SlideShare a Scribd company logo
Prepard by:
1. Mohamed Siddig
2. Mohamed zeinelabdeen
3. Omer Salih
Agenda :
Introduction.
Security in distributed Database.
Security in federated and integrated database.
Security in federated Database.

   The effect of heterogeneity and autonomy on
  federated database security Russell Daviea and
                   Reinhardt Bothab
                    a Port Elizabeth
      Technikon, s20026335@student.petech.ac.za
  b Port Elizabeth Technikon, reinhard@petech.ac.za
 Background.
 Federated Database Systems:
- The term has been used for several different but related
  database system architectures. Federated Database System
  (FDBS) is a collection of co-perating but autonomous
  component database systems.
- The component databases systems (CDBSs) are integrated
  to various degrees and are controlled and co-ordinated by
  a Federated Database Management System (FDBMS).
The road towards Federated Database Systems:




Characteristics of Federated Database Systems :
Distribution.
Heterogeneity.
Autonomy.
A CDBS participating in a FDBS may possess several
types of autonomy:
Design autonomy .
Communication autonomy .
Execution autonomy .
Association autonomy .
Authorization autonomy .
A Five-level Schema Architecture for Federated Databases
 Information security in Database systems:
  Confidentiality / Integrity / Availability (CIA).
 Security problems in databases :
identifying the threats + policies + mechanisms.
Security in Federated Database Systems :
A FDBS provides interoperability between existing
heterogeneous databases providing two advantages :
a user the capability to retrieve data located at
  different heterogeneous databases.
Interoperability is a significant advantage
-- need for protecting the security of the CDBSs and
  their local users.
Security in Federated Database Systems :

 CDBSs join a FDBS.
 establishment of administrative policies.
 Identification and authentication.
 Authorization autonomy .
 Full authorization autonomy .
 Medium authorization autonomy
 Low authorization autonomy.
 Conclusion.
 Opinion.
Deriving Global Authorizations for Federated
                  Databases
                Eugene F. Fodor
       Department of Computer Science
  University of California, Davis, USA 95616
         Email: fodor@cs.ucdavis.edu
      URL: http://avalon.cs.ucdavis.edu/
 Introduction.
 Federated Databases.
 Federated Database Security Issues:
 FDBs pose is the formulation of a global security policy from the
  local security policies of CDBs.
 FDBs are that the integration of data from multiple sources leads
  to new aggregation and inference problems not seen in the CDBs.
 Accountability and authentication also become more complicated
  for FDBs.
Deriving Authorizations for Integrated Objects
 Federated DB Protection Objects:
Constituent schemas provide a common data model:
1. Integrated objects.
2. Local objects.
3. Federated objects.
4. Composite objects.
Exported Local Authorizations and the Dictionary :
      Subject Section
      Operation Section
      Object Section
Global authorization derivation :
Analysis of local authorizations :
auth = <s,op,o> and auth΄= <s΄,op΄,o΄> are Compatible
Auth≈auth΄ ↔(o≈o΄)^(op≈op΄)
Subject Clustering :
A hierarchical clustering technique called single link
clustering is used to derive a similarity tree of subjects.
Global authorization derivation :
 Abstraction of Global Authorizations :
There are two rules for authorization abstraction with
regard to operations and objects :
 Rule 1 :



 Rule 2 :
for objects states that global authorization o¯ for
                                             coincides
 with the integrated object o¯ and its local objects.
 Deriving Authorizations for Composite Objects.
 Conclusion.
 Opinion

More Related Content

Viewers also liked

Symbol table format
Symbol table formatSymbol table format
Symbol table formatJK Knowledge
 
Compiler Engineering Lab#5 : Symbol Table, Flex Tool
Compiler Engineering Lab#5 : Symbol Table, Flex ToolCompiler Engineering Lab#5 : Symbol Table, Flex Tool
Compiler Engineering Lab#5 : Symbol Table, Flex Tool
MashaelQ
 
