CSCE 824 Secure (and Distributed) Database Management Systems FarkasCSCE 824 1.

Slides:



Advertisements
Similar presentations
©Silberschatz, Korth and Sudarshan4.1Database System Concepts Lecture-1 Database system,CSE-313, P.B. Dr. M. A. Kashem Associate. Professor. CSE, DUET,
Advertisements

Adapted from: ©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Fly-over Introduction Purpose of Database Systems View of Data Data.
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Introduction Purpose of Database Systems View of Data Data Models Data Definition.
Database Management System (DBMS)
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Introduction Purpose of Database Systems View of Data Data Models Data Definition.
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Introduction n Why Database Systems? n Data Models n Data Definition Language.
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Introduction Database Management Systems Purpose of Database Systems View of Data.
1 Chapter 2 Database Environment. 2 Objectives of Three-Level Architecture u All users should be able to access same data u User’s view immune to changes.
Lecture Two Database Environment Based on Chapter Two of this book:
Dr. Kalpakis CMSC 461, Database Management Systems Introduction.
Introduction to DBMS Purpose of Database Systems View of Data
Database Environment 1.  Purpose of three-level database architecture.  Contents of external, conceptual, and internal levels.  Purpose of external/conceptual.
CS462: Introduction to Database Systems. ©Silberschatz, Korth and Sudarshan1.2Database System Concepts Course Information Instructor  Kyoung-Don (KD)
Database System Concepts, 5th Ed. ©Silberschatz, Korth and Sudarshan See for conditions on re-usewww.db-book.com Chapter 1: Introduction.
Temple University – CIS Dept. CIS616– Principles of Database Systems V. Megalooikonomou Introduction (based on notes by Silberchatz,Korth, and Sudarshan)
ADVANCED DATABASES WITH ORACLE 11g FOR ADDB7311 LEARNING UNIT 1 of 7.
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Lecture 6: Introduction to Database Management Systems Lecturer: Prof. Kazimierz Subieta.
Introduction to Databases
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Database Architecture Introduction to Databases. The Nature of Data Un-structured Semi-structured Structured.
CST203-2 Database Management Systems Lecture 2. One Tier Architecture Eg: In this scenario, a workgroup database is stored in a shared location on a single.
CSCE 727 Information Warfare
Database Management Systems
Introduction to Database Management Systems. Information Instructor: Csilla Farkas Office: Swearingen 3A43 Office Hours: Monday, Wednesday 4:15 pm – 5:30.
Chapter 1 : Introduction §Purpose of Database Systems §View of Data §Data Models §Data Definition Language §Data Manipulation Language §Transaction Management.
Introduction to Database Management Systems. Information Instructor: Csilla Farkas Office: Swearingen 3A43 Office Hours: M,T,W,Th,F 2:30 pm – 3:30 pm,
©Silberschatz, Korth and Sudarshan1.1Database System Concepts COMP319: Introduction Course Structure Course Assessment Review: DBMS Structure Review: Terminology.
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Introduction Purpose of Database Systems View of Data Data Models Data Definition.
Distributed Databases Midterm review. Lectures covered Everything until (including) March 2 nd Everything until (including) March 2 nd Focus on distributed.
Chapter 1 Introduction Yonsei University 1 st Semester, 2015 Sanghyun Park.
CSCE 824 Secure and Distributed Database Management Systems FarkasCSCE 8241.
Introduction to Database Management Systems. Information Instructor: Csilla Farkas Office: Swearingen 3A43 Office Hours: Monday, Wednesday 2:30 pm – 3:30.
Database Environment Chapter 2. Data Independence Sometimes the way data are physically organized depends on the requirements of the application. Result:
Database Environment Session 2 Course Name: Database System Year : 2013.
DATABASE MANAGEMENT SYSTEM By: YAMINI TRIPATHI. INTRODUCTION Consists - Collection of interrelated data - Set of programs to access those data Definition.
Database Architecture Models and Design Ian Horrocks & Robert Stevens room: 2.75/2.91
Chapter 1 Introduction Yonsei University 1 st Semester, 2014 Sanghyun Park.
Mr.Prasad Sawant, MIT Pune India Introduction to DBMS.
Distributed Database Management Systems. Reading Textbook: Ch. 1, Ch. 3 Textbook: Ch. 1, Ch. 3 For next class: Ch. 4 For next class: Ch. 4 FarkasCSCE.
1 Chapter 2 Database Environment Pearson Education © 2009.
ASET 1 Amity School of Engineering & Technology B. Tech. (CSE/IT), III Semester Database Management Systems Jitendra Rajpurohit.
Chapter 1: Introduction. 1.2 Database Management System (DBMS) DBMS contains information about a particular enterprise Collection of interrelated data.
Lecture on Database Management System
Database Environment Chapter 2. The Three-Level ANSI-SPARC Architecture External Level Conceptual Level Internal Level Physical Data.
Databases Salihu Ibrahim Dasuki (PhD) CSC102 INTRODUCTION TO COMPUTER SCIENCE.
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
©Silberschatz, Korth and Sudarshan 1.1 Database System Concepts قواعد البيانات Data Base قواعد البيانات CCS 402 Mr. Nedal hayajneh E- mail
CHAPTER 1: INTRODUCTION Purpose of Database Systems View of Data Data Models Data Definition Language Data Manipulation Language Storage Management Database.
Database System Concepts, 5th Ed. ©Silberschatz, Korth and Sudarshan See for conditions on re-usewww.db-book.com Chapter 1: Introduction.
CS 325 Spring ‘09 Chapter 1 Goals:
Introduction to DBMS Purpose of Database Systems View of Data
REV 00 Chapter 2 Database Environment DDC DATABASE SYSTEM.
Chapter 1: Introduction
Chapter 1: Introduction
Unit 1: INTRODUCTION Database system, Characteristics Database Users
Database Management:.
Chapter 1: Introduction
Introduction to Database Systems
Chapter 1: Introduction
Data Model.
Introduction to Database Management Systems
Introduction to DBMS Purpose of Database Systems View of Data
Chapter 1: Introduction
UNIT-I Introduction to Database Management Systems
Distributed Database Management Systems
Chapter 2 Database Environment Pearson Education © 2014.
Chapter 1: Introduction
Chapter 1: Introduction
Chapter 1: Introduction
Chapter 1: Introduction
Presentation transcript:

