SlideShare a Scribd company logo
1 of 40
Chapter 5
Encryption-Based Multilevel
Model For DBMS
Presented by: Ala Eltayeb
Outlines
Introduction
Encryption-Based Multilevel Database Model
Manipulation
Performance Study
Analysis of Experimental Results
Summary
1. Introduction
• Type of encryption in database? Column &row
• Encrypt each tuple (row) in the relation (table)
with an encryption key that depends on the
security level of the tuple (tuple classification).
Encryption-Based
Multi-level Model
Multilevel Relation
Model
Encryption System
The Encryption-based multilevel
security model Characterizes:
I.Utilizing an encryption system as an additional
security layer over the multilevel security layer
for the relational database.
II. Reducing the multilevel database size.
III. Improving the response time of data retrieval
from the multilevel database.
Cont..
• The prototype is used as a research tool for studying
principles and mechanisms of the encryption-based
multilevel model and other multilevel relational database
security models (SeaView, Jajodia–Sandhu, Smith–
Winslett , multilevel relational [MLR], and belief-
consistent models) .
Why used prototype?
1. To determine the relative performance of the
multilevel relational database security
models.
2. The performance cost for applying the
encryption system in multilevel relational
database security.
2. Encryption-Based Multilevel Database
Model
• A symmetric key:-for each unique security
level.
• The user can use the keys :
Security level (key) <= Security level (user)
• The classification attributes are removed.
• Each attribute is encrypted by using:
encryption key that corresponds to the tuple
security classification level (tuple level
encryption).
Example :Data store in MLR and encryption-based
models
Several DBMS Support Encryption
Algorithms
1. DB2(IBM)
- SQL Functions
- Stored Procedures
2. ORACLE
- Transparent Data Encryption (TDE)
Manipulation
• The data manipulation statements in the
encryption-based multilevel database model are :
 INSERT
 DELETE
 SELECT
 UPDATE
 UPLEVEL
The INSERT
Statement
I = attribute
The DELETE Statement
DELETE
FROM R
WHERE P
I = tuple
The SELECT Statement
I = tuple
The UPDATE Statement
I = tuple
The UPLEVEL Statement
• The UPLEVEL statement executed by a user
with security class level L has the following
general form:
UPLEVEL R GET [A1,A2,...,A n] FROM
[C1,C2,...,C n] WHERE P
UPLEVEL Example
user with S security level has
used the UPLEVEL
command to indicate that he
believes the first tuple and
insert the second tuple with S
security level
Cont…
UPLEVEL SOD GET OBJ
FROM M1,DEST FROM
M2 WHERE SHIP
=“Enterprise”
4. Performance Study
• Study performance of multilevel relational database
security models such as SeaView, Jajodia–Sandhu,
Smith– Winslett, MLR, and belief-consistent models
and the encryption-based multilevel database.
• The impact of changing the size and schema of the
relational database on the performance of these
models
Machine that is used for the implementation
consists of :
• CPU speed of 2.2 GHz
• physical RAM size of 3 GB
• hard disk size of 320 GB
• The software used in the implementation is a Microsoft
SQL server 2008 R2 and the experiments’ measurements
were captured at the machine using a monitoring tool
provided by the Microsoft SQL server.
The impact of changing the number of tuples on the performance of
the encryption algorithms in a multilevel database in the selection
query
Cont..
 The experiments investigate the impact of changing :
1) The number of tuples
2) The number of attributes
3) The number of security levels
 These experiments use the CPU response time (in minutes).