Yacc (yet another compiler compiler)
Yacc (yet another compiler compiler)Yacc (yet another compiler compiler)
Yacc (yet another compiler compiler)
omercomail
 
compiler ppt on symbol table
 compiler ppt on symbol table compiler ppt on symbol table
compiler ppt on symbol tablenadarmispapaulraj
 
Lexical analyzer
Lexical analyzerLexical analyzer
Lexical analyzer
Princess Doll
 
what is compiler and five phases of compiler
what is compiler and five phases of compilerwhat is compiler and five phases of compiler
what is compiler and five phases of compiler
adilmehmood93
 
What is symbol table?
What is symbol table?What is symbol table?
What is symbol table?
Satyamevjayte Haxor
 
Lex (lexical analyzer)
Lex (lexical analyzer)Lex (lexical analyzer)
Lex (lexical analyzer)
Sami Said
 
Lexical analyzer
Lexical analyzerLexical analyzer
Lexical analyzer
kiran acharya
 
Different phases of a compiler
Different phases of a compilerDifferent phases of a compiler
Different phases of a compiler
Sumit Sinha
 
Phases of Compiler
Phases of CompilerPhases of Compiler
Phases of Compiler
Tanzeela_Hussain
 
Phases of the Compiler - Systems Programming
Phases of the Compiler - Systems ProgrammingPhases of the Compiler - Systems Programming
Phases of the Compiler - Systems Programming
Mukesh Tekwani
 
Lexical analyzer
Lexical analyzerLexical analyzer
Lexical analyzer
Ashwini Sonawane
 
Compiler Design
Compiler DesignCompiler Design
Compiler DesignMir Majid
 
Compiler Chapter 1
Compiler Chapter 1Compiler Chapter 1
Compiler Chapter 1
Huawei Technologies
 
Role-of-lexical-analysis
Role-of-lexical-analysisRole-of-lexical-analysis
Role-of-lexical-analysis
Dattatray Gandhmal
 
Lex and Yacc ppt
Lex and Yacc pptLex and Yacc ppt
Lex and Yacc ppt
pssraikar
 
Symbol table design (Compiler Construction)
Symbol table design (Compiler Construction)Symbol table design (Compiler Construction)
Symbol table design (Compiler Construction)Tech_MX
 

Viewers also liked (20)

Lp 2
Lp 2Lp 2
Lp 2
 
Symbol table format
Symbol table formatSymbol table format
Symbol table format
 
Compiler Engineering Lab#5 : Symbol Table, Flex Tool
Compiler Engineering Lab#5 : Symbol Table, Flex ToolCompiler Engineering Lab#5 : Symbol Table, Flex Tool
Compiler Engineering Lab#5 : Symbol Table, Flex Tool
 
Yacc (yet another compiler compiler)
Yacc (yet another compiler compiler)Yacc (yet another compiler compiler)
Yacc (yet another compiler compiler)
 
compiler ppt on symbol table
 compiler ppt on symbol table compiler ppt on symbol table
compiler ppt on symbol table
 
Lexical analyzer
Lexical analyzerLexical analyzer
Lexical analyzer
 
what is compiler and five phases of compiler
what is compiler and five phases of compilerwhat is compiler and five phases of compiler
what is compiler and five phases of compiler
 
What is symbol table?
What is symbol table?What is symbol table?
What is symbol table?
 
Lex (lexical analyzer)
Lex (lexical analyzer)Lex (lexical analyzer)
Lex (lexical analyzer)
 
Verb phrase
Verb phraseVerb phrase
Verb phrase
 
Lexical analyzer
Lexical analyzerLexical analyzer
Lexical analyzer
 
Different phases of a compiler
Different phases of a compilerDifferent phases of a compiler
Different phases of a compiler
 
Phases of Compiler
Phases of CompilerPhases of Compiler
Phases of Compiler
 
Phases of the Compiler - Systems Programming
Phases of the Compiler - Systems ProgrammingPhases of the Compiler - Systems Programming
Phases of the Compiler - Systems Programming
 
