SlideShare a Scribd company logo
1 of 17
Prepard by:
1. Mohamed Siddig
2. Mohamed zeinelabdeen
3. Omer Salih
Agenda :
Introduction.
Security in distributed Database.
Security in federated and integrated database.
Security in federated Database.

   The effect of heterogeneity and autonomy on
  federated database security Russell Daviea and
                   Reinhardt Bothab
               a Port Elizabeth Technikon,
             s20026335@student.petech.ac.za
  b Port Elizabeth Technikon, reinhard@petech.ac.za
 Background.
 Federated Database Systems:
- The term has been used for several different but related
  database system architectures. Federated Database System
  (FDBS) is a collection of co-perating but autonomous
  component database systems.
- The component databases systems (CDBSs) are integrated
  to various degrees and are controlled and co-ordinated by
  a Federated Database Management System (FDBMS).
The road towards Federated Database Systems:




Characteristics of Federated Database Systems :
Distribution.
Heterogeneity.
Autonomy.
A CDBS participating in a FDBS may possess several
types of autonomy:
Design autonomy .
Communication autonomy .
Execution autonomy .
Association autonomy .
Authorization autonomy .
A Five-level Schema Architecture for Federated Databases
 Information security in Database systems:
  Confidentiality / Integrity / Availability (CIA).
 Security problems in databases :
identifying the threats + policies + mechanisms.
Security in Federated Database Systems :
A FDBS provides interoperability between existing
heterogeneous databases providing two advantages :
a user the capability to retrieve data located at
  different heterogeneous databases.
Interoperability is a significant advantage
-- need for protecting the security of the CDBSs and
  their local users.
Security in Federated Database Systems :

 CDBSs join a FDBS.
 establishment of administrative policies.
 Identification and authentication.
 Authorization autonomy .
 Full authorization autonomy .
 Medium authorization autonomy
 Low authorization autonomy.
 Conclusion.
 Opinion.
Deriving Global Authorizations for Federated
                  Databases
                Eugene F. Fodor
       Department of Computer Science
  University of California, Davis, USA 95616
         Email: fodor@cs.ucdavis.edu
      URL: http://avalon.cs.ucdavis.edu/
 Introduction.
 Federated Databases.
 Federated Database Security Issues:
 FDBs pose is the formulation of a global security policy from the
  local security policies of CDBs.
 FDBs are that the integration of data from multiple sources leads
  to new aggregation and inference problems not seen in the CDBs.
 Accountability and authentication also become more complicated
  for FDBs.
Deriving Authorizations for Integrated Objects
 Federated DB Protection Objects:
Constituent schemas provide a common data model:
1. Integrated objects.
2. Local objects.
3. Federated objects.
4. Composite objects.
Exported Local Authorizations and the Dictionary :
      Subject Section
      Operation Section
      Object Section
Global authorization derivation :
Analysis of local authorizations :
auth = <s,op,o> and auth΄= <s΄,op΄,o΄> are Compatible
Auth≈auth΄ ↔(o≈o΄)^(op≈op΄)
Subject Clustering :
A hierarchical clustering technique called single link
clustering is used to derive a similarity tree of subjects.
Global authorization derivation :
 Abstraction of Global Authorizations :
There are two rules for authorization abstraction with
regard to operations and objects :
 Rule 1 :



 Rule 2 :
for objects states that global authorization o¯ for
                                             coincides
 with the integrated object o¯ and its local objects.
 Deriving Authorizations for Composite Objects.
 Conclusion.
 Opinion

More Related Content

Similar to Presentatio

A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
 
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
E.F. Codd (1970).  Evolution of Current Generation Database Tech.docxE.F. Codd (1970).  Evolution of Current Generation Database Tech.docx
E.F. Codd (1970). Evolution of Current Generation Database Tech.docxjacksnathalie
 
Lecture 1&amp;2(rdbms-ii)
Lecture 1&amp;2(rdbms-ii)Lecture 1&amp;2(rdbms-ii)
Lecture 1&amp;2(rdbms-ii)Ravinder Kamboj
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersMustafa Kamel Mohammadi
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The SecurityRachel Phillips
 
Information Technology 104
Information Technology 104Information Technology 104
Information Technology 104'Vladimir Medina
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
data base unit one on what is databases.pptx
data base unit one on what is databases.pptxdata base unit one on what is databases.pptx
data base unit one on what is databases.pptxmulukendemis44
 
a hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorizeda hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorizedlogicsystemsprojects
 
Komatsoulis internet2 executive track
Komatsoulis internet2 executive trackKomatsoulis internet2 executive track
Komatsoulis internet2 executive trackGeorge Komatsoulis
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1thilaganga
 

Similar to Presentatio (20)

A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
 
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
E.F. Codd (1970).  Evolution of Current Generation Database Tech.docxE.F. Codd (1970).  Evolution of Current Generation Database Tech.docx
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
 
