SlideShare a Scribd company logo
1 of 17
Prepard by:
1. Mohamed Siddig
2. Mohamed zeinelabdeen
3. Omer Salih
Agenda :
Introduction.
Security in distributed Database.
Security in federated and integrated database.
Security in federated Database.

   The effect of heterogeneity and autonomy on
  federated database security Russell Daviea and
                   Reinhardt Bothab
                    a Port Elizabeth
      Technikon, s20026335@student.petech.ac.za
  b Port Elizabeth Technikon, reinhard@petech.ac.za
 Background.
 Federated Database Systems:
- The term has been used for several different but related
  database system architectures. Federated Database System
  (FDBS) is a collection of co-perating but autonomous
  component database systems.
- The component databases systems (CDBSs) are integrated
  to various degrees and are controlled and co-ordinated by
  a Federated Database Management System (FDBMS).
The road towards Federated Database Systems:




Characteristics of Federated Database Systems :
Distribution.
Heterogeneity.
Autonomy.
A CDBS participating in a FDBS may possess several
types of autonomy:
Design autonomy .
Communication autonomy .
Execution autonomy .
Association autonomy .
Authorization autonomy .
A Five-level Schema Architecture for Federated Databases
 Information security in Database systems:
  Confidentiality / Integrity / Availability (CIA).
 Security problems in databases :
identifying the threats + policies + mechanisms.
Security in Federated Database Systems :
A FDBS provides interoperability between existing
heterogeneous databases providing two advantages :
a user the capability to retrieve data located at
  different heterogeneous databases.
Interoperability is a significant advantage
-- need for protecting the security of the CDBSs and
  their local users.
Security in Federated Database Systems :

 CDBSs join a FDBS.
 establishment of administrative policies.
 Identification and authentication.
 Authorization autonomy .
 Full authorization autonomy .
 Medium authorization autonomy
 Low authorization autonomy.
 Conclusion.
 Opinion.
Deriving Global Authorizations for Federated
                  Databases
                Eugene F. Fodor
       Department of Computer Science
  University of California, Davis, USA 95616
         Email: fodor@cs.ucdavis.edu
      URL: http://avalon.cs.ucdavis.edu/
 Introduction.
 Federated Databases.
 Federated Database Security Issues:
 FDBs pose is the formulation of a global security policy from the
  local security policies of CDBs.
 FDBs are that the integration of data from multiple sources leads
  to new aggregation and inference problems not seen in the CDBs.
 Accountability and authentication also become more complicated
  for FDBs.
Deriving Authorizations for Integrated Objects
 Federated DB Protection Objects:
Constituent schemas provide a common data model:
1. Integrated objects.
2. Local objects.
3. Federated objects.
4. Composite objects.
Exported Local Authorizations and the Dictionary :
      Subject Section
      Operation Section
      Object Section
Global authorization derivation :
Analysis of local authorizations :
auth = <s,op,o> and auth΄= <s΄,op΄,o΄> are Compatible
Auth≈auth΄ ↔(o≈o΄)^(op≈op΄)
Subject Clustering :
A hierarchical clustering technique called single link
clustering is used to derive a similarity tree of subjects.
Global authorization derivation :
 Abstraction of Global Authorizations :
There are two rules for authorization abstraction with
regard to operations and objects :
 Rule 1 :



 Rule 2 :
for objects states that global authorization o¯ for
                                             coincides
 with the integrated object o¯ and its local objects.
 Deriving Authorizations for Composite Objects.
 Conclusion.
 Opinion

More Related Content

Viewers also liked

Symbol table format
Symbol table formatSymbol table format
Symbol table format
JK Knowledge
 
compiler ppt on symbol table
 compiler ppt on symbol table compiler ppt on symbol table
compiler ppt on symbol table
nadarmispapaulraj
 
Different phases of a compiler
Different phases of a compilerDifferent phases of a compiler
Different phases of a compiler
Sumit Sinha
 
Compiler Design
Compiler DesignCompiler Design
Compiler Design
Mir Majid
 
Symbol table design (Compiler Construction)
Symbol table design (Compiler Construction)Symbol table design (Compiler Construction)
Symbol table design (Compiler Construction)
Tech_MX
 

