Data Access and Security in Multiple Heterogeneous Databases Afroz Deepti.

Slides:



Advertisements
Similar presentations
NRL Security Architecture: A Web Services-Based Solution
Advertisements

Review Indra Budi Fakultas Ilmu Komputer UI 2 Database Introduction Database vs File Processing Main purpose of database Database Actors.
Distributed databases
A Privacy Preserving Repository for Securing Data across the Cloud ENMING LI UIN: CS775 Presentation.
Advanced Database Systems September 2013 Dr. Fatemeh Ahmadi-Abkenari 1.
1 ARPA A regional infrastructure for secure role-based access to RTRT services Ing. Laura Castellani Tuscany Region.
Information Integration. Modes of Information Integration Applications involved more than one database source Three different modes –Federated Databases.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Overview Distributed vs. decentralized Why distributed databases
1 Lecture 13: Database Heterogeneity Debriefing Project Phase 2.
2005Integration-intro1 Data Integration Systems overview The architecture of a data integration system:  Components and their interaction  Tasks  Concepts.
Architectural Design Principles. Outline  Architectural level of design The design of the system in terms of components and connectors and their arrangements.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Geneva, Switzerland, September 2014 Introduction of ISO/IEC Identity Proofing Patrick Curry Director, British Business Federation Authority.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Distributed Databases
Service Broker Lesson 11. Skills Matrix Service Broker Service Broker, provides a solution to common problems with message delivery and consistency that.
Software Architecture April-10Confidential Proprietary Master Data Management mainly inspired from Enterprise Master Data Management – An SOA approach.
Extended Role Based Access Control – Based Design and Implementation for a Secure Data Warehouse Dr. Bhavani Thuraisingham Srinivasan Iyer.
Chapter 2 Database System Concepts and Architecture
Distributed Database The University of California Berkeley Extension Copyright © 2011 Patrick McDermott.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
1 Distributed Database Concepts 8:30-10:00AM Thursday, July 21 st 2005 CSIG05 Chaitan Baru.
 Definition  Components  Advantages  Limitations Contents  DBMS DBMS  Functions Functions  Architecture Architecture.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
2. Database System Concepts and Architecture
Belnet Federation Belnet – Loriau Nicolas Brussels – 12 th of June 2014.
Csi315csi315 Client/Server Models. Client/Server Environment LAN or WAN Server Data Berson, Fig 1.4, p.8 clients network.
Massively Distributed Database Systems - Distributed DBS Spring 2014 Ki-Joune Li Pusan National University.
DDBMS Distributed Database Management Systems Fragmentation
1 By Paul Murray Claire McQuade Kashif Rafiq David Miller.
Elmasri and Navathe, Fundamentals of Database Systems, Fourth Edition Copyright © 2004 Pearson Education, Inc. Slide 2-1 Data Models Data Model: A set.
Chapter 2 Database System Concepts and Architecture Dr. Bernard Chen Ph.D. University of Central Arkansas.
Security, Accounting, and Assurance Mahdi N. Bojnordi 2004
GBIF Data Access and Database Interoperability 2003 Work Programme Overview Donald Hobern, GBIF Programme Officer for Data Access and Database Interoperability.
Information Integration BIRN supports integration across complex data sources – Can process wide variety of structured & semi-structured sources (DBMS,
Martin Endig, Gunter Saake, Eike Schallehn - Federation Services for Heterogeneous Document Sources Federation Services for Heterogeneous Document Sources.
Issues in Ontology-based Information integration By Zhan Cui, Dean Jones and Paul O’Brien.
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Secure Sharding.
11 Restricting key use with XACML* for access control * Zack’-a-mul.
Globus: A Report. Introduction What is Globus? Need for Globus. Goal of Globus Approach used by Globus: –Develop High level tools and basic technologies.
 Distributed Database Concepts  Parallel Vs Distributed Technology  Advantages  Additional Functions  Distribution Database Design  Data Fragmentation.
Omniran CF00 1 Key Concepts of Authentication and Trust Establishment Date: Authors: NameAffiliationPhone Max RiegelNokia Networks+49.
Andrew J. Hewatt, Gayatri Swamynathan and Michael T. Wen Department of Computer Science, UC-Santa Barbara A Case Study of the WS-Security Framework.
1 Chapter 22 Distributed DBMS Concepts and Design CS 157B Edward Chen.
Lecture On Introduction (DBMS) By- Jesmin Akhter Assistant Professor, IIT, Jahangirnagar University.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
1 SUBMITTED BY- PATEL KUMAR C.S.E(8 th - sem). SUBMITTED TO- Mr. DESHRAJ AHIRWAR.
DM Collaboration – OMA & BBF: Deployment Scenarios Group Name: WG5 - MAS Source: Tim Carey, ALU, Meeting Date:
Databases and DBMSs Todd S. Bacastow January 2005.
CHAPTER 25 - Distributed Databases and Client–Server Architectures
Chapter 2 Database System Concepts and Architecture
Distributed Databases
Database Systems: Design, Implementation, and Management Tenth Edition
Privacy Preserving Record Linkage
A Privacy-Preserving Index for Range Queries
Security & .NET 12/1/2018.
Distributed Databases
Example Use Case for Attribute Authorities and Token Translation Services - the case for eduGAIN Andrea Biancini.
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Distributed Database Management System
Views Base Relation View
Data and Applications Security Developments and Directions
Presentation transcript:

Data Access and Security in Multiple Heterogeneous Databases Afroz Deepti

INTRODUCTION Need to share and access data over multiple heterogeneous databases. Two approaches which deal with data access and security over multiple heterogeneous databases: - Federated Database Management System (FDBMS). - Mediated Databases.

Federation Database Architecture A Federated database system is a distributed system that provides global interface to heterogeneous local database management systems. Five layer Architecture: Local level Component Level Export Level Federation Level External Level

Data Access in FDBMS

Mediated Databases Mediators are the components which mediate between the client and the sources for the data access. Mediators use attributes of clients for eligibility of data unlike Federation which is Identity based. Data access can be divided in to two phases: Request phase A client sends a global query to mediator, the mediator decomposes the query into set of sub queries and then it sends the sub query to the appropriate sources Delivery phase In the delivery phase a source evaluates its sub query, produces a sub answer and sends back to mediator. The mediator integrates all the sub answers into global answer using wrappers[1] and sends it back to client.[1]

Mediation Database Architecture

Secure Mediation The client submits the personal authorization attributes which are encoded in credentials to mediators. Decomposes the query in to sub query and forwards it to the data sources. The data sources based on the credentials return the sub query answers in the encrypted form using client’s public key. Integrates the sub answers to form a global answer which is still in an encrypted form.

Federation Vs Mediation Since the authorization is based on attributes rather than identities, the anonymity of the participating entities is preserved. Unlike federation, the participants in Mediation need not be closed. Mediation uses top-down and hence any changes to local schema doesn’t affect the data integration. In federation, the Metadata is revealed to the participating entities.

Contd. The mediators integrate only those parts of information sources that are crucial to users query via wrappers. Performance degradation occurs in federated database systems due to complexity in processing as every global query must propagate through the five levels of architecture. In federation, mutual trust between the participants is high which is not good for confidentiality of data.

Federation Vs Mediation

Conclusion There is a drastic need for maximum privacy and confidentiality of the data. This is achieved by the Mediator approach combined with concepts such as encryption and credentials.

Questions