CHAPTER 5 Database Security 1. Objectives  Explain briefly the concept of databases  Identify the security requirement of the databases  List and explain.

Slides:



Advertisements
Similar presentations
CHAPTER OBJECTIVE: NORMALIZATION THE SNOWFLAKE SCHEMA.
Advertisements

Operating System Security
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
File Management Chapter 12. File Management File management system is considered part of the operating system Input to applications is by means of a file.
Security and Integrity
Database Management System
Introduction to Database Management  Department of Computer Science Northern Illinois University January 2001.
Information Security Principles & Applications
Monday, 08 June 2015Dr. Mohamed Osman1 What is Database Administration A high level function (technical Function) that is responsible for ► physical DB.
10/25/2001Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
1 7 Concepts of Database Management, 4 th Edition, Pratt & Adamski Chapter 7 DBMS Functions.
Database Integrity, Security and Recovery Database integrity Database integrity Database security Database security Database recovery Database recovery.
Database Management: Getting Data Together Chapter 14.
Transaction Management and Concurrency Control
Security in Databases. 2 Srini & Nandita (CSE2500)DB Security Outline review of databases reliability & integrity protection of sensitive data protection.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Security in Databases. 2 Outline review of databases reliability & integrity protection of sensitive data protection against inference multi-level security.
Functions of a Database Management System. Functions of a DBMS C.J. Date n Indexing n Views n Security n Integrity n Concurrency n Backup/Recovery n Design.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 10 Transaction Management and Concurrency Control.
Last time Finish OTR Database Security Introduction to Databases
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Chapter 1 Introduction to Databases
SE571 Security in Computing
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
10/5/1999Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Database Systems: Design, Implementation, and Management Ninth Edition
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
IT 221: Introduction to Information Security Principles Lecture 11: Database Security For Educational Purposes Only Revised: November 13, 2002.
File Management Chapter 12. File Management File management system is considered part of the operating system Input to applications is by means of a file.
Chapter 6 – Database Security  Integrity for databases: record integrity, data correctness, update integrity  Security for databases: access control,
Concepts of Database Management Sixth Edition
The University of Akron Dept of Business Technology Computer Information Systems DBMS Functions 2440: 180 Database Concepts Instructor: Enoch E. Damson.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe.
Concepts of Database Management, Fifth Edition
Database Security And Audit. Databasics Data is stored in form of files Record : is a one related group of data (in a row) Schema : logical structure.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Chapter 6 – Database Security  Integrity for databases: record integrity, data correctness, update integrity  Security for databases: access control,
Sensitive Data  Data that should not be made public  What if some but not all of the elements of a DB are sensitive Inherently sensitiveInherently sensitive.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 5 “Database and Cloud Security”.
Chapter 7: Database Systems Succeeding with Technology: Second Edition.
1 Welcome: To the second learning sequence “ Data Base (DB) and Data Base Management System (DBMS) “ Recap : In the previous learning sequence, we discussed.
Chapter 12 Information Systems. 2 Managing Information Information system Software that helps the user organize and analyze data Electronic spreadsheets.
Databases Collections of data. Set of rules to organize data. Types ◦ Relational: use (rows) & columns to organize. ◦ Object oriented: complex data (audio,
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
Next-generation databases Active databases: when a particular event occurs and given conditions are satisfied then some actions are executed. An active.
Chapter No 4 Query optimization and Data Integrity & Security.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
Database Security Outline.. Introduction Security requirement Reliability and Integrity Sensitive data Inference Multilevel databases Multilevel security.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
Pertemuan Ke 7 Agung BP. Pembahasan Integrity for databases: record integrity, data correctness, update integrity Security for databases: access control,
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
DATABASE MANAGEMENT SYSTEM ARCHITECTURE
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 21 November 2, 2004.
Programming Logic and Design Fourth Edition, Comprehensive Chapter 16 Using Relational Databases.
Academic Year 2014 Spring Academic Year 2014 Spring.
Archictecture for MultiLevel Database Systems Jeevandeep Samanta.
Introduction to Databases Dr. Osama AL Rababah. Objectives In this capture you will learn: Some common uses of database systems. The characteristics of.
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 7 Module 7 Data Base Security  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Chapter 13 Managing Transactions and Concurrency Database Principles: Fundamentals of Design, Implementation, and Management Tenth Edition.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Chapter 7 Database Security. SCSR 3413 Computer Security Protecting data is a primary concern to secure systems, user count on the DataBase Management.
Database and Cloud Security
Database Management.
Functions of a Database Management System
Chapter 10 Transaction Management and Concurrency Control
Database Security (Chapter 8, Sections 4-7)
Security in Computing, Fifth Edition
Presentation transcript:

CHAPTER 5 Database Security 1

Objectives  Explain briefly the concept of databases  Identify the security requirement of the databases  List and explain various policies, procedures and technical controls for database security  Explain multilevel secure database  Discuss various technical methods for multilevel secured database 2

