Fall Macro-statistics Sex\Year Sum Female415 Male Sum101424

Database security CSCE Eastman/Farkas - Fall Micro-statistics SexCourseGPAYear FCSCE M CSCE FCSCE

Database security CSCE Eastman/Farkas - Fall Statistical Compromise Exact compromise Find exact value of an attribute of an individual (e.g., John Smith’s GPA is 3.8) Partial compromise Find an estimate of an attribute value corresponding to an individual (e.g., John Smith’s GPA is between 3.5 and 4.0)

Database security CSCE Eastman/Farkas - Fall Small/Large Query Set Attack C: characteristic formula that identifies groups of individuals If C identifies a single individual I [ count(C) = 1] Find out existence of property If count(C and D)=1 means I has property D If count(C and D)=0 means I does not have D OR Find value of property Sum(C, D), gives value of D

Database security CSCE Eastman/Farkas - Fall Protection Protection from small/large query set attack: query-set-size control A query q(C) is permitted only if N-n  |C|  n, where n  0 is a parameter of the database and N is all the records in the database

Database security CSCE Eastman/Farkas - Fall Tracker Attack Tracker C C1 C2 C=C1 and C2 T=C1 and ~C2 q(C)=q(C1) – q(T) q(C) is disallowed

Database security CSCE Eastman/Farkas - Fall Tracker Attack Tracker C C1 C2 C=C1 and C2 T=C1 and ~C2 D C and D q(C and D)= q(T or C and D) – q(T) q(C and D) is disallowed

Database security CSCE Eastman/Farkas - Fall Query Overlap Attack C1 C2 John Kathy Max Fred Eve Paul Mitch Q(John)=q(C1)-q(C2) Protection: query-overlap control

Database security CSCE Eastman/Farkas - Fall Insertion/Deletion Attack Observing changes overtime q 1 =q(C) insert(i) q 2 =q(C) q(i)=q 2 -q 1 Protection: insertion/deletion performed as pairs

Database security CSCE Eastman/Farkas - Fall Summary of Controls Limited response suppression Combined results, including ranges Random sample Random data perturbation Query analysis

Database security CSCE Eastman/Farkas - Fall Statistical Inference Theory  Given an unlimited number of statistics and correct statistical answers, all statistical databases can be compromised (Ullman)

Database security CSCE Eastman/Farkas - Fall The Inference Problem General purpose DBs Usually transaction oriented Retrieve nonsensitive data and infer sensitive data Inference via database constraints Inference via updates

Database security CSCE Eastman/Farkas - Fall Database Constraints Integrity constraints Database dependencies Key integrity

Database security CSCE Eastman/Farkas - Fall Integrity Constraints C=A+B A=public, C=public, and B=secret B can be calculated from A and C, i.e., secret information can be calculated from public data

Database security CSCE Eastman/Farkas - Fall Database Dependencies Functional dependencies Multi-valued dependencies Join dependencies

Database security CSCE Eastman/Farkas - Fall Functional Dependency FD: A  B For any two tuples in the relation, if they have the same value for A, they must have the same value for B.

Database security CSCE Eastman/Farkas - Fall Example FD: Rank  Salary Secret information: Name and Salary together Query1: Name and Rank Query2: Rank and Salary Combine answers for Queries 1 and 2 to reveal Name and Salary together

Database security CSCE Eastman/Farkas - Fall Key Integrity Every tuple in the relation has a unique key Users at different levels see different versions of the database Users might attempt to update data that is not visible for them

Database security CSCE Eastman/Farkas - Fall Example Name (key)SalaryAddress Black P38,000 PColumbia S Red S42,000 SIrmo S Secret View Name (key)SalaryAddress Black P38,000 PNull P Public View

Database security CSCE Eastman/Farkas - Fall An Update Public User 1.Update Black’s address to Orlando 2.Add new tuple: (Red, 22,000, Manassas)

Database security CSCE Eastman/Farkas - Fall Update Results If Refuse update: covert channel Allow update: Overwrite high data – may be incorrect Create new tuple – which data is correct? (polyinstantiation) – violate key constraints

Database security CSCE Eastman/Farkas - Fall Another Update Name (key)SalaryAddress Black P38,000 PColumbia S Red S42,000 SIrmo S Secret user Update Black’s salary to 45,000

Database security CSCE Eastman/Farkas - Fall Update Results If Refuse update: covert channel Allow update: Overwrite low data – covert channel Create new tuple – which data is correct? (polyinstantiation) – violate key constraints

Database security CSCE Eastman/Farkas - Fall Inference Problem No general technique is available to solve the problem Need assurance of protection Hard to incorporate outside knowledge

Database security CSCE Eastman/Farkas - Fall Some Recent Work C. Farkas (and others) – keep history file for user to prevent access to data items that would allow inference – limited to static databases T. Toland (and others) – extend this work to handle dynamic databases with updates