SlideShare a Scribd company logo
Database Security - Farkas 1
Database Security
and Privacy
2
Database Security - Farkas
Security Objectives
Secrecy
Prevent/detect/deter improper
Disclosure of information
Availability
Prevent/detect/deter improper
Denial of access to services
Integrity
Prevent/detect/deter
Improper modification
of information
3
Database Security - Farkas
Policy
Organizational policy
Information systems policy
Databases
 Collection of
 interrelated data and
 set of programs to access the data
 Convenient and efficient processing of data
 Database Application Software
4
Database Security - Farkas
Database Security
 Protect Sensitive Data from
 Unauthorized disclosure
 Unauthorized modification
 Denial of service attacks
 Security Controls
 Security Policy
 Access control models
 Integrity protection
 Privacy problems
 Fault tolerance and recovery
 Auditing and intrusion detection
5
Database Security - Farkas
6
Database Security - Farkas
Protection of Data Confidentiality
 Access control – which data users can
access
 Information flow control – what users can
do with the accessed data
 Data Mining
7
Database Security - Farkas
Access Control
 Ensures that all direct accesses to object are
authorized
 Protects against accidental and malicious
threats by regulating the read, write and
execution of data and programs
8
Database Security - Farkas
Access Control
Requires:
- Proper user identification
- Information specifying the access rights is
protected form modification
9
Database Security - Farkas
Access control components:
- Access control policy: specifies the
authorized accesses of a system
- Access control mechanism: implements
and enforces the policy
Access Control
HOW TO SPECIFY ACCESS
CONTROL?
10
Database Security - Farkas
11
Database Security - Farkas
Access Control
 Subject: active entity that requests access to an
object
- e.g., user or program
 Object: passive entity accessed by a subject
- e.g., record, relation, file
 Access right (privileges): how a subject is
allowed to access an object
- e.g., subject s can read object o
12
Database Security - Farkas
Protection Object
 Database
 Relation
 Record
 Attribute
 Element
Advantages vs. disadvantages
of supporting
different granularity levels
13
Database Security - Farkas
Relation-Level Granularity
Person-
name
Company-
name
Salary
Smith BB&C $43,982
Dell Bell $97,900
Black BB&C $35,652
Confidential relation
14
Database Security - Farkas
Tuple-level Granularity
Person-name Company-
name
Salary
Smith BB&C $43,982 Public
Dell Bell $97,900 Conf.
Black BB&C $35,652 Public
Works
15
Database Security - Farkas
Attribute-Level Granularity
Person-
name Publ.
Company-
name Publ.
Salary
Conf.
Smith BB&C $43,982
Dell Bell $97,900
Black BB&C $35,652
Works
16
Database Security - Farkas
Cell-Level Granularity
Person-
name
Company-
name
Salary
Smith P BB&C P $43,982 C
Dell C Bell C $97,900 C
Black P BB&C C $35,652 C
Works
17
Database Security - Farkas
Access Control Policies
 Discretionary Access Control (DAC)
 Mandatory Access Control (MAC)
 Role-Based Access Control (RBAC)
18
Database Security - Farkas
Discretionary Access Control (DAC)
 For each subject access right to the objects are
defined
 (subject, object, +/- access mode)
 (Black, Employee-relation, read)
 User based
 Grant and Revoke
 Problems:
- Propagation of access rights
- Revocation of propagated access rights
19
Database Security - Farkas
DAC by Grant and Revoke
Brown (owner)
Black Red
White
GRANT SELECT ON Employee
TO Red
GRANT SELECT ON Employee
TO Black
WITH GRANT OPTION
?
Brown revokes grant
given to Black
?
Brown does not want
Red to access the
Employee relation
GRANT UPDATE(Salary) ON
Employee TO White
20
Database Security - Farkas
Implementation
Access Control List (column)
File 1 File 2
Joe:Read Joe:Read
Joe:Write Sam:Read
Joe:Own Sam:Write
Sam:Own
Capability List (row)
Joe: File 1/Read, File 1/Write, File 1/Own, File 2/Read
Sam: File 2/Read, File 2/Write, File 2/Own
Access Control Triples
Subject Access Object
Joe Read File 1
Joe Write File 1
Joe Own File 1
Joe Read File 2
Sam Read File 2
Sam Write File 2
Sam Own File 2
(ACL)
21
Database Security - Farkas
Access Control Mechanisms
 Security through Views
 Stored Procedures
 Grant and Revoke
 Query modification
22
Database Security - Farkas
Security Through Views
 Assign rights to access predefined views
CREATE VIEW Outstanding-Student
AS SELECT NAME, COURSE, GRADE
FROM Student
WHERE GRADE > B
Problem:
Difficult to maintain updates.
23
Database Security - Farkas
Stored Procedures