Viewers also liked (20)

Lp 2
Lp 2Lp 2
Lp 2
 
Symbol table format
Symbol table formatSymbol table format
Symbol table format
 
Compiler Engineering Lab#5 : Symbol Table, Flex Tool
Compiler Engineering Lab#5 : Symbol Table, Flex ToolCompiler Engineering Lab#5 : Symbol Table, Flex Tool
Compiler Engineering Lab#5 : Symbol Table, Flex Tool
 
Yacc (yet another compiler compiler)
Yacc (yet another compiler compiler)Yacc (yet another compiler compiler)
Yacc (yet another compiler compiler)
 
compiler ppt on symbol table
 compiler ppt on symbol table compiler ppt on symbol table
compiler ppt on symbol table
 
Lexical analyzer
Lexical analyzerLexical analyzer
Lexical analyzer
 
what is compiler and five phases of compiler
what is compiler and five phases of compilerwhat is compiler and five phases of compiler
what is compiler and five phases of compiler
 
What is symbol table?
What is symbol table?What is symbol table?
What is symbol table?
 
Lex (lexical analyzer)
Lex (lexical analyzer)Lex (lexical analyzer)
Lex (lexical analyzer)
 
Verb phrase
Verb phraseVerb phrase
Verb phrase
 
Lexical analyzer
Lexical analyzerLexical analyzer
Lexical analyzer
 
Different phases of a compiler
Different phases of a compilerDifferent phases of a compiler
Different phases of a compiler
 
Phases of Compiler
Phases of CompilerPhases of Compiler
Phases of Compiler
 
Phases of the Compiler - Systems Programming
Phases of the Compiler - Systems ProgrammingPhases of the Compiler - Systems Programming
Phases of the Compiler - Systems Programming
 
Lexical analyzer
Lexical analyzerLexical analyzer
Lexical analyzer
 
Compiler Design
Compiler DesignCompiler Design
Compiler Design
 
Compiler Chapter 1
Compiler Chapter 1Compiler Chapter 1
Compiler Chapter 1
 
Role-of-lexical-analysis
Role-of-lexical-analysisRole-of-lexical-analysis
Role-of-lexical-analysis
 
Lex and Yacc ppt
Lex and Yacc pptLex and Yacc ppt
Lex and Yacc ppt
 
Symbol table design (Compiler Construction)
Symbol table design (Compiler Construction)Symbol table design (Compiler Construction)
Symbol table design (Compiler Construction)
 

Similar to Security in federated integrated d bs

E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
E.F. Codd (1970).  Evolution of Current Generation Database Tech.docxE.F. Codd (1970).  Evolution of Current Generation Database Tech.docx
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
jacksnathalie
 
1_Chapter_One_Introduction_to_Database_Management_System_2.ppt
1_Chapter_One_Introduction_to_Database_Management_System_2.ppt1_Chapter_One_Introduction_to_Database_Management_System_2.ppt
1_Chapter_One_Introduction_to_Database_Management_System_2.ppt
abdu328357
 

Similar to Security in federated integrated d bs (20)

A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
 
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
E.F. Codd (1970).  Evolution of Current Generation Database Tech.docxE.F. Codd (1970).  Evolution of Current Generation Database Tech.docx
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
 
Lecture 1&amp;2(rdbms-ii)
Lecture 1&amp;2(rdbms-ii)Lecture 1&amp;2(rdbms-ii)
Lecture 1&amp;2(rdbms-ii)
 
Database v1
Database v1Database v1
Database v1
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database Users
 
DISTRIBUTED DATABASE
DISTRIBUTED DATABASEDISTRIBUTED DATABASE
DISTRIBUTED DATABASE
 
Database security
Database securityDatabase security
Database security
 
Dbms unit 1
Dbms unit   1Dbms unit   1
Dbms unit 1
 
Dbms Useful PPT
Dbms Useful PPTDbms Useful PPT
Dbms Useful PPT
 
Information Technology 104
Information Technology 104Information Technology 104
Information Technology 104
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
02 Distributed DBMSTechnology
02 Distributed DBMSTechnology02 Distributed DBMSTechnology
02 Distributed DBMSTechnology
 
