SlideShare uma empresa Scribd logo
1 de 49
Baixar para ler offline
Current Trends in Data
Security
Dr. Jayesh Patidar
www.drjayeshpatidar.blogspot.com
2
Data Security
Dorothy Denning, 1982:
• Data Security is the science and study of
methods of protecting data (...) from
unauthorized disclosure and modification
• Data Security = Confidentiality + Integrity
9/30/2015 www.drjayeshpatidar.blogspot.in
3
Data Security
• Distinct from systems and network security
– Assumes these are already secure
• Tools:
– Cryptography, information theory, statistics, …
• Applications:
– An enabling technology
9/30/2015 www.drjayeshpatidar.blogspot.in
4
Outline
• Traditional data security
• Two attacks
• Data security research today
• Conclusions
9/30/2015 www.drjayeshpatidar.blogspot.in
5
Traditional Data Security
• Security in SQL = Access control +
Views
• Security in statistical databases =
Theory
9/30/2015 www.drjayeshpatidar.blogspot.in
6
Access Control in SQL
GRANT privileges ON object TO users
[WITH GRANT OPTIONS]
privileges = SELECT | INSERT | DELETE | . . .
object = table | attribute
REVOKE privileges ON object FROM users
[CASCADE ]
[Griffith&Wade'76, Fagin'78]
9/30/2015 www.drjayeshpatidar.blogspot.in
7
Views in SQL
A SQL View = (almost) any SQL query
• Typically used as:
GRANT SELECT ON pmpStudents TO DavidRispoli
CREATE VIEW pmpStudents AS
SELECT * FROM Students WHERE…
9/30/2015 www.drjayeshpatidar.blogspot.in
8
Summary of SQL Security
Limitations:
• No row level access control
• Table creator owns the data: that‟s unfair !
… or spectacular failure:
• Only 30% assign privileges to users/roles
– And then to protect entire tables, not columns
Access control = great success story of the DB communi
9/30/2015 www.drjayeshpatidar.blogspot.in
9
Summary (cont)
• Most policies in middleware: slow, error
prone:
– SAP has 10**4 tables
– GTE over 10**5 attributes
– A brokerage house has 80,000 applications
– A US government entity thinks that it has 350K
• Today the database is not at the center of the
policy administration universe
[Rosenthal&Winslett‟2004]
9/30/2015 www.drjayeshpatidar.blogspot.in
10
Security in Statistical DBs
Goal:
• Allow arbitrary aggregate SQL queries
• Hide confidential data
SELECT count(*)
FROM Patients
WHERE age=42
and sex=„M‟
and diagnostic=„schizophrenia‟
OK
SELECT name
FROM Patient
WHERE age=42
and sex=„M‟
and diagnostic=„schizophrenia‟
[Adam&Wortmann‟89]
9/30/2015 www.drjayeshpatidar.blogspot.in
11
Security in Statistical DBs
What has been tried:
• Query restriction
– Query-size control, query-set overlap control, query
monitoring
– None is practical
• Data perturbation
– Most popular: cell combination, cell suppression
– Other methods, for continuous attributes: may introduce bias
• Output perturbation
– For continuous attributes only
[Adam&Wortmann‟89]
9/30/2015 www.drjayeshpatidar.blogspot.in
12
Summary on Security in
Statistical DB
• Original goal seems impossible to
achieve
• Cell combination/suppression are
popular, but do not allow arbitrary
queries
9/30/2015 www.drjayeshpatidar.blogspot.in
13
Outline
• Traditional data security
• Two attacks
• Data security research today
• Conclusions
9/30/2015 www.drjayeshpatidar.blogspot.in
14
Search claims by:
SQL Injection
Your health insurance company lets you see the claims online:
Now search through the claims :
Dr. Lee
First login: User:
Password:
fred
********
SELECT…FROM…WHERE doctor=„Dr. Lee‟ and patientID=„fred‟
[Chris Anley, Advanced SQL Injection In SQL]
9/30/2015 www.drjayeshpatidar.blogspot.in
15
SQL Injection
Now try this:
Search claims by: Dr. Lee‟ OR patientID = „suciu‟; --
Better:
Search claims by: Dr. Lee‟ OR 1 = 1; --
…..WHERE doctor=„Dr. Lee‟ OR patientID=„suciu‟; --‟ and patientID=„fred‟
9/30/2015 www.drjayeshpatidar.blogspot.in
16
SQL Injection
When you‟re done, do this:
Search claims by: Dr. Lee‟; DROP TABLE Patients; --
9/30/2015 www.drjayeshpatidar.blogspot.in
17
SQL Injection
• The DBMS works perfectly. So why is
SQL injection possible so often ?
• Quick answer:
– Poor programming: use stored procedures
!
• Deeper answer:
– Move policy implementation from apps to
DB9/30/2015 www.drjayeshpatidar.blogspot.in
18
Latanya Sweeney‟s Finding
• In Massachusetts, the Group Insurance
Commission (GIC) is responsible for