 Assign rights to execute compiled programs
 GRANT RUN ON <program> TO <user>
Problem:
Programs may access resources for which the user
who runs the program does not have permission.
24
Database Security - Farkas
Grant and Revoke
GRANT <privilege> ON <relation>
To <user>
[WITH GRANT OPTION]
------------------------------------------------------------------------------------------------------------------------------------
 GRANT SELECT * ON Student TO Matthews
 GRANT SELECT *, UPDATE(GRADE) ON Student TO
FARKAS
 GRANT SELECT(NAME) ON Student TO Brown
GRANT command applies to base relations as well as views
25
Database Security - Farkas
Grant and Revoke
REVOKE <privileges> [ON <relation>]
FROM <user>
-------------------------------------------------------------------------------------------------------------------------
 REVOKE SELECT* ON Student FROM Blue
 REVOKE UPDATE ON Student FROM Black
 REVOKE SELECT(NAME) ON Student FROM Brown
26
Database Security - Farkas
Non-cascading Revoke
A
B
C
D
E
F
A
B
C
A revokes D’s privileges
E
F
27
Database Security - Farkas
Cascading Revoke
A
B
C
D
E
F
A
B
C
A revokes D’s privileges
28
Database Security - Farkas
Positive and Negative Authorization
Problem:
Contradictory authorizations
• GRANT <privilege> ON X TO <user>
• DENY <privilege> ON X TO <user>
A
B
C
E
D
+
-
+
-
29
Database Security - Farkas
Negative Authorization
A
B
C
E
D
+
-
+
-
-
F
+
What should happen with the privilege given by D
To F?
30
Database Security - Farkas
Query Modification
 GRANT SELECT(NAME) ON Student TO Blue WHERE
COURSE=“CSCE 590”
 Blue’s query:
SELECT *
FROM Student
 Modified query:
SELECT NAME
FROM Student
WHERE COURSE=“CSCE 590”
31
Database Security - Farkas
DAC Overview
 Advantages:
 Intuitive
 Easy to implement
 Disadvantages:
 Inherent vulnerability (look TH example)
 Maintenance of ACL or Capability lists
 Maintenance of Grant/Revoke
 Limited power of negative authorization
32
Database Security - Farkas
Mandatory Access Control (MAC)
 Security label
- Top-Secret, Secret, Public
 Objects: security classification
- File 1 is Secret, File 2 is Public
 Subjects: security clearances
- Brown is cleared to Secret, Black is cleared to Public
 Dominance ()
- Top-Secret  Secret  Public
33
Database Security - Farkas
MAC
 Access rights: defined by comparing the security
classification of the requested objects with the
security clearance of the subject
 If access control rules are satisfied, access is
permitted
 Otherwise access is rejected
 Granularity of access rights!
34
Database Security - Farkas
MAC – Bell-LaPadula (BLP) Model
 Single security property: a subject S is allowed a
read access to an object O only if label(S)
dominates label(O)
 Star-property: a subject S is allowed a write access
to an object O only if label(O) dominates label(S)
No direct flow of information from
high security objects to low security objects!
Multilevel Security
 Multilevel security  users at different security
level, see different versions of the database
 Problem: different versions need to be kept
consistent and coherent without downward signaling
channel (covert channel)
35
Database Security - Farkas
Multilevel Relation
 Schema R(A1,C1,…,An,Cn,Tc)
 R: relation name
 Ai: attribute name
 Ci: security classes
 Tc: Tuple security classes
 Instantiation of relation: sets of tuples of the form
<a1,c1,…,an,cn,tc>
 ai: attribute value
 ci: attribute classification label
 tc: tuple classification label
36
Database Security - Farkas
37
Database Security - Farkas
CSCE 790 - Farkas
37
Multilevel Relation Example
SSN (SSN) Course (Course) Grade (Grade)
111-22-3333 S CSCE 786 S A TS
444-55-6666 S CSCE 567 S C TS
Top-secret user sees all data
Secret user sees Secret-View:
SSN (SSN) Course (Course) Grade (Grade)
111-22-3333 S CSCE 786 S null S
444-55-6666 S CSCE 567 S null S
38
Database Security - Farkas
Polyinstantiation
Secret user sees Secret-View:
SSN (SSN) Course (Course) Grade (Grade)
111-22-3333 S CSCE 786 S null S
444-55-6666 S CSCE 567 S null S
•SSN is primary key
•Secret user wants to update Grade for 111-22-3333 from
null (i.e., missing value) to F
•Allow update: inconsistent database, at TS level two different
tuples exist with the same primary key (see next slide)
•Not allow update: downward signaling channel, update is
because of the existence of a TS value
39
Database Security - Farkas
Polyinstantiation
SSN (SSN) Course (Course) Grade (Grade)
111-22-3333 S CSCE 786 S A TS
111-22-3333 S CSCE 786 S F S
444-55-6666 S CSCE 567 S C TS
Top-Secret View:

More Related Content

Similar to database-security-design.ppt

DB2 Security Model
DB2 Security ModelDB2 Security Model
DB2 Security Model
uniqueYGB
 
2016 share the three headed beast v4
2016 share the three headed beast v42016 share the three headed beast v4
2016 share the three headed beast v4
bigendiansmalls
 
Monitoring With Alterpoint And Cs Mars
Monitoring With Alterpoint And Cs MarsMonitoring With Alterpoint And Cs Mars
Monitoring With Alterpoint And Cs Mars
amit_monty
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web Studio
AVEVA
 
Chapter23
Chapter23Chapter23
Chapter23
gourab87
 
MySQL 8.0 - Security Features
MySQL 8.0 - Security FeaturesMySQL 8.0 - Security Features
MySQL 8.0 - Security Features
Harin Vadodaria
 
Database Security Methods, DAC, MAC,View
Database Security Methods, DAC, MAC,ViewDatabase Security Methods, DAC, MAC,View
Database Security Methods, DAC, MAC,View
Dr-Dipali Meher
 
Towards Secure and Dependable Authentication and Authorization Infrastructures
Towards Secure and Dependable Authentication and Authorization InfrastructuresTowards Secure and Dependable Authentication and Authorization Infrastructures
Towards Secure and Dependable Authentication and Authorization Infrastructures
Diego Kreutz
 
MySQL server security
MySQL server securityMySQL server security
MySQL server security
Damien Seguy
 
Top Ten Settings that Leave your IBM i Vulnerable
Top Ten Settings that Leave your IBM i VulnerableTop Ten Settings that Leave your IBM i Vulnerable
Top Ten Settings that Leave your IBM i Vulnerable
Precisely
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group Tagging
Cisco Canada
 
Firebird Security (in English): The Past and The Future
Firebird Security (in English): The Past and The FutureFirebird Security (in English): The Past and The Future
Firebird Security (in English): The Past and The Future
Alexey Kovyazin
 
Sentry - An Introduction
Sentry - An Introduction Sentry - An Introduction
Sentry - An Introduction
Alexander Alten
 
Data base security
Data base securityData base security
Data base security
Sara Nazir
 
Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013
Prosanta Ghosh
 
Project #3 IT Security Controls Baseline for Red Clay Renovations.docx
Project #3 IT Security Controls Baseline for Red Clay Renovations.docxProject #3 IT Security Controls Baseline for Red Clay Renovations.docx
Project #3 IT Security Controls Baseline for Red Clay Renovations.docx
stilliegeorgiana
 
Unidad iv seguridad (parte ii)
Unidad iv   seguridad (parte ii)Unidad iv   seguridad (parte ii)
Unidad iv seguridad (parte ii)
Whaleejaa Wha
 