CSCE 824 Secure (and Distributed) Database Management Systems FarkasCSCE 824 1

Course Aim Advanced understanding of DBMS concepts Advanced understanding of DBMS concepts –From relation to un- and semi- structured data models –New type of applications –Security needs FarkasCSCE 824 2

Reference Materials Recommended: Recommended: –T. Ozsu and P. Valduriez, Principles of Distributed Database Systems, Springer; 3rd Edition. edition (March 2, 2011), ISBN-10: –M. Gertz, S. Jajodia, Handbook of database security: applications and trend, Springer 2008 –Online materials FarkasCSCE 824 3

Conference Proceedings and Journals Proceedings of Secure Data Management Workshop, links: workshop/sdm12.html, projects.com/sdm-workshop/sdm11.html Proceedings of Secure Data Management Workshop, links: workshop/sdm12.html, projects.com/sdm-workshop/sdm11.htmlhttp:// workshop/sdm12.htmlhttp:// projects.com/sdm-workshop/sdm11.htmlhttp:// workshop/sdm12.htmlhttp:// projects.com/sdm-workshop/sdm11.html Proceedings of IFIP WG 11.3 Data and Application Security and Privacy, links: Proceedings of IFIP WG 11.3 Data and Application Security and Privacy, links: Proceedings of International Conference of Very Large Databases (VLDB), links: Proceedings of International Conference of Very Large Databases (VLDB), links: FarkasCSCE 824 4

Journals and Books IEEE Transactions on Knowledge and Data Engineering (TKDE) IEEE Transactions on Knowledge and Data Engineering (TKDE) ACM Transactions on Information and System Security (TISSEC) ACM Transactions on Information and System Security (TISSEC) M. Gertz, S. Jajodia, Handbook of database security: applications and trend, Springer 2008 M. Gertz, S. Jajodia, Handbook of database security: applications and trend, Springer 2008 FarkasCSCE 824 5

Challenge Research project : there will be one group research project. Students must present the related work and their results to the class in the last lectures of the semester. Research project : there will be one group research project. Students must present the related work and their results to the class in the last lectures of the semester. Homework assignments. There will be several homework exercises and reading for the lectures. Homework assignments. There will be several homework exercises and reading for the lectures. Tests : there will be two tests covering the course materials. Both tests are open book, in-class tests. Tests : there will be two tests covering the course materials. Both tests are open book, in-class tests. FarkasCSCE 824 6

Grading Research project: 35%, Test 1 : 20%, Test 2: 25%, Homework assignment: 20% Research project: 35%, Test 1 : 20%, Test 2: 25%, Homework assignment: 20% 90 < A; 87 < B+ <= 90; 80 < B <= 87; 76 < C+<=80; 90 < A; 87 < B+ <= 90; 80 < B <= 87; 76 < C+<=80; 65 < C <= 76; 60 < D+ <= 65; 50 <D <= < C <= 76; 60 < D+ <= 65; 50 <D <= 60 FarkasCSCE 824 7

Topics Covered Weeks 1-5: Distributed and Non- traditional Databases Weeks 1-5: Distributed and Non- traditional Databases Weeks 6-11: Database Security Weeks 6-11: Database Security Weeks 12-15: Student Presentations Weeks 12-15: Student Presentations FarkasCSCE 824 8