purchasing health insurance for state
employees
• GIC has to publish the data:
GIC(zip, dob, sex, diagnosis, procedure, ...)
9/30/2015 www.drjayeshpatidar.blogspot.in
19
Latanya Sweeney‟s Finding
• Sweeney paid $20 and bought the voter
registration list for Cambridge
Massachusetts:
GIC(zip, dob, sex, diagnosis, procedure, ...)
VOTER(name, party, ..., zip, dob, sex)
9/30/2015 www.drjayeshpatidar.blogspot.in
20
Latanya Sweeney‟s Finding
• William Weld (former governor) lives in
Cambridge, hence is in VOTER
• 6 people in VOTER share his dob
• only 3 of them were man (same sex)
• Weld was the only one in that zip
• Sweeney learned Weld‟s medical
records !
zip, dob, sex
9/30/2015 www.drjayeshpatidar.blogspot.in
21
Latanya Sweeney‟s Finding
• All systems worked as specified, yet an
important data has leaked
• How do we protect against that ?
Some of today‟s research in data security address breaches
that happen even if all systems work correctly
9/30/2015 www.drjayeshpatidar.blogspot.in
22
Summary on Attacks
SQL injection:
• A correctness problem:
– Security policy implemented poorly in the
application
Sweeney‟s finding:
• Beyond correctness:
– Leakage occurred when all systems work as
specified
9/30/2015 www.drjayeshpatidar.blogspot.in
23
Outline
• Traditional data security
• Two attacks
• Data security research today
• Conclusions
9/30/2015 www.drjayeshpatidar.blogspot.in
24
Research Topics in Data
Security
Rest of the talk:
• Information Leakage
• Privacy
• Fine-grained access control
• Data encryption
• Secure shared computation
9/30/2015 www.drjayeshpatidar.blogspot.in
25
First Last Age Race
Harry Stone 34 Afr-Am
John Reyser 36 Cauc
Beatrice Stone 47 Afr-am
John Ramos 22 Hisp
First Last Age Race
* Stone 30-50 Afr-Am
John R* 20-40 *
* Stone 30-50 Afr-am
John R* 20-40 *
Information Leakage:
k-Anonymity
Definition: each tuple is equal to at least k-1 others
Anonymizing: through suppression and generalization
Hard: NP-complete for supression only
Approximations exists
[Samarati&Sweeney‟98, Meyerson&Williams‟04]
9/30/2015 www.drjayeshpatidar.blogspot.in
26
Information Leakage:
Query-view Security
Secret Query View(s)
Disclosure
?
S(name) V(name,phone)
S(name,phone)
V1(name,dept)
V2(dept,phone)
S(name) V(dept)
S(name)
where
dept=„HR‟
V(name)
where
dept=„RD‟
TABLE Employee(name, dept, phone)Have data:
total
big
tiny
none
[Miklau&S‟04, Miklau&Dalvi&S‟05,Yang&Li‟04]
9/30/2015 www.drjayeshpatidar.blogspot.in
27
Summary on Information
Disclosure
• The theoretical research:
– Exciting new connections between
databases and information theory,
probability theory, cryptography
• The applications:
– many years away
[Abadi&Warinschi‟05]
9/30/2015 www.drjayeshpatidar.blogspot.in
28
Privacy
• “Is the right of individuals to determine
for themselves when, how and to what
extent information about them is
communicated to others”
• More complex than confidentiality
[Agrawal‟03]
9/30/2015 www.drjayeshpatidar.blogspot.in
29
Privacy
Involves:
• Data
• Owner
• Requester
• Purpose
• Consent
Example: Alice gives her email
to a web service
alice@a.b.com
Privacy policy: P3P
9/30/2015 www.drjayeshpatidar.blogspot.in
30
Hippocratic Databases
DB support for implementing privacy
policies.
• Purpose specification
• Consent
• Limited use
• Limited retention
• …
[Agrawal‟03, LeFevrey‟04]
alice@a.b.com
Privacy policy: P3P
Hippocratic DB
Protection against:
 Sloppy organizations
Malicious organizations
9/30/2015 www.drjayeshpatidar.blogspot.in
31
Privacy for Paranoids
• Idea: rely on trusted agents
alice@a.b.com
Agent
aly1@agenthost.com
lice27@agenthost.com
foreign keys ?
[Aggarwal‟04]
Protection against:
 Sloppy organizations
 Malicious attackers9/30/2015 www.drjayeshpatidar.blogspot.in
32
Summary on Privacy
• Major concern in industry
– Legislation
– Consumer demand
• Challenge:
– How to enforce an organization‟s stated
policies
9/30/2015 www.drjayeshpatidar.blogspot.in
33
Fine-grained Access Control
Control access at the tuple level.
• Policy specification languages
• Implementation
9/30/2015 www.drjayeshpatidar.blogspot.in
34
Policy Specification Language
CREATE AUTHORIZATION VIEW PatientsForDoctors AS
SELECT Patient.*
FROM Patient, Doctor
WHERE Patient.doctorID = Doctor.ID
and Doctor.login = %currentUser
Context