Why Web Security Matters!
Why Web Security Matters!Why Web Security Matters!
Why Web Security Matters!
Philippe De Ryck
 
ISACA Dallas Texas 2010 - Ulf Mattsson
ISACA Dallas Texas 2010 - Ulf MattssonISACA Dallas Texas 2010 - Ulf Mattsson
ISACA Dallas Texas 2010 - Ulf Mattsson
Ulf Mattsson
 
Db2.security.slides
Db2.security.slidesDb2.security.slides
Db2.security.slides
asderww
 

Similar to database-security-design.ppt (20)

DB2 Security Model
DB2 Security ModelDB2 Security Model
DB2 Security Model
 
2016 share the three headed beast v4
2016 share the three headed beast v42016 share the three headed beast v4
2016 share the three headed beast v4
 
Monitoring With Alterpoint And Cs Mars
Monitoring With Alterpoint And Cs MarsMonitoring With Alterpoint And Cs Mars
Monitoring With Alterpoint And Cs Mars
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web Studio
 
Chapter23
Chapter23Chapter23
Chapter23
 
MySQL 8.0 - Security Features
MySQL 8.0 - Security FeaturesMySQL 8.0 - Security Features
MySQL 8.0 - Security Features
 
Database Security Methods, DAC, MAC,View
Database Security Methods, DAC, MAC,ViewDatabase Security Methods, DAC, MAC,View
Database Security Methods, DAC, MAC,View
 
Towards Secure and Dependable Authentication and Authorization Infrastructures
Towards Secure and Dependable Authentication and Authorization InfrastructuresTowards Secure and Dependable Authentication and Authorization Infrastructures
Towards Secure and Dependable Authentication and Authorization Infrastructures
 
MySQL server security
MySQL server securityMySQL server security
MySQL server security
 
Top Ten Settings that Leave your IBM i Vulnerable
Top Ten Settings that Leave your IBM i VulnerableTop Ten Settings that Leave your IBM i Vulnerable
Top Ten Settings that Leave your IBM i Vulnerable
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group Tagging
 
Firebird Security (in English): The Past and The Future
Firebird Security (in English): The Past and The FutureFirebird Security (in English): The Past and The Future
Firebird Security (in English): The Past and The Future
 
Sentry - An Introduction
Sentry - An Introduction Sentry - An Introduction
Sentry - An Introduction
 
Data base security
Data base securityData base security
Data base security
 
Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013
 
Project #3 IT Security Controls Baseline for Red Clay Renovations.docx
Project #3 IT Security Controls Baseline for Red Clay Renovations.docxProject #3 IT Security Controls Baseline for Red Clay Renovations.docx
Project #3 IT Security Controls Baseline for Red Clay Renovations.docx
 
Unidad iv seguridad (parte ii)
Unidad iv   seguridad (parte ii)Unidad iv   seguridad (parte ii)
Unidad iv seguridad (parte ii)
 
Why Web Security Matters!
Why Web Security Matters!Why Web Security Matters!
Why Web Security Matters!
 
ISACA Dallas Texas 2010 - Ulf Mattsson
ISACA Dallas Texas 2010 - Ulf MattssonISACA Dallas Texas 2010 - Ulf Mattsson
ISACA Dallas Texas 2010 - Ulf Mattsson
 
Db2.security.slides
Db2.security.slidesDb2.security.slides
Db2.security.slides
 

Recently uploaded

按照学校原版(SUT文凭证书)斯威本科技大学毕业证快速办理
按照学校原版(SUT文凭证书)斯威本科技大学毕业证快速办理按照学校原版(SUT文凭证书)斯威本科技大学毕业证快速办理
按照学校原版(SUT文凭证书)斯威本科技大学毕业证快速办理
1jtj7yul
 
按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理
按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理
按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理
6oo02s6l
 
一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理
一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理
一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理
xuqdabu
 
按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理
按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理
按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理
terpt4iu
 
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
yizxn4sx
 
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
bttak
 
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalRBuilding a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR
Peter Gallagher
 
一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
bttak
 
一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理
一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理
一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理
nudduv
 
