Download presentation
Presentation is loading. Please wait.
Published byAlyson Shepherd Modified over 8 years ago
1
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #11 Secure Heterogeneous and Federated Data Management February 15, 2005
2
Outline l Background on heterogeneous and federated data management l Secure heterogeneous data management l Secure federated data management l Emerging technologies - Secure client-server computing - Security for system migration
3
Interoperability of Heterogeneous Database Systems Database System A Database System B Network Database System C (Legacy) Transparent access to heterogeneous databases - both users and application programs; Query, Transaction processing (Relational) (Object- Oriented)
4
Technical Issues on the Interoperability of Heterogeneous Database Systems l Heterogeneity with respect to data models, schema, query processing, query languages, transaction management, semantics, integrity, and security policies l Federated database management - Collection of cooperating, autonomous, and possibly heterogeneous component database systems, each belonging to one or more federations l Interoperability based on client-server architectures
5
Federated Database Management Database System A Database System B Database System C Cooperating database systems yet maintaining some degree of autonomy Federation F1 Federation F2
6
Schema Integration and Transformation in a Federated Environment Adapted from Sheth and Larson, ACM Computing Surveys, September 1990 Component Schema for Component A Component Schema for Component B Component Schema for Component C Generic Schema for Component A Generic Schema for Component B Generic Schema for Component C Export Schema for Component A Export Schema I for Component B Export Schema for Component C Federated Schema for FDS - 1 Federated Schema for FDS - 2 External Schema 1.2Schema 2.1 External Schema 2.2 External Schema 1.1 Export Schema II for Component B External
7
Client-Server Architecture: Example Network Client from Vendor A Client from Vendor B Server from Vendor C Server from Vendor D Database
8
Security Issues l Transforming secure data models l Secure architectures l Security impact on schema integration l Secure policy integration l Incomparable/Overlapping security levels
9
Transforming Secure Data Models EMP: Level = Secret SS#EnameSalary D# 1John20K10 2Paul30K20 3Mary40K20 l Class EMP is Secret l It has 3 instances: l John, Paul and Mary DEPT D#DnameMgr 10 Math Smith U 20PhysicsJones C Level l Class DEPT is Unclassified l It has 2 instances Math and Physics l Math is Unclassified l Physics is Confidential
10
Architecture: Heterogeneous data management
11
Architecture: Federated data management
12
Secure Schema Integration
13
Security Policy Integration
14
Federated Data and Policy Management Export Data/Policy Component Data/Policy for Agency A Data/Policy for Federation Export Data/Policy Component Data/Policy for Agency C Component Data/Policy for Agency B Export Data/Policy
15
Incomparable Security Levels
16
Overlapping Security Levels
17
Secure Query Processing
18
Secure Transaction Processing
19
Constraint Processing
20
Inference Control
21
Secure Client-Server Computing
22
Security for System Migration
23
Challenges l Integrating security policies - Does Usage control model unify all the policies? l Handling different query and transaction algorithms and examining the security impact l Inference Control l Federated data sharing vs security/privacy l Impact of the web
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.