parameters
No standard, but usually based on parameterized views.
9/30/2015 www.drjayeshpatidar.blogspot.in
35
Implementation
SELECT Patient.name, Patient.age
FROM Patient
WHERE Patient.disease = „flu‟
SELECT Patient.name, Patient.age
FROM Patient, Doctor
WHERE Patient.disease = „flu‟
and Patient.doctorID = Doctor.ID
and Patient.login = %currentUser
e.g. Oracle
9/30/2015 www.drjayeshpatidar.blogspot.in
36
Two Semantics
• The Truman Model = filter semantics
– transform reality
– ACCEPT all queries
– REWRITE queries
– Sometimes misleading results
• The non-Truman model = deny semantics
– reject queries
– ACCEPT or REJECT queries
– Execute query UNCHANGED
– May define multiple security views for a user
[Rizvi‟04]
SELECT count(*)
FROM Patients
WHERE disease=„flu‟
9/30/2015 www.drjayeshpatidar.blogspot.in
37
Summary of Fine Grained
Access Control
• Trend in industry: label-based security
• Killer app: application hosting
– Independent franchises share a single
table at headquarters (e.g., Holiday Inn)
– Application runs under requester‟s label,
cannot see other labels
– Headquarters runs Read queries over
them
• Oracle‟s Virtual Private Database
[Rosenthal&Winslett‟2004]
9/30/2015 www.drjayeshpatidar.blogspot.in
38
Data Encryption for Publishing
• Users and their keys:
• Complex Policies:
All authorized users: Kuser
Patient: Kpat
Doctor: Kdr
Nurse: Knu
Administrator : Kadmin
What is the encryption granularity ?
Doctor researchers may access trials
Nurses may access diagnostic
Etc…
Scientist wants to publish
medical research data on the Web
9/30/2015 www.drjayeshpatidar.blogspot.in
39
Data Encryption for Publishing
An XML tree protection:
<patient>
<privateData>
<name> <age>
<diagnostic>
JoeDoe 28
<address>
Seattle
<trial>
<drug>
flu
<placebo>
Kuser
Kpat (Knu Kadm) Knu Kdr
Kdr
Kpat Kmaster Kmaster
Tylenol Candy
[Miklau&S.‟03]
Doctor: Kuser, Kdr
Nurse: Kuser, Knu
Nurse+admin: Kuser, Knu, Kadm
9/30/2015 www.drjayeshpatidar.blogspot.in
40
Summary on Data Encryption
• Industry:
– Supported by all vendors:
Oracle, DB2, SQL-Server
– Efficiency issues still largely unresolved
• Research:
– Hard theoretical security analysis
[Abadi&Warinschi‟05]
9/30/2015 www.drjayeshpatidar.blogspot.in
41
Secure Shared Processing
• Alice has a database DBA
• Bob has a database DBB
• How can they compute Q(DBA, DBB), without
revealing their data ?
• Long history in cryptography
• Some database queries are easier than
general case9/30/2015 www.drjayeshpatidar.blogspot.in
42
Secure Shared Processing
[Agrawal‟03]
Alice Bob
a b c d c d e
h(a) h(b) h(c) h(d) h(c) h(d) h(e)
Compute one-way hash
Exchange
h(c) h(d) h(e) h(a) h(b) h(c) h(d)
What‟s wrong ?
Task: find intersection
without revealing the rest
9/30/2015 www.drjayeshpatidar.blogspot.in
43
Secure Shared Processing
Alice Bob
a b c d c d e
EB(c) EB(d) EB(e) EA(a) EA(b) EA(c) EA(d)
commutative encryption:
h(x) = EA(EB(x)) = EB(EA(x))
EA(a) EA(b) EA(c) EA(d) EB(c) EB(d) EB(e)
EA EB
h(c) h(d) h(e) h(a) h(b) h(c) h(d)
EA EB
h(a) h(b) h(c) h(d) h(c) h(d) h(e)
[Agrawal‟03]
9/30/2015 www.drjayeshpatidar.blogspot.in
44
Summary on Secure Shared
Processing
• Secure intersection, joins, data mining
• But are there other examples ?
9/30/2015 www.drjayeshpatidar.blogspot.in
45
Outline
• Traditional data security
• Two attacks
• Data security research today
• Conclusions
9/30/2015 www.drjayeshpatidar.blogspot.in
46
Conclusions
• Traditional data security confined to one
server
– Security in SQL
– Security in statistical databases
• Attacks possible due to:
– Poor implementation of security policies: SQL
injection
– Unintended information leakage in published data
9/30/2015 www.drjayeshpatidar.blogspot.in
47
Conclusions
• State of the industry:
– Data security policies: scattered throughout applications
– Database no longer center of the security universe
– Needed: automatic means to translate complex policies into
physical implementations
• State of research: data security in global data sharing
– Information leakage, privacy, secure computations, etc.
– Database research community has an increased appetite for
cryptographic techniques
9/30/2015 www.drjayeshpatidar.blogspot.in
48
Questions ?
9/30/2015 www.drjayeshpatidar.blogspot.in
Thank You
499/30/2015 www.drjayeshpatidar.blogspot.in