 Assume that the base value for the number of tuples is
1,000,000, the base number of attributes is three, and the base
number of security levels is four.
ER diagram for the
timesheet system
SELECT Query
Select * from Employee where department =
‘Sales’
 Supporting encryption in the encryption-based
multilevel database model improves the performance
of the multilevel relational database because database
size is decreased due to removing the extra attributes
used for the class levels.
Impact of changing the number of tuples in the selection
query
Number of attributes = 3
Number of security levels = 4
Impact of changing the number of attributes in the
selection query
Number of tuples = million
Number of security levels = 4
Impact of changing the number of security levels in
the selection query
Number of attributes = 3
Number of tuples = million
JOIN Query
• Select * from Employee join Departure on
Employee.Name = Departure.Name where
Employee. department = ‘Sales’
Impact of changing the number of tuples in the join
query
Number of attributes = 3
Number of security levels = 4
Impact of changing the number of attributes in the
join query
Number of tuples = million
Number of security levels = 4
Impact of varying the number of security levels in the join
query
Number of attributes = 3
Number of tuples = million
Cont…
 Supporting encryption in the encryption-based
multilevel database model improves the
performance of the multilevel relational
database because database size is decreased
due to removing the extra attributes used for
the class levels.
Impact of varying the number of tuples in
an update query
Number of attributes = 3
Number of security levels = 4
Cont..
 Supporting encryption in the encryption-based
multilevel database model decreases the
performance of a multilevel database because,
during the execution of the update statement.
 The encryption and decryption mechanisms will
be included together in the update procedure.
Hierarchical of Model Performance
Smith-Winslett
MLR
Blief-Consistent
Jajodia-Sandhu
SeaView
High performance
Analysis of Experimental Results
• The performance of the Smith–Winslett model is the best.
• The MLR model offers less performance than the Smith–
Winslett model because it supports the security
classification at the level of each single attribute.
• The belief-consistent model has less performance than
the MLR model because it supports a combination of the
security classification levels for each single attribute to
enable the user to assert his beliefs of lower level users’
information.
Cont…
• The Jajodia–Sandhu model has bad performance
because of the impact of union operation between
single-level relations in the recovery algorithm.
• The SeaView model has very bad performance
because of the impact of the JOIN operation between
vertical single-level relations and union operation
between horizontal single-level relations in the
recovery algorithm.
Comparison between MLR and
Encryption –Based model
 The encryption- based multilevel database model has
performance better than the performance of the MLR
model in retrieving data from the multilevel database.
 The performance of the encryption-based multilevel
database model is less than the performance of the MLR
model in updating data because the overhead of
supporting the encryption algorithm in the update query is
executed.
Summary
 The encryption-based multilevel model overview.
 Comparison the performance of MLR models and encryption-
based model.
 Supporting encryption in multilevel relational database:
1. Improve performance of the retrieving data in the SELECT
and JOIN queries.
2.Bad performance because of the extra CPU processing results.