INTRODUCTION TO DATABASES  Concept of database: TermMeaning DatabaseCollection of data and a set of rules that organize the data by specifying relationships among the data. Database AdministratorPerson who defines the rules that organize the data and also control who should have access to what parts of the data. DBMSProgram that makes database can interacts with the user. SchemaLogical structure of a database. SubschemaA particular user may access to only part of the database. AttributeThe name of each columns in database. RelationA set of columns. RecordsRelated group of data. Fields or ElementsElementary data items themselves. 3

4  User interact with database managers through commands to the DBMS that retrieve, modify, add or delete fields and record of the database - query.  SELECT NAME = ‘ADAM’  This queries will retrieve all records having the value ADAM in the NAME field.  Advantages of the database:  Shared access  Data consistency  Minimal redundancy  Data integrity  Controlled access

SECURITY REQUIREMENTS 5  Physical database integrity: the data of the database are immune to physical problems such as power failures.  Logical database integrity: the structure of the database is preserve – modifying would not affect other field.  Element integrity: the data contained in each element are accurate.

6  Auditability: it is possible to track who or what has accessed the elements in the database.  Access control: different user can be restricted to different modes of access.  User authentication: every user is positively identified.  Availability: user can access data for which they are authorized.

Element integrity 7  The integrity of database elements is their correctness or accuracy.  However users and programs make mistakes collecting data, computing results and entering values.  Therefore, its need corrective action:  Field checks: test for appropriate values in a position. (these checks prevent simple errors as the data are entered)  Access Control: to control who can update and make changes to an element.  Maintaining a change log: change log lists every change made to the database

RELIABILITY AND INTEGRITY 8  Database concerns about reliability and integrity can be viewed from three dimension.  Database integrity: database protected against damage – failure of disk drive.  Element integrity: element modifying or deleting must be done by authorized users.  Element accuracy: only correct value are written into the elements of a database.

Reliability and Integrity (cont) 9  Database protection features:  Two-phase update  Sometime only certain type of data item have been modified. The other half would contain the old.  Intent phase: DBMS gathers the resources it needs to perform update.  Commit phase: writing of a commit flag to the database.  Recovery  In the event of failure, backup copy of database reloaded.

Reliability and Integrity (cont) 10  Redundancy / internal consistency  Error detection and correction codes are applied to single fields, records or the entire database.  Concurrency / consistency  No conflict if two users attempt to read the same data items.  Monitor  Unit of a DBMS responsible for the structural integrity of the database.  Check values being entered to ensure their consistency with the rest of the database.  Three types of monitor:  Range comparisons  State constraints  Transition constraints

SENSITIVE DATA 11  Sensitive data means data that should not be made public.  Factors that make data sensitive:  Inherently sensitive  The value itself may be revealing that it is sensitive – defensive missiles locations.  From a sensitive source  The source of the data may indicate a need for confidentiality - informer.  Declare sensitive  Owner of data may have declared that the data to be sensitive – military data.

Sensitive Data (cont) 12  Factors that make data sensitive (cont):  Part of a sensitive attribute or a sensitive record  In a database, an entire attribute or record may be classified as sensitive - salary.  Sensitive in relation to previously disclosed information  Some data become sensitive in the presence of other data – longitude and latitude.

Access Decisions 13  DBMS may consider several factors when deciding whether to permit an access:  Availability of data  Acceptability of access  Assurance of authenticity

Types of disclosures 14  Exact data  Bounds  Negative result  Existence  Probable value

INFERENCE 15  Inference is a way to infer or derive sensitive data from non sensitive data.  Two types of inference:  Direct attack-user tries to determine values of sensitive fields by seeking them directly with queries that yield few records.  Indirect attack-infer final result based on one or more intermediate statistical results.(sum,count,median,tracker attacks,linear system vulnerability)

Control for inference attacks 16  Suppression: sensitive data values are not provided; the query is rejected without response.  Concealing: the answer provided is close to but not exactly the actual value.

Aggregation 17  Building sensitive results from less sensitive inputs.  Addressing the aggregation problem is difficult because its requires the database management system to track which results each user has already received and conceal any result that would let the user derive a more sensitive result.  Recent interest in data mining has gained concern again aggregation.

MULTILEVEL DATABASES 18 The case for differentiated security  Three characteristics of database security:  The security of a single element may be different from the security of other elements of the same record or from other values of the same attributes.  Two levels: sensitive and nonsensitive  The security of an aggregation: a sum, count or a group of values in a database

PROPOSAL FOR MULTILEVEL SECURITY 19  Approaches to multilevel security for databases:  Separation  Partitioning  Encryption  Integrity lock  Sensitivity locks

20  Partitioning:  database is divided into separate databases each at its own level of sensitivity  Similar to maintaining separate files in separate file cabinets  Destroys a basic advantage of databases: elimination of redundancy and improved accuracy through having only one field to update  Encryption:  each level of sensitive data is stored in a table encrypted under a key unique to the level of security  Disadvantage: each field must be decrypted –increase a time to process a query.