Mais conteúdo relacionado

Mais procurados

Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
Editor IJMTER
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
bharatsvnit
 

Mais procurados (20)

Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
 
Using Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data MiningUsing Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data Mining
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentation
 
Preparing Research Data for Sharing
Preparing Research Data for SharingPreparing Research Data for Sharing
Preparing Research Data for Sharing
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
 
DataTags: Sharing Privacy Sensitive Data by Michael Bar-sinai
DataTags: Sharing Privacy Sensitive Data by Michael Bar-sinaiDataTags: Sharing Privacy Sensitive Data by Michael Bar-sinai
DataTags: Sharing Privacy Sensitive Data by Michael Bar-sinai
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
 
Big Data Repository for Structural Biology: Challenges and Opportunities by P...
Big Data Repository for Structural Biology: Challenges and Opportunities by P...Big Data Repository for Structural Biology: Challenges and Opportunities by P...
Big Data Repository for Structural Biology: Challenges and Opportunities by P...
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
 
A Little Security For Big Data
A Little Security For Big DataA Little Security For Big Data
A Little Security For Big Data
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Microsoft - Policing, Justice and the Law Enforcement Directive & GDPR
Microsoft - Policing, Justice and the Law Enforcement Directive & GDPRMicrosoft - Policing, Justice and the Law Enforcement Directive & GDPR
Microsoft - Policing, Justice and the Law Enforcement Directive & GDPR
 
Five steps to secure big data
Five steps to secure big dataFive steps to secure big data
Five steps to secure big data
 
current-trends
current-trendscurrent-trends
current-trends
 
Security issues associated with big data in cloud
Security issues associated  with big data in cloudSecurity issues associated  with big data in cloud
Security issues associated with big data in cloud
 
How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...
How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...
How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted Data
 

Destaque

Destaque (10)

Introduction to Research Data Management - 2016-02-03 - MPLS Division, Univer...
Introduction to Research Data Management - 2016-02-03 - MPLS Division, Univer...Introduction to Research Data Management - 2016-02-03 - MPLS Division, Univer...
Introduction to Research Data Management - 2016-02-03 - MPLS Division, Univer...
 
Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information security
 
Introduction to Data Management and Sharing
Introduction to Data Management and SharingIntroduction to Data Management and Sharing
Introduction to Data Management and Sharing
 
Cio summit 20170223_v20
Cio summit 20170223_v20Cio summit 20170223_v20
Cio summit 20170223_v20
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
DISTRIBUTED DATABASE
DISTRIBUTED DATABASEDISTRIBUTED DATABASE
DISTRIBUTED DATABASE
 
The hippocratic oath
The hippocratic oathThe hippocratic oath
The hippocratic oath
 
OVERVIEW OF MEDICAL ETHICS
OVERVIEW OF MEDICAL ETHICSOVERVIEW OF MEDICAL ETHICS
OVERVIEW OF MEDICAL ETHICS
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15
 
Should I move my database to the cloud?
Should I move my database to the cloud?Should I move my database to the cloud?
Should I move my database to the cloud?
 

Semelhante a Current trends in data security nursing research ppt

Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summit
administrator_confidis
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for Nonprofits
Community IT Innovators
 

Semelhante a Current trends in data security nursing research ppt (20)

Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Big Data Expo 2015 - Data Science Innovation Privacy Considerations
Big Data Expo 2015 - Data Science Innovation Privacy ConsiderationsBig Data Expo 2015 - Data Science Innovation Privacy Considerations
Big Data Expo 2015 - Data Science Innovation Privacy Considerations
 
Data science and pending EU privacy laws - a storm on the horizon
Data science and pending EU privacy laws - a storm on the horizonData science and pending EU privacy laws - a storm on the horizon
Data science and pending EU privacy laws - a storm on the horizon
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric Security
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summit
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for Nonprofits
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
Isaca how innovation can bridge the gap between privacy and regulations
Isaca   how innovation can bridge the gap between privacy and regulationsIsaca   how innovation can bridge the gap between privacy and regulations
Isaca how innovation can bridge the gap between privacy and regulations
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015
 
week 7.pptx
week 7.pptxweek 7.pptx
week 7.pptx
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Privacy: The New Software Development Dilemma
Privacy: The New Software Development DilemmaPrivacy: The New Software Development Dilemma
Privacy: The New Software Development Dilemma
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
 
Data-Ed Webinar: Demystifying Big Data
Data-Ed Webinar: Demystifying Big Data Data-Ed Webinar: Demystifying Big Data
Data-Ed Webinar: Demystifying Big Data
 
Data-Ed: Demystifying Big Data
Data-Ed: Demystifying Big Data Data-Ed: Demystifying Big Data
Data-Ed: Demystifying Big Data
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
 

Mais de Nursing Path

Mais de Nursing Path (20)

Psychosocial care of coronavirus disease 2019
Psychosocial care of coronavirus disease 2019Psychosocial care of coronavirus disease 2019
Psychosocial care of coronavirus disease 2019
 
Isolation facility for covid-19
Isolation facility for covid-19Isolation facility for covid-19
Isolation facility for covid-19
 
Guidelines on clinical management of covid 19
Guidelines on clinical management of covid   19Guidelines on clinical management of covid   19
Guidelines on clinical management of covid 19
 
Fluid and electrolyte balance
Fluid and electrolyte balanceFluid and electrolyte balance
Fluid and electrolyte balance
 
Hospital Infection Control Programme
Hospital Infection Control ProgrammeHospital Infection Control Programme
Hospital Infection Control Programme
 
Outcome based education
Outcome based educationOutcome based education
Outcome based education
 
Assessment
AssessmentAssessment
Assessment
 
Anxiety disorders
Anxiety disordersAnxiety disorders
Anxiety disorders
 
Selection and organization of learning experience
Selection and organization of learning experienceSelection and organization of learning experience
Selection and organization of learning experience
 
Universal Health Coverage
Universal Health CoverageUniversal Health Coverage
Universal Health Coverage
 
Pneumonia
PneumoniaPneumonia
Pneumonia
 
Swine flu
Swine fluSwine flu
Swine flu
 
Cardiopulmonary resuscitation
Cardiopulmonary resuscitationCardiopulmonary resuscitation
Cardiopulmonary resuscitation
 