按照学校原版(Westminster文凭证书)威斯敏斯特大学毕业证快速办理
按照学校原版(Westminster文凭证书)威斯敏斯特大学毕业证快速办理按照学校原版(Westminster文凭证书)威斯敏斯特大学毕业证快速办理
按照学校原版(Westminster文凭证书)威斯敏斯特大学毕业证快速办理
yizxn4sx
 
按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理
按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理
按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理
1jtj7yul
 
一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理
一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理
一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理
xuqdabu
 
按照学校原版(Greenwich文凭证书)格林威治大学毕业证快速办理
按照学校原版(Greenwich文凭证书)格林威治大学毕业证快速办理按照学校原版(Greenwich文凭证书)格林威治大学毕业证快速办理
按照学校原版(Greenwich文凭证书)格林威治大学毕业证快速办理
yizxn4sx
 
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
uwoso
 
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
2g3om49r
 
按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理
按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理
按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理
uyesp1a
 
按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理
按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理
按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理
zpc0z12
 
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
nvoyobt
 
按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理
按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理
按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理
snfdnzl7
 
按照学校原版(QU文凭证书)皇后大学毕业证快速办理
按照学校原版(QU文凭证书)皇后大学毕业证快速办理按照学校原版(QU文凭证书)皇后大学毕业证快速办理
按照学校原版(QU文凭证书)皇后大学毕业证快速办理
8db3cz8x
 

Recently uploaded (20)

按照学校原版(SUT文凭证书)斯威本科技大学毕业证快速办理
按照学校原版(SUT文凭证书)斯威本科技大学毕业证快速办理按照学校原版(SUT文凭证书)斯威本科技大学毕业证快速办理
按照学校原版(SUT文凭证书)斯威本科技大学毕业证快速办理
 
按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理
按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理
按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理
 
一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理
一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理
一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理
 
按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理
按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理
按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理
 
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
 
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
 
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalRBuilding a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR
 
一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
 
一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理
一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理
一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理
 
按照学校原版(Westminster文凭证书)威斯敏斯特大学毕业证快速办理
按照学校原版(Westminster文凭证书)威斯敏斯特大学毕业证快速办理按照学校原版(Westminster文凭证书)威斯敏斯特大学毕业证快速办理
按照学校原版(Westminster文凭证书)威斯敏斯特大学毕业证快速办理
 
按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理
按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理
按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理
 
一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理
一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理
一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理
 
按照学校原版(Greenwich文凭证书)格林威治大学毕业证快速办理
按照学校原版(Greenwich文凭证书)格林威治大学毕业证快速办理按照学校原版(Greenwich文凭证书)格林威治大学毕业证快速办理
按照学校原版(Greenwich文凭证书)格林威治大学毕业证快速办理
 
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
 
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
 
按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理
按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理
按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理
 
按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理
按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理
按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理
 
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
 
按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理
按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理
按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理
 
按照学校原版(QU文凭证书)皇后大学毕业证快速办理
按照学校原版(QU文凭证书)皇后大学毕业证快速办理按照学校原版(QU文凭证书)皇后大学毕业证快速办理
按照学校原版(QU文凭证书)皇后大学毕业证快速办理
 

