Modeling Security-Relevant Data Semantics Xue Ying Chen Department of Computer Science.

Slides:



Advertisements
Similar presentations
Three-Step Database Design
Advertisements

Database Design: ER Modelling (Continued)
Rasool Jalili; 2 nd semester ; Database Security, Sharif Uni. of Tech. The Jajodia & Sandhu model Jajodia & Sandhu (1991), a model for the application.
The Relational Model and Relational Algebra Nothing is so practical as a good theory Kurt Lewin, 1945.
Chapter 5 Understanding Entity Relationship Diagrams.
1 © Prentice Hall, 2002 Chapter 3: Modeling Data in the Organization Modern Database Management 6 th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred.
Chapter 3 The Relational Model Transparencies © Pearson Education Limited 1995, 2005.
Chapter 2 Data Models Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 3 The Basic (Flat) Relational Model.
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 5 Understanding Entity Relationship Diagrams.
Lecture Fourteen Methodology - Conceptual Database Design
Fundamentals, Design, and Implementation, 9/e COS 346 Day 2.
Chapter 3 © 2005 by Prentice Hall 1 Objectives Definition of terms Definition of terms Importance of data modeling Importance of data modeling Write good.
Chapter 4 Object and Object-Relational Databases (Part ½: Object-Oriented Concepts) Lecturer: H.Ben Othmen Department of Computer Science, Umm Al-Qura.
1 Chapter 2 Database Environment. 2 Chapter 2 - Objectives u Purpose of three-level database architecture. u Contents of external, conceptual, and internal.
Database Design & ER Diagrams
BIS310: Week 7 BIS310: Structured Analysis and Design Data Modeling and Database Design.
2 1 Chapter 2 Data Model Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel.
1 © Prentice Hall, 2002 CMIS564: E/R Modeling Dr. Bordoloi Based on Chapter 3; Modern Database Management 6 th Edition Jeffrey A. Hoffer, Mary B. Prescott,
1 © Prentice Hall, 2002 Chapter 3: Modeling Data in the Organization Modern Database Management 6 th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred.
Computer System Analysis Chapter 10 Structuring System Requirements: Conceptual Data Modeling Dr. Sana’a Wafa Al-Sayegh 1 st quadmaster University of Palestine.
CSE314 Database Systems Data Modeling Using the Entity- Relationship (ER) Model Doç. Dr. Mehmet Göktürk src: Elmasri & Navanthe 6E Pearson Ed Slide Set.
Chapter 13 (Online): Object-Oriented Databases
Lecture 2 The Relational Model. Objectives Terminology of relational model. How tables are used to represent data. Connection between mathematical relations.
Information storage: Introduction of database 10/7/2004 Xiangming Mu.
Chapter 4 The Relational Model Pearson Education © 2014.
© Pearson Education Limited, Chapter 2 The Relational Model Transparencies.
The Relational Model. Review Why use a DBMS? OS provides RAM and disk.
2 1 Chapter 2 Data Models Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
MIS 385/MBA 664 Systems Implementation with DBMS/ Database Management Dave Salisbury ( )
Database Processing: Fundamentals, Design and Implementation, 9/e by David M. KroenkeChapter 2/1 Copyright © 2004 Please……. No Food Or Drink in the class.
Concepts and Terminology Introduction to Database.
DBSQL 3-1 Copyright © Genetic Computer School 2009 Chapter 3 Relational Database Model.
Methodology - Conceptual Database Design. 2 Design Methodology u Structured approach that uses procedures, techniques, tools, and documentation aids to.
1/26/2004TCSS545A Isabelle Bichindaritz1 Database Management Systems Design Methodology.
Lecture2: Database Environment Prepared by L. Nouf Almujally & Aisha AlArfaj 1 Ref. Chapter2 College of Computer and Information Sciences - Information.
1 Relational Databases and SQL. Learning Objectives Understand techniques to model complex accounting phenomena in an E-R diagram Develop E-R diagrams.
Methodology - Conceptual Database Design
DataBase Management System What is DBMS Purpose of DBMS Data Abstraction Data Definition Language Data Manipulation Language Data Models Data Keys Relationships.
MIS 385/MBA 664 Systems Implementation with DBMS/ Database Management
CSE314 Database Systems Lecture 3 The Relational Data Model and Relational Database Constraints Doç. Dr. Mehmet Göktürk src: Elmasri & Navanthe 6E Pearson.
CIS 210 Systems Analysis and Development Week 6 Part I Structuring Systems Data Requirements,
The Relational Model. 2 Relational Model Terminology u A relation is a table with columns and rows. –Only applies to logical structure of the database,
An Introduction to Database Systems دانشگاه علم و فناوری مازندران - طراحی و ایجاد بانک های اطلاعاتی 1.
The Relational Model © Pearson Education Limited 1995, 2005 Bayu Adhi Tama, M.T.I.
Ch 05. Basic Symbols ( manino ). Cardinalities Cardinality Notation.
Chapter 5 Understanding Entity Relationship Diagrams.
Department of Mathematics Computer and Information Science1 CS 351: Database Management Systems Christopher I. G. Lanclos Chapter 4.
LECTURE TWO Introduction to Databases: Data models Relational database concepts Introduction to DDL & DML.
Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke1 The Relational Model Chapter 3.
Introduction: Databases and Database Systems Lecture # 1 June 19,2012 National University of Computer and Emerging Sciences.
1 CS122A: Introduction to Data Management Lecture #4 (E-R  Relational Translation) Instructor: Chen Li.
COP Introduction to Database Structures
Business System Development
Chapter 2 Database Environment.
SysML v2 Formalism: Requirements & Benefits
DATA MODELS.
Chapter 12 Information Systems.
Chapter 2 Database Environment.
Chapter 2 Database Environment Pearson Education © 2009.
Chapter 2 Database Environment.
Chapter 4 Entity Relationship (ER) Modeling
The Jajodia & Sandhu model
Database Systems Instructor Name: Lecture-3.
Chapter 3: Modeling Data in the Organization
Chapter 2 Database Environment Pearson Education © 2009.
The Jajodia & Sandhu model
Chapter 2 Database Environment Pearson Education © 2009.
Presentation transcript:

Modeling Security-Relevant Data Semantics Xue Ying Chen Department of Computer Science

The Structure of Presentation Brief review on the inference problem in a multilevel database Modeling security-relevant data semantics  Security-relevant data semantics  The semantic data model for security An example

Brief Review on the inference problem Definition: In a multilevel database, users are be able to infer information classified at higher security level(s) from the knowledge of data classified at lower security level(s) Methods proposed to deal with the inference problem can be grouped into two categories according to their processing phase  During the database design  During processing the queries

Comparison among methods applied during the database design Previous effort only address integrity properties of data SDMS (Semantic Data Model for Security) represents both integrity and secrecy aspects of data  It can be used to precisely define the security requirements for an application system by domain experts, database designers and security officers  It is a comprehensive taxonomy of security-relevant data semantics that must be captured and understood to implement a multilevel secure database system

Security-Relevant Data Semantics Ⅰ Data Integrity Semantics -- integrity constraints, which specify the valid relationship between the data and the rules for ensuring the validity of the data Constraints on entities Constraints on attributes Constraints on Relationships

Security-Relevant Data Semantics Ⅱ Data integrity constraints on entities( ⅰ ) Uniqueness: each instance of an entity is unique Minimum cardinality: the minimum number of instances that must exist in the database Maximum cardinality: the maximum number of instances of an entity allowed in the database Key(s): attribute(s) or set of attributes that is a key

Security-Relevant Data Semantics Ⅲ Data integrity constraints on entities( ⅱ ) Value-type for a key, such as real, integer, string, etc. Value-type string is extended to : A-String: the value reveals all semantic information P-String: the value reveals partial information N-String: the value contains no semantic information Value-set for a key: the set of valid values for an attribute that is a key Key size: maximum size of a key field

Security-Relevant Data Semantics Ⅳ Data integrity constraints on attributes Value-type Value-set Size Transition compatibility: relationship between the old and new values of the attribute

Security-Relevant Data Semantics Ⅴ Data integrity constraints on relationship between entity/attribute A and entity/attribute B include Minimum cardinality: the minimum number of instances of B required for each instance of A Maximum cardinality: the maximum number of instances of B for each instance of A Uniqueness: for each instance of A there must be a unique instance of B Internal compatibility: the values of A must meet a specified relationship with the values of B (based solely on A and B) External compatibility: the values of A must meet a specified relationship with the values of B (based on some external constant or data object)

Security-Relevant Data Semantics Ⅵ Data secrecy semantics -- secrecy constraints, by which data and combinations of data must be classified Constraints on entities Constraints on raw data Constraints on attributes Constraints on Relationships

Security-Relevant Data Semantics Ⅶ Secrecy constraints on entities( ⅰ ) Classification of an instance: based on one or more of the following conditions Uniform for all instances Conditional, based on a range of values Conditional, based on an enumerated set of values Conditional, based on external criteria User specified at insertion time Classification of entity name (only uniform classification is allowed) Cardinality of aggregation: the aggregation of N instances of an entity are unclassified, but N+1 instances are classified

Security-Relevant Data Semantics Ⅷ secrecy constraints on entities( ⅱ ) Hiding the existence of instances, based on one or more of the following criteria Uniform for all instances Conditional, based on the instance And/or conditional, based on the classification level Identificate: the set of all identificates of an entity. (The concept of identificate will be discuss later)

Security-Relevant Data Semantics Ⅸ Secrecy constraints on raw data: are rarely classified, but are included for completeness Secrecy constraints on attributes: the same as constraints on entities, except the notion identificate

Security-Relevant Data Semantics Ⅹ Secrecy constraints on relationships: the association of two data objects is classified at a level independent of the two data objects Internal criteria: similar to integrity compatibility constraints, base upon either a uniform or conditional selection of instances based on one or both data objects Hiding the existence of a relationship: based on one or more of the following conditions Uniform for all instances Conditional, based on the value of instances of A or B And/or conditional, on the classification of A or B

SDMS Ⅰ The semantic data model for security includes two levels of representation The top level is a graphical representation to show inherent constraints and a language, the Assertion Language for Integrity Constraint Expression (ALICE), for stating explicit constraints Underlying the top level is a logic-based representation which will facilitate the analysis of the application requirements in terms of security

SDMS Ⅱ identificate – an attribute of an object which, from a secrecy perspective, allows the object to be identified Key Near-key

SDMS Ⅲ Structural and integrity constraints The secrecy constructs An example

Reference Modeling Security-Relevant Data Semantics Gary W. Smith