A Unifying Approach to the Design of a Secure Database Operating System Written By: David L. Spooner Ehud Gudes.

Slides:



Advertisements
Similar presentations
Introduction to Databases
Advertisements

Chapter 6 Methodology Conceptual Databases Design Transparencies © Pearson Education Limited 1995, 2005.
File Systems and Databases
Database Management: Getting Data Together Chapter 14.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Introduction to Databases
Ch1: File Systems and Databases Hachim Haddouti
11 3 / 12 CHAPTER Databases MIS105 Lec14 Irfan Ahmed Ilyas.
Data Management I DBMS Relational Systems. Overview u Introduction u DBMS –components –types u Relational Model –characteristics –implementation u Physical.
Introduction to Databases Transparencies
Chapter 1 An Overview of Database Management. 1-2 Topics in this Chapter What is a Database System? What is a Database? Why Database? Data Independence.
Databases and Database Management Systems
Methodology Conceptual Database Design
Mgt 20600: IT Management & Applications Databases Tuesday April 4, 2006.
Chapter 1 Introduction to Databases
1 Chapter 2 Database Environment. 2 Chapter 2 - Objectives u Purpose of three-level database architecture. u Contents of external, conceptual, and internal.
Database Management Systems (DBMS)
Introduction to Databases Transparencies 1. ©Pearson Education 2009 Objectives Common uses of database systems. Meaning of the term database. Meaning.
Chapter One Overview of Database Objectives: -Introduction -DBMS architecture -Definitions -Data models -DB lifecycle.
LECTURE 2 DATABASE SYSTEM CONCEPTS AND ARCHITECTURE.
Introduction to Database Concepts
Week 1 Lecture MSCD 600 Database Architecture Samuel ConnSamuel Conn, Asst. Professor Suggestions for using the Lecture Slides.
DBMS By Narinder Singh Computer Sc. Deptt. Topics What is DBMS What is DBMS File System Approach: its limitations File System Approach: its limitations.
 Introduction Introduction  Purpose of Database SystemsPurpose of Database Systems  Levels of Abstraction Levels of Abstraction  Instances and Schemas.
Chapter 1 Overview of Database Concepts Oracle 10g: SQL
STORING ORGANIZATIONAL INFORMATION— DATABASES CIS 429—Chapter 7.
 DATABASE DATABASE  DATABASE ENVIRONMENT DATABASE ENVIRONMENT  WHY STUDY DATABASE WHY STUDY DATABASE  DBMS & ITS FUNCTIONS DBMS & ITS FUNCTIONS 
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
Methodology - Conceptual Database Design Transparencies
Software School of Hunan University Database Systems Design Part III Section 5 Design Methodology.
Methodology Conceptual Databases Design
9/14/2012ISC329 Isabelle Bichindaritz1 Database System Life Cycle.
1 Chapter 15 Methodology Conceptual Databases Design Transparencies Last Updated: April 2011 By M. Arief
Organizing Data and Information AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
1 Welcome: To the second learning sequence “ Data Base (DB) and Data Base Management System (DBMS) “ Recap : In the previous learning sequence, we discussed.
Databases and Database Management Systems
Database Organization and Design
Lecture 2 An Overview of Relational Database IST 318 – DB Admin.
Chapter 1 : Introduction §Purpose of Database Systems §View of Data §Data Models §Data Definition Language §Data Manipulation Language §Transaction Management.
Methodology - Conceptual Database Design. 2 Design Methodology u Structured approach that uses procedures, techniques, tools, and documentation aids to.
1/26/2004TCSS545A Isabelle Bichindaritz1 Database Management Systems Design Methodology.
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Introduction Purpose of Database Systems View of Data Data Models Data Definition.
 Three-Schema Architecture Three-Schema Architecture  Internal Level Internal Level  Conceptual Level Conceptual Level  External Level External Level.
Methodology - Conceptual Database Design
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
Module 2: Information Technology Infrastructure Chapter 5: Databases and Information Management.
DataBase Management System What is DBMS Purpose of DBMS Data Abstraction Data Definition Language Data Manipulation Language Data Models Data Keys Relationships.
Chapter 1 Introduction to Databases © Pearson Education Limited 1995, 2005.
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
Database Environment Chapter 2. Data Independence Sometimes the way data are physically organized depends on the requirements of the application. Result:
Introduction to database system What is a Database system? What is a Database system? Data System Components Data System ComponentsDataHardwareSoftwareUser.
DATABASE MANAGEMENT SYSTEM ARCHITECTURE
CIS/SUSL1 Fundamentals of DBMS S.V. Priyan Head/Department of Computing & Information Systems.
1 Introduction to Databases. 2 Examples of Database Applications u Purchases from the supermarket u Purchases using your credit card u Booking a holiday.
1 Chapter 1 Introduction to Databases Transparencies.
Database Management Systems (DBMS)
Academic Year 2014 Spring Academic Year 2014 Spring.
1 Database Environment. 2 Objectives of Three-Level Architecture u All users should be able to access same data. u A user’s view is immune to changes.
Chapter 3: Relational Databases
Introduction: Databases and Database Systems Lecture # 1 June 19,2012 National University of Computer and Emerging Sciences.
Introduction to DBMS Purpose of Database Systems View of Data
Chapter 2 Database Environment.
Database Database is a large collection of related data that can be stored, generally describes activities of an organization. An organised collection.
Chapter 2 Database Environment.
Chapter 2 Database Environment.
Introduction to DBMS Purpose of Database Systems View of Data
Presentation transcript:

A Unifying Approach to the Design of a Secure Database Operating System Written By: David L. Spooner Ehud Gudes

DATABASE MANAGEMENT SYSTEM Database: a very large, integrated collection of data. Models a real-world enterprise – Entities (e.g., teams, games) – Relationships (e.g., The Forty-Niners are playing in The Superbowl) – More recently, also includes active components, often called “ business logic ”. (e.g., the BCS ranking system) A Database Management System (DBMS) is a software system designed to store, manage, and facilitate access to databases.

PROBLEM Tuning of the DBMS to enhance performance of database applications is difficult because of incompatible tuning of the OS. The OS file system and access methods are often insufficient for a DBMS, forcing the DBMS to implement its own extensions. This in turn can lead to much duplication between the DBMS and OS. The DBMS is often forced to rely completely on the OS for some aspects of security.

An Approach to Solving These Problems The ideas of McDonnell and Gagliardi are used in the design of the database operating system proposed here. The I/O and file support features of the DBMS and OS are integrated into one unified I/O subsystem, eliminating the duplication. The primary responsibility of this subsystem is physical I/O between main memory and secondary storage. Both the DBMS and OS make use of this subsystem as needed. Successful security systems demand that security enforcement be a central design issue Security enforcement mechanisms must be integrated with basic object addressing mechanisms to produce a reliable and secure system design

Overall System Organization Using the concept of subsystems, the design of the database operating system becomes that shown in the Fig.

THE LOGICAL OBJECT MODEL Definition of the Model -To design a unified model for the DBMS/OS interface, one must have a model for the stored information in the computer system. -The information in the database to be structured into objects which can be handled identically to the physical objects in OS. A logical object type is defined recursively as: 1 ) a single attribute (simple); 2) a set of logical object types (structured); 3)a set of between m and n repetitions of a single logical object type.

THE SECURITY SUBSYSTEM The design of the security subsystem for the database operating system was done with the following functional requirements in mind. - a user should be granted access to an object only if he requires access. - Access control must be a function of the object type, subject, and operation. - It must be possible to implement simple content-dependent security policy where access to an object depends on the value of the object. -A user process must have the ability to spawn independent sub processes with a subset of the privileges of the parent process.

THE I/O SUBSYSTEM > The I/0 subsystem, with the cooperation of the security sub-system, is responsible for implementing the logical object operations. > The retrieve operation is used to create a capability for a particular object. > The access and the modify operations each require a capability for a simple object as an argument, and are used to obtain or to change, respectively, the value of the simple object addressed by the capability. > The create and delete operations are used to create and delete occurrences of the repeating object.

DESIGN ISSUES >Performance is an important issue in the design of the database operating system. >Many design issues can significantly affect performance. -- Preauthorization of object >Another important design issue concerns aggregates of objects.In the present definition of the security subsystem, every object ttype has an access list, and every access to an object involves a capability. If the granularity of objects is small, this involves a lot of overhead.

Conclusion Flexibility of the Design - The mechanism is provided to define and manipulate complex structures of objects. -Field level security policies are possible with access time checking of rights -There is no facility in the model to provide access control between different modules within one process.Access control is only available between processes. -The object model is not powerful enough to support data structure such as linked list

Future Research Many open problems and extensions to the design remain to be investigated. There are many other important areas in the DBMS/OS which need to be studied. Currency control mechanism Design Flexibility

References [1] G. Andrews and J. McGraw, "Language features for process interaction," in Proc. ACM Conf. Language Design for Reliable Software, 1977, pp [2].J. Arditi and E. Zakovsky, "An authorization mechanism for a database," in Databases: Improving Usability and Responsiveness, 1978, pp [3]., "System R: Relational approach to database Pennsylvania State University, University Park, management," ACM Trans. DataBase Syst., vol. 1, pp , Pennsylvania State university,, June 1976

THANK YOU QUESTIONS?????