Lexical analyzer
Lexical analyzerLexical analyzer
Lexical analyzer
 
Compiler Design
Compiler DesignCompiler Design
Compiler Design
 
Compiler Chapter 1
Compiler Chapter 1Compiler Chapter 1
Compiler Chapter 1
 
Role-of-lexical-analysis
Role-of-lexical-analysisRole-of-lexical-analysis
Role-of-lexical-analysis
 
Lex and Yacc ppt
Lex and Yacc pptLex and Yacc ppt
Lex and Yacc ppt
 
Symbol table design (Compiler Construction)
Symbol table design (Compiler Construction)Symbol table design (Compiler Construction)
Symbol table design (Compiler Construction)
 

Similar to Security in federated integrated d bs

A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
ijsrd.com
 
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
E.F. Codd (1970).  Evolution of Current Generation Database Tech.docxE.F. Codd (1970).  Evolution of Current Generation Database Tech.docx
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
jacksnathalie
 
Lecture 1&amp;2(rdbms-ii)
Lecture 1&amp;2(rdbms-ii)Lecture 1&amp;2(rdbms-ii)
Lecture 1&amp;2(rdbms-ii)
Ravinder Kamboj
 
Database v1
Database v1Database v1
Database v1
engahmadhassan
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database Users
Mustafa Kamel Mohammadi
 
Dbms unit 1
Dbms unit   1Dbms unit   1
Dbms unit 1
devineni66
 
Dbms Useful PPT
Dbms Useful PPTDbms Useful PPT
Dbms Useful PPT
Krishna Bashyal
 
Information Technology 104
Information Technology 104Information Technology 104
Information Technology 104
'Vladimir Medina
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
Rachel Phillips
 
02 Distributed DBMSTechnology
02 Distributed DBMSTechnology02 Distributed DBMSTechnology
02 Distributed DBMSTechnology
Laguna State Polytechnic University
 
Database Concepts
Database ConceptsDatabase Concepts
Database Concepts
Upendra Reddy Vuyyuru
 
data base unit one on what is databases.pptx
data base unit one on what is databases.pptxdata base unit one on what is databases.pptx
data base unit one on what is databases.pptx
mulukendemis44
 
a hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorizeda hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorized
logicsystemsprojects
 
1_Chapter_One_Introduction_to_Database_Management_System_2.ppt
1_Chapter_One_Introduction_to_Database_Management_System_2.ppt1_Chapter_One_Introduction_to_Database_Management_System_2.ppt
1_Chapter_One_Introduction_to_Database_Management_System_2.ppt
abdu328357
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
 
Ijetcas14 583
Ijetcas14 583Ijetcas14 583
Ijetcas14 583
Iasir Journals
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
thilaganga
 
RDBMS to NoSQL. An overview.
RDBMS to NoSQL. An overview.RDBMS to NoSQL. An overview.
RDBMS to NoSQL. An overview.
Girish. N. Raghavan
 

Similar to Security in federated integrated d bs (20)

A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
 
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
E.F. Codd (1970).  Evolution of Current Generation Database Tech.docxE.F. Codd (1970).  Evolution of Current Generation Database Tech.docx
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
 
Lecture 1&amp;2(rdbms-ii)
Lecture 1&amp;2(rdbms-ii)Lecture 1&amp;2(rdbms-ii)
Lecture 1&amp;2(rdbms-ii)
 
Database v1
Database v1Database v1
Database v1
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database Users
 
DISTRIBUTED DATABASE
DISTRIBUTED DATABASEDISTRIBUTED DATABASE
DISTRIBUTED DATABASE
 
Database security
Database securityDatabase security
Database security
 
Dbms unit 1
Dbms unit   1Dbms unit   1
Dbms unit 1
 
Dbms Useful PPT
Dbms Useful PPTDbms Useful PPT
Dbms Useful PPT
 
Information Technology 104
Information Technology 104Information Technology 104
Information Technology 104
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
02 Distributed DBMSTechnology
02 Distributed DBMSTechnology02 Distributed DBMSTechnology
02 Distributed DBMSTechnology
 
Database Concepts
Database ConceptsDatabase Concepts
Database Concepts
 
data base unit one on what is databases.pptx
data base unit one on what is databases.pptxdata base unit one on what is databases.pptx
data base unit one on what is databases.pptx
 
a hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorizeda hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorized
 