More Related Content

Viewers also liked

Scalable and secure sharing of public health record using attribute based Enc...
Scalable and secure sharing of public health record using attribute based Enc...Scalable and secure sharing of public health record using attribute based Enc...
Scalable and secure sharing of public health record using attribute based Enc...shreyank byadagi
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1ahfiki
 
How to Draw an Effective ER diagram
How to Draw an Effective ER diagramHow to Draw an Effective ER diagram
How to Draw an Effective ER diagramTech_MX
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Relational cloud, A Database-as-a-Service for the Cloud
Relational cloud, A Database-as-a-Service for the CloudRelational cloud, A Database-as-a-Service for the Cloud
Relational cloud, A Database-as-a-Service for the CloudHossein Riasati
 
Database Security
Database SecurityDatabase Security
Database Securityalraee
 
Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Jitendra s Rathore
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

Viewers also liked (16)

Scalable and secure sharing of public health record using attribute based Enc...
Scalable and secure sharing of public health record using attribute based Enc...Scalable and secure sharing of public health record using attribute based Enc...
Scalable and secure sharing of public health record using attribute based Enc...
 
Final review presentation
Final review presentationFinal review presentation
Final review presentation
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
Database Security
Database SecurityDatabase Security
Database Security
 
Database security
Database securityDatabase security
Database security
 
Database security
Database securityDatabase security
Database security
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1
 
How to Draw an Effective ER diagram
How to Draw an Effective ER diagramHow to Draw an Effective ER diagram
How to Draw an Effective ER diagram
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network security
Network securityNetwork security
Network security
 
Relational cloud, A Database-as-a-Service for the Cloud
Relational cloud, A Database-as-a-Service for the CloudRelational cloud, A Database-as-a-Service for the Cloud
Relational cloud, A Database-as-a-Service for the Cloud
 
Database Security
Database SecurityDatabase Security
Database Security
 
Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similar to Encryption-Based Multilevel Model for DBMS

Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationIRJET Journal
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data StorageIRJET Journal
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced DatabasesIOSR Journals
 
Enhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group MembersEnhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
 
IncQuery-D: Incremental Queries in the Cloud
IncQuery-D: Incremental Queries in the CloudIncQuery-D: Incremental Queries in the Cloud
IncQuery-D: Incremental Queries in the CloudGábor Szárnyas
 
Multi-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud StorageMulti-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud StorageIRJET Journal
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...IRJET Journal
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
 
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloudKoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloudTobias Koprowski
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataShakas Technologies
 
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...Akhil Kumar Pappula
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET Journal
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Trupti Shiralkar, CISSP
 
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentTrust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentIRJET Journal
 

Similar to Encryption-Based Multilevel Model for DBMS (20)

Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced Databases
 
Q01725110114
Q01725110114Q01725110114
Q01725110114
 
Enhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group MembersEnhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group Members
 
dbms ppt .pptx
dbms ppt .pptxdbms ppt .pptx
dbms ppt .pptx
 
IncQuery-D: Incremental Queries in the Cloud
IncQuery-D: Incremental Queries in the CloudIncQuery-D: Incremental Queries in the Cloud
IncQuery-D: Incremental Queries in the Cloud
 
Multi-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud StorageMulti-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud Storage
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
 
oracle
oracleoracle
oracle
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloudKoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
 
Struts validation framework Part 2
Struts validation framework Part 2Struts validation framework Part 2
Struts validation framework Part 2
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0
 
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentTrust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud Environment
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 