Abortion
AbortionAbortion
Abortion
 
Microbiology
MicrobiologyMicrobiology
Microbiology
 
Fundamental of nursing practice exam 4
Fundamental of nursing practice exam 4Fundamental of nursing practice exam 4
Fundamental of nursing practice exam 4
 
Fundamentals of nursing practice exa1
Fundamentals of nursing practice exa1Fundamentals of nursing practice exa1
Fundamentals of nursing practice exa1
 
Fundamentals of nursing practice exam
Fundamentals of nursing practice examFundamentals of nursing practice exam
Fundamentals of nursing practice exam
 
Fundamentals of nursing practice exam
Fundamentals of nursing practice examFundamentals of nursing practice exam
Fundamentals of nursing practice exam
 
The enterobacteriaceae basic properties.ppsx x
The enterobacteriaceae basic properties.ppsx xThe enterobacteriaceae basic properties.ppsx x
The enterobacteriaceae basic properties.ppsx x
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Current trends in data security nursing research ppt

  • 1. Current Trends in Data Security Dr. Jayesh Patidar www.drjayeshpatidar.blogspot.com
  • 2. 2 Data Security Dorothy Denning, 1982: • Data Security is the science and study of methods of protecting data (...) from unauthorized disclosure and modification • Data Security = Confidentiality + Integrity 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 3. 3 Data Security • Distinct from systems and network security – Assumes these are already secure • Tools: – Cryptography, information theory, statistics, … • Applications: – An enabling technology 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 4. 4 Outline • Traditional data security • Two attacks • Data security research today • Conclusions 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 5. 5 Traditional Data Security • Security in SQL = Access control + Views • Security in statistical databases = Theory 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 6. 6 Access Control in SQL GRANT privileges ON object TO users [WITH GRANT OPTIONS] privileges = SELECT | INSERT | DELETE | . . . object = table | attribute REVOKE privileges ON object FROM users [CASCADE ] [Griffith&Wade'76, Fagin'78] 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 7. 7 Views in SQL A SQL View = (almost) any SQL query • Typically used as: GRANT SELECT ON pmpStudents TO DavidRispoli CREATE VIEW pmpStudents AS SELECT * FROM Students WHERE… 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 8. 8 Summary of SQL Security Limitations: • No row level access control • Table creator owns the data: that‟s unfair ! … or spectacular failure: • Only 30% assign privileges to users/roles – And then to protect entire tables, not columns Access control = great success story of the DB communi 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 9. 9 Summary (cont) • Most policies in middleware: slow, error prone: – SAP has 10**4 tables – GTE over 10**5 attributes – A brokerage house has 80,000 applications – A US government entity thinks that it has 350K • Today the database is not at the center of the policy administration universe [Rosenthal&Winslett‟2004] 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 10. 10 Security in Statistical DBs Goal: • Allow arbitrary aggregate SQL queries • Hide confidential data SELECT count(*) FROM Patients WHERE age=42 and sex=„M‟ and diagnostic=„schizophrenia‟ OK SELECT name FROM Patient WHERE age=42 and sex=„M‟ and diagnostic=„schizophrenia‟ [Adam&Wortmann‟89] 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 11. 11 Security in Statistical DBs What has been tried: • Query restriction – Query-size control, query-set overlap control, query monitoring – None is practical • Data perturbation – Most popular: cell combination, cell suppression – Other methods, for continuous attributes: may introduce bias • Output perturbation – For continuous attributes only [Adam&Wortmann‟89] 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 12. 12 Summary on Security in Statistical DB • Original goal seems impossible to achieve • Cell combination/suppression are popular, but do not allow arbitrary queries 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 13. 13 Outline • Traditional data security • Two attacks • Data security research today • Conclusions 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 14. 14 Search claims by: SQL Injection Your health insurance company lets you see the claims online: Now search through the claims : Dr. Lee First login: User: Password: fred ******** SELECT…FROM…WHERE doctor=„Dr. Lee‟ and patientID=„fred‟ [Chris Anley, Advanced SQL Injection In SQL] 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 15. 15 SQL Injection Now try this: Search claims by: Dr. Lee‟ OR patientID = „suciu‟; -- Better: Search claims by: Dr. Lee‟ OR 1 = 1; -- …..WHERE doctor=„Dr. Lee‟ OR patientID=„suciu‟; --‟ and patientID=„fred‟ 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 16. 16 SQL Injection When you‟re done, do this: Search claims by: Dr. Lee‟; DROP TABLE Patients; -- 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 17. 17 SQL Injection • The DBMS works perfectly. So why is SQL injection possible so often ? • Quick answer: – Poor programming: use stored procedures ! • Deeper answer: – Move policy implementation from apps to DB9/30/2015 www.drjayeshpatidar.blogspot.in