database-security-design.ppt

  • 1. Database Security - Farkas 1 Database Security and Privacy
  • 2. 2 Database Security - Farkas Security Objectives Secrecy Prevent/detect/deter improper Disclosure of information Availability Prevent/detect/deter improper Denial of access to services Integrity Prevent/detect/deter Improper modification of information
  • 3. 3 Database Security - Farkas Policy Organizational policy Information systems policy
  • 4. Databases  Collection of  interrelated data and  set of programs to access the data  Convenient and efficient processing of data  Database Application Software 4 Database Security - Farkas
  • 5. Database Security  Protect Sensitive Data from  Unauthorized disclosure  Unauthorized modification  Denial of service attacks  Security Controls  Security Policy  Access control models  Integrity protection  Privacy problems  Fault tolerance and recovery  Auditing and intrusion detection 5 Database Security - Farkas
  • 6. 6 Database Security - Farkas Protection of Data Confidentiality  Access control – which data users can access  Information flow control – what users can do with the accessed data  Data Mining
  • 7. 7 Database Security - Farkas Access Control  Ensures that all direct accesses to object are authorized  Protects against accidental and malicious threats by regulating the read, write and execution of data and programs
  • 8. 8 Database Security - Farkas Access Control Requires: - Proper user identification - Information specifying the access rights is protected form modification
  • 9. 9 Database Security - Farkas Access control components: - Access control policy: specifies the authorized accesses of a system - Access control mechanism: implements and enforces the policy Access Control
  • 10. HOW TO SPECIFY ACCESS CONTROL? 10 Database Security - Farkas
  • 11. 11 Database Security - Farkas Access Control  Subject: active entity that requests access to an object - e.g., user or program  Object: passive entity accessed by a subject - e.g., record, relation, file  Access right (privileges): how a subject is allowed to access an object - e.g., subject s can read object o
  • 12. 12 Database Security - Farkas Protection Object  Database  Relation  Record  Attribute  Element Advantages vs. disadvantages of supporting different granularity levels
  • 13. 13 Database Security - Farkas Relation-Level Granularity Person- name Company- name Salary Smith BB&C $43,982 Dell Bell $97,900 Black BB&C $35,652 Confidential relation
  • 14. 14 Database Security - Farkas Tuple-level Granularity Person-name Company- name Salary Smith BB&C $43,982 Public Dell Bell $97,900 Conf. Black BB&C $35,652 Public Works
  • 15. 15 Database Security - Farkas Attribute-Level Granularity Person- name Publ. Company- name Publ. Salary Conf. Smith BB&C $43,982 Dell Bell $97,900 Black BB&C $35,652 Works
  • 16. 16 Database Security - Farkas Cell-Level Granularity Person- name Company- name Salary Smith P BB&C P $43,982 C Dell C Bell C $97,900 C Black P BB&C C $35,652 C Works
  • 17. 17 Database Security - Farkas Access Control Policies  Discretionary Access Control (DAC)  Mandatory Access Control (MAC)  Role-Based Access Control (RBAC)
  • 18. 18 Database Security - Farkas Discretionary Access Control (DAC)  For each subject access right to the objects are defined  (subject, object, +/- access mode)  (Black, Employee-relation, read)  User based  Grant and Revoke  Problems: - Propagation of access rights - Revocation of propagated access rights
  • 19. 19 Database Security - Farkas DAC by Grant and Revoke Brown (owner) Black Red White GRANT SELECT ON Employee TO Red GRANT SELECT ON Employee TO Black WITH GRANT OPTION ? Brown revokes grant given to Black ? Brown does not want Red to access the Employee relation GRANT UPDATE(Salary) ON Employee TO White
  • 20. 20 Database Security - Farkas Implementation Access Control List (column) File 1 File 2 Joe:Read Joe:Read Joe:Write Sam:Read Joe:Own Sam:Write Sam:Own Capability List (row) Joe: File 1/Read, File 1/Write, File 1/Own, File 2/Read Sam: File 2/Read, File 2/Write, File 2/Own Access Control Triples Subject Access Object Joe Read File 1 Joe Write File 1 Joe Own File 1 Joe Read File 2 Sam Read File 2 Sam Write File 2 Sam Own File 2 (ACL)
  • 21. 21 Database Security - Farkas Access Control Mechanisms  Security through Views  Stored Procedures  Grant and Revoke  Query modification
  • 22. 22 Database Security - Farkas Security Through Views  Assign rights to access predefined views CREATE VIEW Outstanding-Student AS SELECT NAME, COURSE, GRADE FROM Student WHERE GRADE > B Problem: Difficult to maintain updates.