Database Concepts
Database ConceptsDatabase Concepts
Database Concepts
 
data base unit one on what is databases.pptx
data base unit one on what is databases.pptxdata base unit one on what is databases.pptx
data base unit one on what is databases.pptx
 
a hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorizeda hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorized
 
1_Chapter_One_Introduction_to_Database_Management_System_2.ppt
1_Chapter_One_Introduction_to_Database_Management_System_2.ppt1_Chapter_One_Introduction_to_Database_Management_System_2.ppt
1_Chapter_One_Introduction_to_Database_Management_System_2.ppt
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Ijetcas14 583
Ijetcas14 583Ijetcas14 583
Ijetcas14 583
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
 
RDBMS to NoSQL. An overview.
RDBMS to NoSQL. An overview.RDBMS to NoSQL. An overview.
RDBMS to NoSQL. An overview.
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Security in federated integrated d bs

  • 1.
  • 2. Prepard by: 1. Mohamed Siddig 2. Mohamed zeinelabdeen 3. Omer Salih
  • 3. Agenda : Introduction. Security in distributed Database. Security in federated and integrated database.
  • 4. Security in federated Database.  The effect of heterogeneity and autonomy on federated database security Russell Daviea and Reinhardt Bothab a Port Elizabeth Technikon, s20026335@student.petech.ac.za b Port Elizabeth Technikon, reinhard@petech.ac.za
  • 5.  Background.  Federated Database Systems: - The term has been used for several different but related database system architectures. Federated Database System (FDBS) is a collection of co-perating but autonomous component database systems. - The component databases systems (CDBSs) are integrated to various degrees and are controlled and co-ordinated by a Federated Database Management System (FDBMS).
  • 6. The road towards Federated Database Systems: Characteristics of Federated Database Systems : Distribution. Heterogeneity. Autonomy.
  • 7. A CDBS participating in a FDBS may possess several types of autonomy: Design autonomy . Communication autonomy . Execution autonomy . Association autonomy . Authorization autonomy .
  • 8. A Five-level Schema Architecture for Federated Databases
  • 9.  Information security in Database systems: Confidentiality / Integrity / Availability (CIA).  Security problems in databases : identifying the threats + policies + mechanisms. Security in Federated Database Systems : A FDBS provides interoperability between existing heterogeneous databases providing two advantages : a user the capability to retrieve data located at different heterogeneous databases. Interoperability is a significant advantage -- need for protecting the security of the CDBSs and their local users.
  • 10. Security in Federated Database Systems :  CDBSs join a FDBS.  establishment of administrative policies.  Identification and authentication.  Authorization autonomy .  Full authorization autonomy .  Medium authorization autonomy  Low authorization autonomy.
  • 12. Deriving Global Authorizations for Federated Databases Eugene F. Fodor Department of Computer Science University of California, Davis, USA 95616 Email: fodor@cs.ucdavis.edu URL: http://avalon.cs.ucdavis.edu/
  • 13.  Introduction.  Federated Databases.  Federated Database Security Issues:  FDBs pose is the formulation of a global security policy from the local security policies of CDBs.  FDBs are that the integration of data from multiple sources leads to new aggregation and inference problems not seen in the CDBs.  Accountability and authentication also become more complicated for FDBs.
  • 14. Deriving Authorizations for Integrated Objects  Federated DB Protection Objects: Constituent schemas provide a common data model: 1. Integrated objects. 2. Local objects. 3. Federated objects. 4. Composite objects. Exported Local Authorizations and the Dictionary :  Subject Section  Operation Section  Object Section
  • 15. Global authorization derivation : Analysis of local authorizations : auth = <s,op,o> and auth΄= <s΄,op΄,o΄> are Compatible Auth≈auth΄ ↔(o≈o΄)^(op≈op΄) Subject Clustering : A hierarchical clustering technique called single link clustering is used to derive a similarity tree of subjects.
  • 16. Global authorization derivation :  Abstraction of Global Authorizations : There are two rules for authorization abstraction with regard to operations and objects :  Rule 1 :  Rule 2 : for objects states that global authorization o¯ for coincides with the integrated object o¯ and its local objects.
  • 17.  Deriving Authorizations for Composite Objects.  Conclusion.  Opinion