Encryption-Based Multilevel Model for DBMS

  • 1. Chapter 5 Encryption-Based Multilevel Model For DBMS Presented by: Ala Eltayeb
  • 2. Outlines Introduction Encryption-Based Multilevel Database Model Manipulation Performance Study Analysis of Experimental Results Summary
  • 3. 1. Introduction • Type of encryption in database? Column &row • Encrypt each tuple (row) in the relation (table) with an encryption key that depends on the security level of the tuple (tuple classification). Encryption-Based Multi-level Model Multilevel Relation Model Encryption System
  • 4. The Encryption-based multilevel security model Characterizes: I.Utilizing an encryption system as an additional security layer over the multilevel security layer for the relational database. II. Reducing the multilevel database size. III. Improving the response time of data retrieval from the multilevel database.
  • 5. Cont.. • The prototype is used as a research tool for studying principles and mechanisms of the encryption-based multilevel model and other multilevel relational database security models (SeaView, Jajodia–Sandhu, Smith– Winslett , multilevel relational [MLR], and belief- consistent models) .
  • 6. Why used prototype? 1. To determine the relative performance of the multilevel relational database security models. 2. The performance cost for applying the encryption system in multilevel relational database security.
  • 7. 2. Encryption-Based Multilevel Database Model • A symmetric key:-for each unique security level. • The user can use the keys : Security level (key) <= Security level (user) • The classification attributes are removed. • Each attribute is encrypted by using: encryption key that corresponds to the tuple security classification level (tuple level encryption).
  • 8. Example :Data store in MLR and encryption-based models
  • 9. Several DBMS Support Encryption Algorithms 1. DB2(IBM) - SQL Functions - Stored Procedures 2. ORACLE - Transparent Data Encryption (TDE)
  • 10.
  • 11. Manipulation • The data manipulation statements in the encryption-based multilevel database model are :  INSERT  DELETE  SELECT  UPDATE  UPLEVEL
  • 13. The DELETE Statement DELETE FROM R WHERE P I = tuple
  • 16. The UPLEVEL Statement • The UPLEVEL statement executed by a user with security class level L has the following general form: UPLEVEL R GET [A1,A2,...,A n] FROM [C1,C2,...,C n] WHERE P
  • 17. UPLEVEL Example user with S security level has used the UPLEVEL command to indicate that he believes the first tuple and insert the second tuple with S security level
  • 18. Cont… UPLEVEL SOD GET OBJ FROM M1,DEST FROM M2 WHERE SHIP =“Enterprise”
  • 19. 4. Performance Study • Study performance of multilevel relational database security models such as SeaView, Jajodia–Sandhu, Smith– Winslett, MLR, and belief-consistent models and the encryption-based multilevel database. • The impact of changing the size and schema of the relational database on the performance of these models
  • 20. Machine that is used for the implementation consists of : • CPU speed of 2.2 GHz • physical RAM size of 3 GB • hard disk size of 320 GB • The software used in the implementation is a Microsoft SQL server 2008 R2 and the experiments’ measurements were captured at the machine using a monitoring tool provided by the Microsoft SQL server.
  • 21. The impact of changing the number of tuples on the performance of the encryption algorithms in a multilevel database in the selection query
  • 22. Cont..  The experiments investigate the impact of changing : 1) The number of tuples 2) The number of attributes 3) The number of security levels  These experiments use the CPU response time (in minutes).  Assume that the base value for the number of tuples is 1,000,000, the base number of attributes is three, and the base number of security levels is four.
  • 23. ER diagram for the timesheet system
  • 24. SELECT Query Select * from Employee where department = ‘Sales’  Supporting encryption in the encryption-based multilevel database model improves the performance of the multilevel relational database because database size is decreased due to removing the extra attributes used for the class levels.
  • 25. Impact of changing the number of tuples in the selection query Number of attributes = 3 Number of security levels = 4
  • 26. Impact of changing the number of attributes in the selection query Number of tuples = million Number of security levels = 4
  • 27. Impact of changing the number of security levels in the selection query Number of attributes = 3 Number of tuples = million
  • 28. JOIN Query • Select * from Employee join Departure on Employee.Name = Departure.Name where Employee. department = ‘Sales’
  • 29. Impact of changing the number of tuples in the join query Number of attributes = 3 Number of security levels = 4
  • 30. Impact of changing the number of attributes in the join query Number of tuples = million Number of security levels = 4
  • 31. Impact of varying the number of security levels in the join query Number of attributes = 3 Number of tuples = million
  • 32. Cont…  Supporting encryption in the encryption-based multilevel database model improves the performance of the multilevel relational database because database size is decreased due to removing the extra attributes used for the class levels.
  • 33. Impact of varying the number of tuples in an update query Number of attributes = 3 Number of security levels = 4
  • 34. Cont..  Supporting encryption in the encryption-based multilevel database model decreases the performance of a multilevel database because, during the execution of the update statement.  The encryption and decryption mechanisms will be included together in the update procedure.
  • 35. Hierarchical of Model Performance Smith-Winslett MLR Blief-Consistent Jajodia-Sandhu SeaView High performance
  • 36. Analysis of Experimental Results • The performance of the Smith–Winslett model is the best. • The MLR model offers less performance than the Smith– Winslett model because it supports the security classification at the level of each single attribute. • The belief-consistent model has less performance than the MLR model because it supports a combination of the security classification levels for each single attribute to enable the user to assert his beliefs of lower level users’ information.
  • 37. Cont… • The Jajodia–Sandhu model has bad performance because of the impact of union operation between single-level relations in the recovery algorithm. • The SeaView model has very bad performance because of the impact of the JOIN operation between vertical single-level relations and union operation between horizontal single-level relations in the recovery algorithm.
  • 38. Comparison between MLR and Encryption –Based model  The encryption- based multilevel database model has performance better than the performance of the MLR model in retrieving data from the multilevel database.  The performance of the encryption-based multilevel database model is less than the performance of the MLR model in updating data because the overhead of supporting the encryption algorithm in the update query is executed.
  • 39.
  • 40. Summary  The encryption-based multilevel model overview.  Comparison the performance of MLR models and encryption- based model.  Supporting encryption in multilevel relational database: 1. Improve performance of the retrieving data in the SELECT and JOIN queries. 2.Bad performance because of the extra CPU processing results.