21  Integrity lock  The lock is a way to provide both integrity and limited access for a database  “spray paint”-each element is figuratively painted with color that denotes its sensitivity.  He coloring is maintained with the element, not in master database table  each apparent data item consists of three pieces: the actual data item itself, a sensitivity label, and a checksum.

22  The sensitivity label defines the sensitivity of the data, and the checksum is computed across both data and sensitivity label to prevent unauthorized modification of the data item or its label  The sensitivity label should be  unforgeable, so that a malicious subject cannot create a new sensitivity level for an element  unique, so that a malicious subject cannot copy a sensitivity level from another element  concealed, so that a malicious subject cannot even determine the sensitivity level of an arbitrary element

23

24 The third piece of the integrity lock for a field is an error-detecting code, called a cryptographic checksum. To guarantee that a data value or its sensitivity classification has not been changed an appropriate cryptographic checksum includes something unique to the record (the record number), something unique to this data field within the record (the field attribute name ), the value of this element, and the sensitivity classification of the element

25  Sensitivity Lock  is a combination of a unique identifier (such as the record number) and the sensitivity level.  Because the identifier is unique, each lock relates to one particular record  Many different elements will have the same sensitivity level  A malicious subject should not be able to identify two elements having identical sensitivity levels or identical data values just by looking at the sensitivity level portion of the lock. Because of the encryption, the lock's contents, especially the sensitivity level, are concealed from plain view. Thus, the lock is associated with one specific record, and it protects the secrecy of the sensitivity level of that record.

26

Designs of Multilevel Secure Databases 27 Integrity Lock  The intention was to be able to use any (untrusted) database manager with a trusted procedure that handles access control  The sensitive data were obliterated or concealed with encryption that protected both a data item and its sensitivity.  In this way, only the access procedure would need to be trusted because only it would be able to achieve or grant access to sensitive data.  Disadvantages:  The space needed for storing an element must be expanded to contain the sensitivity label  processing time efficiency of an integrity lock  the untrusted database manager sees all data, so it is subject to Trojan horse attacks by which data can be leaked through covert channels.

28 Figure Trusted Database Manager. Trusted Database Manager.

29 Trusted Front End  also known as a guard and operates much like the reference monitor  The trusted front end serves as a one-way filter, screening out results the user should not be able to access.  But the scheme is inefficient because potentially much data is retrieved and then discarded as inappropriate for the user

30

31 commutative filter  is a process that forms an interface between the user and a DBMS.  unlike the trusted front end, the filter tries to capitalize on the efficiency of most DBMSs.  The filter reformats the query so that the database manager does as much of the work as possible, screening out many unacceptable records.  The filter then provides a second screening to select only data to which the user has access.

32  Filters can be used for security at the record, attribute, or element level.  When used at the record level, the filter requests desired data plus cryptographic checksum information; it then verifies the accuracy and accessibility of data to be passed to the user.  At the attribute level, the filter checks whether all attributes in the user's query are accessible to the user and, if so, passes the query to the database manager. On return, it deletes all fields to which the user has no access rights.  At the element level, the system requests desired data plus cryptographic checksum information. When these are returned, it checks the classification level of every element of every record retrieved against the user's level.

33

34 Distributed Databases  In this case, a trusted front end controls access to two unmodified commercial DBMSs: one for all low-sensitivity data and one for all high-sensitivity data.  For example, if the query is a join query having some high- sensitivity terms and some low, the front end has to perform the equivalent of a database join itself.  The distributed database design is not popular because the front end, which must be trusted, is complex, potentially including most of the functionality of a full DBMS itself. In addition, the design does not scale well to many degrees of sensitivity; each sensitivity level of data must be maintained in its own separate database

35  Window/View -is a subset of a database, containing exactly the information that a user is entitled to access  a DBMS for multiple users of different interests (but not necessarily different sensitivity levels) is the ability to create a different view for each user.  For example, the registrar may see only the class assignments and grades of each student at a university, not needing to see extracurricular activities or medical records. The university health clinic, on the other hand, needs medical records and drug-use information but not scores on standardized academic tests.

Exercise 36  Database concern about reliability and integrity can be viewed from three dimensions. Briefly explain about it  Briefly explain three methods provided in most DBMS that can be used to maintain the integrity of the database element.  Explain about inference and how to control it.  What is the purpose of encryption in a multilevel secure database management system  Explain the disadvantage of partitioning as a mean of implementing multilevel security for database.  Explain what is integrity lock multilevel secure database architecture and explain how this architecture can secure integrity in database