  • 18. 18 Latanya Sweeney‟s Finding • In Massachusetts, the Group Insurance Commission (GIC) is responsible for purchasing health insurance for state employees • GIC has to publish the data: GIC(zip, dob, sex, diagnosis, procedure, ...) 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 19. 19 Latanya Sweeney‟s Finding • Sweeney paid $20 and bought the voter registration list for Cambridge Massachusetts: GIC(zip, dob, sex, diagnosis, procedure, ...) VOTER(name, party, ..., zip, dob, sex) 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 20. 20 Latanya Sweeney‟s Finding • William Weld (former governor) lives in Cambridge, hence is in VOTER • 6 people in VOTER share his dob • only 3 of them were man (same sex) • Weld was the only one in that zip • Sweeney learned Weld‟s medical records ! zip, dob, sex 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 21. 21 Latanya Sweeney‟s Finding • All systems worked as specified, yet an important data has leaked • How do we protect against that ? Some of today‟s research in data security address breaches that happen even if all systems work correctly 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 22. 22 Summary on Attacks SQL injection: • A correctness problem: – Security policy implemented poorly in the application Sweeney‟s finding: • Beyond correctness: – Leakage occurred when all systems work as specified 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 23. 23 Outline • Traditional data security • Two attacks • Data security research today • Conclusions 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 24. 24 Research Topics in Data Security Rest of the talk: • Information Leakage • Privacy • Fine-grained access control • Data encryption • Secure shared computation 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 25. 25 First Last Age Race Harry Stone 34 Afr-Am John Reyser 36 Cauc Beatrice Stone 47 Afr-am John Ramos 22 Hisp First Last Age Race * Stone 30-50 Afr-Am John R* 20-40 * * Stone 30-50 Afr-am John R* 20-40 * Information Leakage: k-Anonymity Definition: each tuple is equal to at least k-1 others Anonymizing: through suppression and generalization Hard: NP-complete for supression only Approximations exists [Samarati&Sweeney‟98, Meyerson&Williams‟04] 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 26. 26 Information Leakage: Query-view Security Secret Query View(s) Disclosure ? S(name) V(name,phone) S(name,phone) V1(name,dept) V2(dept,phone) S(name) V(dept) S(name) where dept=„HR‟ V(name) where dept=„RD‟ TABLE Employee(name, dept, phone)Have data: total big tiny none [Miklau&S‟04, Miklau&Dalvi&S‟05,Yang&Li‟04] 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 27. 27 Summary on Information Disclosure • The theoretical research: – Exciting new connections between databases and information theory, probability theory, cryptography • The applications: – many years away [Abadi&Warinschi‟05] 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 28. 28 Privacy • “Is the right of individuals to determine for themselves when, how and to what extent information about them is communicated to others” • More complex than confidentiality [Agrawal‟03] 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 29. 29 Privacy Involves: • Data • Owner • Requester • Purpose • Consent Example: Alice gives her email to a web service alice@a.b.com Privacy policy: P3P 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 30. 30 Hippocratic Databases DB support for implementing privacy policies. • Purpose specification • Consent • Limited use • Limited retention • … [Agrawal‟03, LeFevrey‟04] alice@a.b.com Privacy policy: P3P Hippocratic DB Protection against:  Sloppy organizations Malicious organizations 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 31. 31 Privacy for Paranoids • Idea: rely on trusted agents alice@a.b.com Agent aly1@agenthost.com lice27@agenthost.com foreign keys ? [Aggarwal‟04] Protection against:  Sloppy organizations  Malicious attackers9/30/2015 www.drjayeshpatidar.blogspot.in