Students’ Introduction Students’ Introduction Name Major Interest in class FarkasCSCE 824 9

CSCE Farkas 10 Information Assurance Studies

IA Specialization Graduate level Graduate level Core Requirement (3 Hours) Core Requirement (3 Hours) – CSCE 522: Information Security Principles (3 credits) – meets CNSS 4011 standard Additional Requirements: Additional Requirements: –Elective IA course (3 credit) –2 nd elective course (3 credits) or 500-level or above CSCE course with IA project component 11

12 CNSS Certifications Old criteria: National Training Standard for Information Systems Security Professionals, CNSSI No National Training Standard for System Administrators in Information Systems Security, CNSSI No National Training Standard for Information Systems Security Officers, CNSSI No New criteria: Knowledge Units

13 IA&S Courses Offered since new courses – 4 undergraduate and graduate – 8 graduate students only Approved by USC Accredited by the Committee on National Security Systems (CNSS)

14 IA&S Certificate Program (modifications are approved, starting Fall 2016)

15 12 hours of graduate study with B average – 6 hours core courses – 6 hours of elective courses Graduation requirements

16 Core Courses CSCE 522 – Information Systems Security Principles – offered every Fall semester -- APOGEE CSCE 715– Network Security – offered every Fall semester

17 Elective Courses CSCE 517 – Computer Crime and Forensics CSCE 557 – Introduction to Cryptography CSCE 548 – Secure Software Construction CSCE 716 – Design for Reliability CSCE 717 – Comp. Systems Performance CSCE 727 – Information Warfare CSCE 813 – Internet Security CSCE 814 – Distributed Systems Security CSCE 824 – Secure Databases

18 Center for Information Assurance Engineering (CIAE) Information about: Information about: –Research –Education –Publications –People –Useful links

Questions? FarkasCSCE

FarkasCSCE Database Management System (DBMS) Collection of Collection of –interrelated data and –set of programs to access the data Convenient and efficient processing of data Convenient and efficient processing of data Database Application Software Database Application Software

FarkasCSCE Evolution of Database Systems Early days: customized applications built on top of file systems Early days: customized applications built on top of file systems Drawbacks of using file systems to store data: Drawbacks of using file systems to store data: –Data redundancy and inconsistency –Difficulty in accessing data –Atomicity of updates –Concurrency control –Security –Data isolation — multiple files and formats –Integrity problems

FarkasCSCE Abstraction View level: different perspectives View level: different perspectives –Application programs hide irrelevant data Logical level: data models Logical level: data models –Logical representation of data –Different approaches: hierarchical, network, object oriented, semi-structured, etc. – Data independence principle Physical level: how data is stored Physical level: how data is stored

FarkasCSCE Data Models A collection of tools for describing A collection of tools for describing –Data –Relationships among data items –Semantics of stored data –Database constraints

FarkasCSCE Database Management Systems Smaller and smaller systems Smaller and smaller systems –Past: large and expensive DBMS –Present: DBMS in most personal computers More and more data stored – BIG DATA More and more data stored – BIG DATA –Past: few MB –Present: terabyte (10 12 bytes), petabyte (10 15 bytes) Functionality: from physical to view level Functionality: from physical to view level Optimization Optimization

FarkasCSCE Data Definition Language (DDL) Defines the database schema and constraints Defines the database schema and constraints DDL compiler  DDL compiler  data dictionary Metadata – data about data Metadata – data about data

FarkasCSCE Data Manipulation Language (DML) Accessing and manipulating the data Accessing and manipulating the data Query Languages Query Languages –Procedural – user specifies what data is required and how to get those data –Nonprocedural – user specifies what data is required without specifying how to get those data

Current Demands Efficient data processing of large data sets Efficient data processing of large data sets Long running transactions Long running transactions Real-time demand Real-time demand Usability for specific applications Usability for specific applications … FarkasCSCE

Data Security

FarkasCSCE Security Objectives Confidentiality: prevent/detect/deter improper disclosure of information Confidentiality: prevent/detect/deter improper disclosure of information Integrity: prevent/detect/deter improper modification of information Integrity: prevent/detect/deter improper modification of information Availability: prevent/detect/deter improper denial of access to services Availability: prevent/detect/deter improper denial of access to services

FarkasCSCE Security Threats Poor design Poor design Insufficient quality control Insufficient quality control Accidents Accidents Attacks Attacks

FarkasCSCE Achieving Security Policy Policy –What to protect? Mechanism Mechanism –How to protect? Assurance Assurance –How good is the protection?

FarkasCSCE Database Security Security Policy Security Policy Access control models Access control models Inference control Inference control Integrity protection Integrity protection Privacy problems Privacy problems Fault tolerance and recovery Fault tolerance and recovery Auditing and intrusion detection Auditing and intrusion detection TOOLS TOOLS

FarkasCSCE Next Class Relational data model