Database v1
Database v1Database v1
Database v1
 
DISTRIBUTED DATABASE
DISTRIBUTED DATABASEDISTRIBUTED DATABASE
DISTRIBUTED DATABASE
 
Lecture 1&amp;2(rdbms-ii)
Lecture 1&amp;2(rdbms-ii)Lecture 1&amp;2(rdbms-ii)
Lecture 1&amp;2(rdbms-ii)
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database Users
 
Database security
Database securityDatabase security
Database security
 
Dbms unit 1
Dbms unit   1Dbms unit   1
Dbms unit 1
 
Dbms Useful PPT
Dbms Useful PPTDbms Useful PPT
Dbms Useful PPT
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
Information Technology 104
Information Technology 104Information Technology 104
Information Technology 104
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
02 Distributed DBMSTechnology
02 Distributed DBMSTechnology02 Distributed DBMSTechnology
02 Distributed DBMSTechnology
 
Database Concepts
Database ConceptsDatabase Concepts
Database Concepts
 
data base unit one on what is databases.pptx
data base unit one on what is databases.pptxdata base unit one on what is databases.pptx
data base unit one on what is databases.pptx
 
a hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorizeda hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorized
 
Komatsoulis internet2 executive track
Komatsoulis internet2 executive trackKomatsoulis internet2 executive track
Komatsoulis internet2 executive track
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
 
Ijetcas14 583
Ijetcas14 583Ijetcas14 583
Ijetcas14 583
 
RDBMS to NoSQL. An overview.
RDBMS to NoSQL. An overview.RDBMS to NoSQL. An overview.
RDBMS to NoSQL. An overview.
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Presentatio

  • 1.
  • 2. Prepard by: 1. Mohamed Siddig 2. Mohamed zeinelabdeen 3. Omer Salih
  • 3. Agenda : Introduction. Security in distributed Database. Security in federated and integrated database.
  • 4. Security in federated Database.  The effect of heterogeneity and autonomy on federated database security Russell Daviea and Reinhardt Bothab a Port Elizabeth Technikon, s20026335@student.petech.ac.za b Port Elizabeth Technikon, reinhard@petech.ac.za
  • 5.  Background.  Federated Database Systems: - The term has been used for several different but related database system architectures. Federated Database System (FDBS) is a collection of co-perating but autonomous component database systems. - The component databases systems (CDBSs) are integrated to various degrees and are controlled and co-ordinated by a Federated Database Management System (FDBMS).
  • 6. The road towards Federated Database Systems: Characteristics of Federated Database Systems : Distribution. Heterogeneity. Autonomy.
  • 7. A CDBS participating in a FDBS may possess several types of autonomy: Design autonomy . Communication autonomy . Execution autonomy . Association autonomy . Authorization autonomy .
  • 8. A Five-level Schema Architecture for Federated Databases
  • 9.  Information security in Database systems: Confidentiality / Integrity / Availability (CIA).  Security problems in databases : identifying the threats + policies + mechanisms. Security in Federated Database Systems : A FDBS provides interoperability between existing heterogeneous databases providing two advantages : a user the capability to retrieve data located at different heterogeneous databases. Interoperability is a significant advantage -- need for protecting the security of the CDBSs and their local users.
  • 10. Security in Federated Database Systems :  CDBSs join a FDBS.  establishment of administrative policies.  Identification and authentication.  Authorization autonomy .  Full authorization autonomy .  Medium authorization autonomy  Low authorization autonomy.
  • 12. Deriving Global Authorizations for Federated Databases Eugene F. Fodor Department of Computer Science University of California, Davis, USA 95616 Email: fodor@cs.ucdavis.edu URL: http://avalon.cs.ucdavis.edu/
  • 13.  Introduction.  Federated Databases.  Federated Database Security Issues:  FDBs pose is the formulation of a global security policy from the local security policies of CDBs.  FDBs are that the integration of data from multiple sources leads to new aggregation and inference problems not seen in the CDBs.  Accountability and authentication also become more complicated for FDBs.
  • 14. Deriving Authorizations for Integrated Objects  Federated DB Protection Objects: Constituent schemas provide a common data model: 1. Integrated objects. 2. Local objects. 3. Federated objects. 4. Composite objects. Exported Local Authorizations and the Dictionary :  Subject Section  Operation Section  Object Section
  • 15. Global authorization derivation : Analysis of local authorizations : auth = <s,op,o> and auth΄= <s΄,op΄,o΄> are Compatible Auth≈auth΄ ↔(o≈o΄)^(op≈op΄) Subject Clustering : A hierarchical clustering technique called single link clustering is used to derive a similarity tree of subjects.
  • 16. Global authorization derivation :  Abstraction of Global Authorizations : There are two rules for authorization abstraction with regard to operations and objects :  Rule 1 :  Rule 2 : for objects states that global authorization o¯ for coincides with the integrated object o¯ and its local objects.
  • 17.  Deriving Authorizations for Composite Objects.  Conclusion.  Opinion