1_Chapter_One_Introduction_to_Database_Management_System_2.ppt
1_Chapter_One_Introduction_to_Database_Management_System_2.ppt1_Chapter_One_Introduction_to_Database_Management_System_2.ppt
1_Chapter_One_Introduction_to_Database_Management_System_2.ppt
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Ijetcas14 583
Ijetcas14 583Ijetcas14 583
Ijetcas14 583
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
 
RDBMS to NoSQL. An overview.
RDBMS to NoSQL. An overview.RDBMS to NoSQL. An overview.
RDBMS to NoSQL. An overview.
 

Recently uploaded

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

Security in federated integrated d bs

  • 1.
  • 2. Prepard by: 1. Mohamed Siddig 2. Mohamed zeinelabdeen 3. Omer Salih
  • 3. Agenda : Introduction. Security in distributed Database. Security in federated and integrated database.
  • 4. Security in federated Database.  The effect of heterogeneity and autonomy on federated database security Russell Daviea and Reinhardt Bothab a Port Elizabeth Technikon, s20026335@student.petech.ac.za b Port Elizabeth Technikon, reinhard@petech.ac.za
  • 5.  Background.  Federated Database Systems: - The term has been used for several different but related database system architectures. Federated Database System (FDBS) is a collection of co-perating but autonomous component database systems. - The component databases systems (CDBSs) are integrated to various degrees and are controlled and co-ordinated by a Federated Database Management System (FDBMS).
  • 6. The road towards Federated Database Systems: Characteristics of Federated Database Systems : Distribution. Heterogeneity. Autonomy.
  • 7. A CDBS participating in a FDBS may possess several types of autonomy: Design autonomy . Communication autonomy . Execution autonomy . Association autonomy . Authorization autonomy .
  • 8. A Five-level Schema Architecture for Federated Databases
  • 9.  Information security in Database systems: Confidentiality / Integrity / Availability (CIA).  Security problems in databases : identifying the threats + policies + mechanisms. Security in Federated Database Systems : A FDBS provides interoperability between existing heterogeneous databases providing two advantages : a user the capability to retrieve data located at different heterogeneous databases. Interoperability is a significant advantage -- need for protecting the security of the CDBSs and their local users.
  • 10. Security in Federated Database Systems :  CDBSs join a FDBS.  establishment of administrative policies.  Identification and authentication.  Authorization autonomy .  Full authorization autonomy .  Medium authorization autonomy  Low authorization autonomy.
  • 12. Deriving Global Authorizations for Federated Databases Eugene F. Fodor Department of Computer Science University of California, Davis, USA 95616 Email: fodor@cs.ucdavis.edu URL: http://avalon.cs.ucdavis.edu/
  • 13.  Introduction.  Federated Databases.  Federated Database Security Issues:  FDBs pose is the formulation of a global security policy from the local security policies of CDBs.  FDBs are that the integration of data from multiple sources leads to new aggregation and inference problems not seen in the CDBs.  Accountability and authentication also become more complicated for FDBs.
  • 14. Deriving Authorizations for Integrated Objects  Federated DB Protection Objects: Constituent schemas provide a common data model: 1. Integrated objects. 2. Local objects. 3. Federated objects. 4. Composite objects. Exported Local Authorizations and the Dictionary :  Subject Section  Operation Section  Object Section
  • 15. Global authorization derivation : Analysis of local authorizations : auth = <s,op,o> and auth΄= <s΄,op΄,o΄> are Compatible Auth≈auth΄ ↔(o≈o΄)^(op≈op΄) Subject Clustering : A hierarchical clustering technique called single link clustering is used to derive a similarity tree of subjects.
  • 16. Global authorization derivation :  Abstraction of Global Authorizations : There are two rules for authorization abstraction with regard to operations and objects :  Rule 1 :  Rule 2 : for objects states that global authorization o¯ for coincides with the integrated object o¯ and its local objects.
  • 17.  Deriving Authorizations for Composite Objects.  Conclusion.  Opinion