  • 23. 23 Database Security - Farkas Stored Procedures  Assign rights to execute compiled programs  GRANT RUN ON <program> TO <user> Problem: Programs may access resources for which the user who runs the program does not have permission.
  • 24. 24 Database Security - Farkas Grant and Revoke GRANT <privilege> ON <relation> To <user> [WITH GRANT OPTION] ------------------------------------------------------------------------------------------------------------------------------------  GRANT SELECT * ON Student TO Matthews  GRANT SELECT *, UPDATE(GRADE) ON Student TO FARKAS  GRANT SELECT(NAME) ON Student TO Brown GRANT command applies to base relations as well as views
  • 25. 25 Database Security - Farkas Grant and Revoke REVOKE <privileges> [ON <relation>] FROM <user> -------------------------------------------------------------------------------------------------------------------------  REVOKE SELECT* ON Student FROM Blue  REVOKE UPDATE ON Student FROM Black  REVOKE SELECT(NAME) ON Student FROM Brown
  • 26. 26 Database Security - Farkas Non-cascading Revoke A B C D E F A B C A revokes D’s privileges E F
  • 27. 27 Database Security - Farkas Cascading Revoke A B C D E F A B C A revokes D’s privileges
  • 28. 28 Database Security - Farkas Positive and Negative Authorization Problem: Contradictory authorizations • GRANT <privilege> ON X TO <user> • DENY <privilege> ON X TO <user> A B C E D + - + -
  • 29. 29 Database Security - Farkas Negative Authorization A B C E D + - + - - F + What should happen with the privilege given by D To F?
  • 30. 30 Database Security - Farkas Query Modification  GRANT SELECT(NAME) ON Student TO Blue WHERE COURSE=“CSCE 590”  Blue’s query: SELECT * FROM Student  Modified query: SELECT NAME FROM Student WHERE COURSE=“CSCE 590”
  • 31. 31 Database Security - Farkas DAC Overview  Advantages:  Intuitive  Easy to implement  Disadvantages:  Inherent vulnerability (look TH example)  Maintenance of ACL or Capability lists  Maintenance of Grant/Revoke  Limited power of negative authorization
  • 32. 32 Database Security - Farkas Mandatory Access Control (MAC)  Security label - Top-Secret, Secret, Public  Objects: security classification - File 1 is Secret, File 2 is Public  Subjects: security clearances - Brown is cleared to Secret, Black is cleared to Public  Dominance () - Top-Secret  Secret  Public
  • 33. 33 Database Security - Farkas MAC  Access rights: defined by comparing the security classification of the requested objects with the security clearance of the subject  If access control rules are satisfied, access is permitted  Otherwise access is rejected  Granularity of access rights!
  • 34. 34 Database Security - Farkas MAC – Bell-LaPadula (BLP) Model  Single security property: a subject S is allowed a read access to an object O only if label(S) dominates label(O)  Star-property: a subject S is allowed a write access to an object O only if label(O) dominates label(S) No direct flow of information from high security objects to low security objects!
  • 35. Multilevel Security  Multilevel security  users at different security level, see different versions of the database  Problem: different versions need to be kept consistent and coherent without downward signaling channel (covert channel) 35 Database Security - Farkas
  • 36. Multilevel Relation  Schema R(A1,C1,…,An,Cn,Tc)  R: relation name  Ai: attribute name  Ci: security classes  Tc: Tuple security classes  Instantiation of relation: sets of tuples of the form <a1,c1,…,an,cn,tc>  ai: attribute value  ci: attribute classification label  tc: tuple classification label 36 Database Security - Farkas
  • 37. 37 Database Security - Farkas CSCE 790 - Farkas 37 Multilevel Relation Example SSN (SSN) Course (Course) Grade (Grade) 111-22-3333 S CSCE 786 S A TS 444-55-6666 S CSCE 567 S C TS Top-secret user sees all data Secret user sees Secret-View: SSN (SSN) Course (Course) Grade (Grade) 111-22-3333 S CSCE 786 S null S 444-55-6666 S CSCE 567 S null S
  • 38. 38 Database Security - Farkas Polyinstantiation Secret user sees Secret-View: SSN (SSN) Course (Course) Grade (Grade) 111-22-3333 S CSCE 786 S null S 444-55-6666 S CSCE 567 S null S •SSN is primary key •Secret user wants to update Grade for 111-22-3333 from null (i.e., missing value) to F •Allow update: inconsistent database, at TS level two different tuples exist with the same primary key (see next slide) •Not allow update: downward signaling channel, update is because of the existence of a TS value
  • 39. 39 Database Security - Farkas Polyinstantiation SSN (SSN) Course (Course) Grade (Grade) 111-22-3333 S CSCE 786 S A TS 111-22-3333 S CSCE 786 S F S 444-55-6666 S CSCE 567 S C TS Top-Secret View: