SlideShare a Scribd company logo
1 of 16
Study of Security
Functionality in
Distributed Databases
Presented By: Hasib Ahmad Khaliqi
Contents
Introduction to Distributed Database
Concepts in Secure Database
Multilevel Security
Discretionary Security
Security of Emerging Distributed System Technologies
The Security Challenges of DDS
Solutions to address the Security Challenges
Conclusion
References
Inference Problem
Introduction to Distributed Databases
• A distributed database is data that is distributed across multiple databases.
• A distributed database system includes:
o Distributed database management system (DDBMS)
o Distributed database
o Network for interconnection.
• The DDBMS manages the distributed database.
• Distributed database system functions include:
o Distributed query management
o Distributed transaction processing
o Distributed metadata management
o Enforcing security and integrity across the multiple nodes.
Concepts in Secure Databases
• The major issues in security are:
o Authentication
o Identification
o Enforcing appropriate access controls
• Some of the most important security requirements for database management systems are:
o Multi-Level Access Control
o Confidentiality: Confidentiality measures protect information from unauthorized access and misuse.
o Reliability: is defined broadly to mean that the database performs consistently without causing problems. More
specifically, it means that there is accuracy and consistency of data.
o Integrity: Integrity measures protect information from unauthorized alteration.
o Recovery: is the process of restoring the database to a correct (consistent) state in the event of a failure.
Multilevel Security
• In an MLS/DBMS, users cleared at different security levels access and share a database with
data at different security levels
• The security levels form a lattice:
o Unclassified < Confidential < Secret < TopSecret
• Multilevel security is a security policy that allows you to classify objects and users based on a
system of hierarchical security levels and a system of non-hierarchical security categories.
• Prevent unauthorized users from accessing information at a higher classification than their
authorization, and prevents users from declassifying information.
The security policy of MLS/DBMSs
• Mandatory access control (MAC): Mandatory security controls restrict access to data
depending on the sensitivity levels of the data and the clearance level of the user.
• Discretionary access control (DAC): Discretionary security measures are usually in the
form of rules, which specify the type of access that users or groups of users may have
to different kinds of data.
• Other components of the security policy include policies for integrity, identification and
authentication, auditing and accounting.
• Two type of architecures proposed in Multilevel security:
o Distributed Data and Centralized Control
o Distributed Data and Distributed Control
Distributed Data and Centralized
Control Security
• The data is distributed while control is centralized.
• A trusted front-end database system is connected to non-trusted back-end database
systems.
• Each back-end database system operates at a single level and manages data at that level.
• For example, an Unclassified DBMS manages the unclassified data while a Secret DBMS
manages Secret data.
• All communication between the backend database systems is through the front-end
database system.
Distributed Data and Distributed
Control
• In this architecture, the MLS/DDBMS consists of several nodes that are interconnected by a
multilevel secure network.
• In a homogeneous environment, all of the nodes are designed identically.
• Each node is capable of handling multilevel data. Each node has a MLS/DBMS, which
manages the local multilevel database.
• Each node also has a distributed processing component called the Secure Distributed
Processor (SDP). The modules of the SDP are similar to those of the DDBMS described above.
• The algorithms for query, update and transaction processing in a DDBMS have to be
extended to handle multilevel security.
Discretionary Security
• Discretionary security mechanisms enforce rules which specify the types of access that
users or groups of users have to the data.
• In a distributed environment, users need to be authenticated with respect to the local
system as well as the global environment.
• An issue here is whether the authentication mechanism should be centralized or distributed.
If it is centralized, then the authenticator needs to have information about all of the
users of the system. If the authenticator is distributed, then the various components of
the authenticator need to communicate with each other to authenticate a user.
• The access control rules enforced in a distributed environment may be distributed, centralized or
replicated. If the rules are centralized, then the central server needs to check all
accesses to the database.
• If the rules are distributed, then appropriate rules need to be located and enforced for a particular
access.
Security for Emerging Distributed
System Technologies
Data warehouse
Data mining
Collaborative computing systems, distributed
object management systems and the web
Inference Problem
• The inference problem has received a great deal of attention for many years.
• There is still work on this problem especially with emerging technologies such as data
warehousing, data mining and the web.
• Inference is the process of users posing queries and deducing unauthorized
information from the legitimate responses that they receive.
• In short, data mining tools make the inference problem quite dangerous.
• Essentially, the query processor of the MLS/DDBMS described in the preceding
subsection was examined and augmented with constraint processors.
The security challenges of DDBS
Distribution Design
Operating Environment
Replication Control
Distributed Deadlock Management
Distributed Concurrency Control
Solutions to address the security
challenges of DDBS
Locking Techniques Design
Fragmentation
Deadlock Detection Agents
Summary-schema Model
Conclusion
• Distributed database systems are a reality.
• Many organizations are now deploying
distributed database systems.
• Therefore, we have no choice but to
ensure that these systems operate in a
secure environment.
• We believe that as more and more
technologies emerge, the impact of secure
distributed database systems on these
technologies will be significant.
References
• B. Thuraisingham, Security for Distributed
Database Systems, Computers & Security, 2000.
• Simon Wiseman, DERA, Database Security:
Retrospective and Way Forward, 2001
• A. A. Akintola, G. A. Aderounmu and A. U. Osakwe
(2005). “Performing Modeling of an Enhanced
Optimistic Locking Architecture for Concurrency
Control in a Distributed Database System”, ACM
vol.37, No.4, November 2005
• https://studylib.net/doc/14661240/distributed-
database-security--introduction-i%CC%87lker-
k%C3%B6se
• http://ignited.in/I/a/242216
THANK YOU

More Related Content

Similar to Final Study of Security functionality in Distributed Database.pptx

MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptxmissionsk81
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and EthicsHPCC Systems
 
Advanced Data Center Security
Advanced Data Center SecurityAdvanced Data Center Security
Advanced Data Center Securitymanoharparakh
 
Understanding WhatData Center Security Is
Understanding WhatData Center Security IsUnderstanding WhatData Center Security Is
Understanding WhatData Center Security Ismanoharparakh
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
 
Santosh Kumar Meher(2105040008) DISTRIBUTED DATABASE.pptx
Santosh Kumar Meher(2105040008) DISTRIBUTED DATABASE.pptxSantosh Kumar Meher(2105040008) DISTRIBUTED DATABASE.pptx
Santosh Kumar Meher(2105040008) DISTRIBUTED DATABASE.pptxSANTOSH KUMAR MEHER
 
IT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxIT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxpriestmanmable
 
Introduction to databasecasmfnbskdfjnfkjsdnsjkdfn
Introduction to databasecasmfnbskdfjnfkjsdnsjkdfnIntroduction to databasecasmfnbskdfjnfkjsdnsjkdfn
Introduction to databasecasmfnbskdfjnfkjsdnsjkdfnaj01bhisma
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
Who has the data ... and will breach the duty of confidence
Who has the data ... and will breach the duty of confidenceWho has the data ... and will breach the duty of confidence
Who has the data ... and will breach the duty of confidenceEmil Lupu
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfProtelion
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfProtelion
 
Network design consideration
Network design considerationNetwork design consideration
Network design considerationlavanya marichamy
 

Similar to Final Study of Security functionality in Distributed Database.pptx (20)

Dstca
DstcaDstca
Dstca
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and Ethics
 
Data Domain-Driven Design
Data Domain-Driven DesignData Domain-Driven Design
Data Domain-Driven Design
 
Patents and trademarks.pptx
Patents and trademarks.pptxPatents and trademarks.pptx
Patents and trademarks.pptx
 
Advanced Data Center Security
Advanced Data Center SecurityAdvanced Data Center Security
Advanced Data Center Security
 
Understanding WhatData Center Security Is
Understanding WhatData Center Security IsUnderstanding WhatData Center Security Is
Understanding WhatData Center Security Is
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
Santosh Kumar Meher(2105040008) DISTRIBUTED DATABASE.pptx
Santosh Kumar Meher(2105040008) DISTRIBUTED DATABASE.pptxSantosh Kumar Meher(2105040008) DISTRIBUTED DATABASE.pptx
Santosh Kumar Meher(2105040008) DISTRIBUTED DATABASE.pptx
 
IT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxIT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docx
 
Introduction to databasecasmfnbskdfjnfkjsdnsjkdfn
Introduction to databasecasmfnbskdfjnfkjsdnsjkdfnIntroduction to databasecasmfnbskdfjnfkjsdnsjkdfn
Introduction to databasecasmfnbskdfjnfkjsdnsjkdfn
 
DBMS.pptx
DBMS.pptxDBMS.pptx
DBMS.pptx
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Who has the data ... and will breach the duty of confidence
Who has the data ... and will breach the duty of confidenceWho has the data ... and will breach the duty of confidence
Who has the data ... and will breach the duty of confidence
 
Database security
Database securityDatabase security
Database security
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
Distributed dbms (ddbms)
Distributed dbms (ddbms)Distributed dbms (ddbms)
Distributed dbms (ddbms)
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
 

Recently uploaded

Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)Areesha Ahmad
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...ssifa0344
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)PraveenaKalaiselvan1
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfSumit Kumar yadav
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxAArockiyaNisha
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bSérgio Sacani
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
fundamental of entomology all in one topics of entomology
fundamental of entomology all in one topics of entomologyfundamental of entomology all in one topics of entomology
fundamental of entomology all in one topics of entomologyDrAnita Sharma
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticssakshisoni2385
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsSumit Kumar yadav
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfSumit Kumar yadav
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxgindu3009
 
Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPirithiRaju
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINsankalpkumarsahoo174
 

Recently uploaded (20)

Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdf
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
fundamental of entomology all in one topics of entomology
fundamental of entomology all in one topics of entomologyfundamental of entomology all in one topics of entomology
fundamental of entomology all in one topics of entomology
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questions
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdf
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdf
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
 

Final Study of Security functionality in Distributed Database.pptx

  • 1. Study of Security Functionality in Distributed Databases Presented By: Hasib Ahmad Khaliqi
  • 2. Contents Introduction to Distributed Database Concepts in Secure Database Multilevel Security Discretionary Security Security of Emerging Distributed System Technologies The Security Challenges of DDS Solutions to address the Security Challenges Conclusion References Inference Problem
  • 3. Introduction to Distributed Databases • A distributed database is data that is distributed across multiple databases. • A distributed database system includes: o Distributed database management system (DDBMS) o Distributed database o Network for interconnection. • The DDBMS manages the distributed database. • Distributed database system functions include: o Distributed query management o Distributed transaction processing o Distributed metadata management o Enforcing security and integrity across the multiple nodes.
  • 4. Concepts in Secure Databases • The major issues in security are: o Authentication o Identification o Enforcing appropriate access controls • Some of the most important security requirements for database management systems are: o Multi-Level Access Control o Confidentiality: Confidentiality measures protect information from unauthorized access and misuse. o Reliability: is defined broadly to mean that the database performs consistently without causing problems. More specifically, it means that there is accuracy and consistency of data. o Integrity: Integrity measures protect information from unauthorized alteration. o Recovery: is the process of restoring the database to a correct (consistent) state in the event of a failure.
  • 5. Multilevel Security • In an MLS/DBMS, users cleared at different security levels access and share a database with data at different security levels • The security levels form a lattice: o Unclassified < Confidential < Secret < TopSecret • Multilevel security is a security policy that allows you to classify objects and users based on a system of hierarchical security levels and a system of non-hierarchical security categories. • Prevent unauthorized users from accessing information at a higher classification than their authorization, and prevents users from declassifying information.
  • 6. The security policy of MLS/DBMSs • Mandatory access control (MAC): Mandatory security controls restrict access to data depending on the sensitivity levels of the data and the clearance level of the user. • Discretionary access control (DAC): Discretionary security measures are usually in the form of rules, which specify the type of access that users or groups of users may have to different kinds of data. • Other components of the security policy include policies for integrity, identification and authentication, auditing and accounting. • Two type of architecures proposed in Multilevel security: o Distributed Data and Centralized Control o Distributed Data and Distributed Control
  • 7. Distributed Data and Centralized Control Security • The data is distributed while control is centralized. • A trusted front-end database system is connected to non-trusted back-end database systems. • Each back-end database system operates at a single level and manages data at that level. • For example, an Unclassified DBMS manages the unclassified data while a Secret DBMS manages Secret data. • All communication between the backend database systems is through the front-end database system.
  • 8. Distributed Data and Distributed Control • In this architecture, the MLS/DDBMS consists of several nodes that are interconnected by a multilevel secure network. • In a homogeneous environment, all of the nodes are designed identically. • Each node is capable of handling multilevel data. Each node has a MLS/DBMS, which manages the local multilevel database. • Each node also has a distributed processing component called the Secure Distributed Processor (SDP). The modules of the SDP are similar to those of the DDBMS described above. • The algorithms for query, update and transaction processing in a DDBMS have to be extended to handle multilevel security.
  • 9. Discretionary Security • Discretionary security mechanisms enforce rules which specify the types of access that users or groups of users have to the data. • In a distributed environment, users need to be authenticated with respect to the local system as well as the global environment. • An issue here is whether the authentication mechanism should be centralized or distributed. If it is centralized, then the authenticator needs to have information about all of the users of the system. If the authenticator is distributed, then the various components of the authenticator need to communicate with each other to authenticate a user. • The access control rules enforced in a distributed environment may be distributed, centralized or replicated. If the rules are centralized, then the central server needs to check all accesses to the database. • If the rules are distributed, then appropriate rules need to be located and enforced for a particular access.
  • 10. Security for Emerging Distributed System Technologies Data warehouse Data mining Collaborative computing systems, distributed object management systems and the web
  • 11. Inference Problem • The inference problem has received a great deal of attention for many years. • There is still work on this problem especially with emerging technologies such as data warehousing, data mining and the web. • Inference is the process of users posing queries and deducing unauthorized information from the legitimate responses that they receive. • In short, data mining tools make the inference problem quite dangerous. • Essentially, the query processor of the MLS/DDBMS described in the preceding subsection was examined and augmented with constraint processors.
  • 12. The security challenges of DDBS Distribution Design Operating Environment Replication Control Distributed Deadlock Management Distributed Concurrency Control
  • 13. Solutions to address the security challenges of DDBS Locking Techniques Design Fragmentation Deadlock Detection Agents Summary-schema Model
  • 14. Conclusion • Distributed database systems are a reality. • Many organizations are now deploying distributed database systems. • Therefore, we have no choice but to ensure that these systems operate in a secure environment. • We believe that as more and more technologies emerge, the impact of secure distributed database systems on these technologies will be significant.
  • 15. References • B. Thuraisingham, Security for Distributed Database Systems, Computers & Security, 2000. • Simon Wiseman, DERA, Database Security: Retrospective and Way Forward, 2001 • A. A. Akintola, G. A. Aderounmu and A. U. Osakwe (2005). “Performing Modeling of an Enhanced Optimistic Locking Architecture for Concurrency Control in a Distributed Database System”, ACM vol.37, No.4, November 2005 • https://studylib.net/doc/14661240/distributed- database-security--introduction-i%CC%87lker- k%C3%B6se • http://ignited.in/I/a/242216