  • 32. 32 Summary on Privacy • Major concern in industry – Legislation – Consumer demand • Challenge: – How to enforce an organization‟s stated policies 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 33. 33 Fine-grained Access Control Control access at the tuple level. • Policy specification languages • Implementation 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 34. 34 Policy Specification Language CREATE AUTHORIZATION VIEW PatientsForDoctors AS SELECT Patient.* FROM Patient, Doctor WHERE Patient.doctorID = Doctor.ID and Doctor.login = %currentUser Context parameters No standard, but usually based on parameterized views. 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 35. 35 Implementation SELECT Patient.name, Patient.age FROM Patient WHERE Patient.disease = „flu‟ SELECT Patient.name, Patient.age FROM Patient, Doctor WHERE Patient.disease = „flu‟ and Patient.doctorID = Doctor.ID and Patient.login = %currentUser e.g. Oracle 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 36. 36 Two Semantics • The Truman Model = filter semantics – transform reality – ACCEPT all queries – REWRITE queries – Sometimes misleading results • The non-Truman model = deny semantics – reject queries – ACCEPT or REJECT queries – Execute query UNCHANGED – May define multiple security views for a user [Rizvi‟04] SELECT count(*) FROM Patients WHERE disease=„flu‟ 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 37. 37 Summary of Fine Grained Access Control • Trend in industry: label-based security • Killer app: application hosting – Independent franchises share a single table at headquarters (e.g., Holiday Inn) – Application runs under requester‟s label, cannot see other labels – Headquarters runs Read queries over them • Oracle‟s Virtual Private Database [Rosenthal&Winslett‟2004] 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 38. 38 Data Encryption for Publishing • Users and their keys: • Complex Policies: All authorized users: Kuser Patient: Kpat Doctor: Kdr Nurse: Knu Administrator : Kadmin What is the encryption granularity ? Doctor researchers may access trials Nurses may access diagnostic Etc… Scientist wants to publish medical research data on the Web 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 39. 39 Data Encryption for Publishing An XML tree protection: <patient> <privateData> <name> <age> <diagnostic> JoeDoe 28 <address> Seattle <trial> <drug> flu <placebo> Kuser Kpat (Knu Kadm) Knu Kdr Kdr Kpat Kmaster Kmaster Tylenol Candy [Miklau&S.‟03] Doctor: Kuser, Kdr Nurse: Kuser, Knu Nurse+admin: Kuser, Knu, Kadm 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 40. 40 Summary on Data Encryption • Industry: – Supported by all vendors: Oracle, DB2, SQL-Server – Efficiency issues still largely unresolved • Research: – Hard theoretical security analysis [Abadi&Warinschi‟05] 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 41. 41 Secure Shared Processing • Alice has a database DBA • Bob has a database DBB • How can they compute Q(DBA, DBB), without revealing their data ? • Long history in cryptography • Some database queries are easier than general case9/30/2015 www.drjayeshpatidar.blogspot.in
  • 42. 42 Secure Shared Processing [Agrawal‟03] Alice Bob a b c d c d e h(a) h(b) h(c) h(d) h(c) h(d) h(e) Compute one-way hash Exchange h(c) h(d) h(e) h(a) h(b) h(c) h(d) What‟s wrong ? Task: find intersection without revealing the rest 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 43. 43 Secure Shared Processing Alice Bob a b c d c d e EB(c) EB(d) EB(e) EA(a) EA(b) EA(c) EA(d) commutative encryption: h(x) = EA(EB(x)) = EB(EA(x)) EA(a) EA(b) EA(c) EA(d) EB(c) EB(d) EB(e) EA EB h(c) h(d) h(e) h(a) h(b) h(c) h(d) EA EB h(a) h(b) h(c) h(d) h(c) h(d) h(e) [Agrawal‟03] 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 44. 44 Summary on Secure Shared Processing • Secure intersection, joins, data mining • But are there other examples ? 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 45. 45 Outline • Traditional data security • Two attacks • Data security research today • Conclusions 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 46. 46 Conclusions • Traditional data security confined to one server – Security in SQL – Security in statistical databases • Attacks possible due to: – Poor implementation of security policies: SQL injection – Unintended information leakage in published data 9/30/2015 www.drjayeshpatidar.blogspot.in
  • 47. 47 Conclusions • State of the industry: – Data security policies: scattered throughout applications – Database no longer center of the security universe – Needed: automatic means to translate complex policies into physical implementations • State of research: data security in global data sharing – Information leakage, privacy, secure computations, etc. – Database research community has an increased appetite for cryptographic techniques 9/30/2015 www.drjayeshpatidar.blogspot.in