SlideShare uma empresa Scribd logo
1 de 38
DISTRIBUTED DATABASE  SECURITY “State-of-the-art” Prepared  by :- Mohammed Siddig Ahmed. Omer SalihDawood. Mohammed zein.
introduction The developments in computer networking technology and database systems technology resulted in the development of distributed databases in the late 1970s. There are various architectural for a distributed database systems :- the control is centralized while the data is distributed. the data as well as control are distributed. Multidatabase architectures . non-multidatabase approach(no local database management systems (DBMSs))
Multilevel Security  Much of the work in secure distributed database systems has focused on multilevel security. the early work in the field began with the US. Air Force Summer Study . approaches based on distributed data and centralized control architectures were proposed.  Prototypes based on these approaches were also developed during the late 1980s and early 1990s
Multilevel Security  Con. Two approaches were proposed at the Summer Study:-  the Partitioned approach . trusted front-end database system is connected to non-trusted back-end. second approach was examined where data is replicated. In this approach, the unclassified data is replicated at the Secret and Top-Secret databases, and the Secret data is replicated at the Top-Secret database
Inference Problem This problem has been discussed a great deal over the past three decades.  An extensive investigation of the inference problem for distributed database systems began around 1992. There is still work on this problem especially with emerging technologies such as data warehousing, data mining and the web.
Hippocratic  databases   During the late of 1990s and early and mid of 2000s . These databases are designed such that data collection and disclosure are only performed with the consent of the user who’s data is in question.
trusted mediator  At the same time the trusted mediator  databaseshas  received a great deal of attention the TIHI (Trusted Interoperation of Healthcare Information) project uses a trusted mediator to determine which queries should or should not be allowed . several commercial systems.  Google Health. Microsoft HealthVault,
Blind comparer   During the mid and  late of  2000s . share privacy-sensitive data across distinct organizations. allowing organizations to keep their legacy databases and maintain ownership of the data that they currently store
Blind comparer
Improve Blind comparer  On the late of 2000s. to make the blind comparer more secure it was better to use fake queries and  declassification techniques
Federated database security  “state of the art”
Introduction. A federated database system . Characteristics of Federated Database Systems : ,[object Object]
Heterogeneity .
Autonomy .,[object Object]
Five-level Schema Architecture for Federated Databases: ,[object Object]
Component schema.
Export schema .
Federated schema .
External schema .Federated Database Security:
Federated Database Security State of The Art : Federated Database Security in 80th: Federated Database Security in 90th focused on: ,[object Object]
identity management .
Authorization.,[object Object]
Federated Database Security in millennium : ,[object Object]
identity management .
Authorization.
Concurrency control .,[object Object]
Integrated Distributed Database A common problem within most large corporations is the diversity of database systems. multi-vendor database servers. components of security (availability, integrity, confidentiality).
Research Directions (1998)  Security is an important issue in health care environments where large amounts of highly sensitive personal data are processed.  appeared in the late nineties methodology based on the combination of DAC and MAC security models and uses hierarchies of user roles and data sets
User Role Hierarchies
Fragmentation and allocation
Fragmentation and allocation
Beginning of the millennium
Research Directions (2002)     New architecture that uses mediators and a primitive ticket-based authorization model to manage disparate policies in information enclaves.
Heterogeneous information system
Mediation Infrastructure  A middleware architecture for security policy mediation in information enclaves. It begins by assessing existing technology for software interoperability.
Mediator & primitive authorization  Mediators can be used in conjunction with other integration technologies to achieve a standard architecture for security policy coordination . The primitive authorization model architecture provides a common foundation for policy facilitates  and coordination
Ticket-based Authorization Model Architecture
At the end of 2006

Mais conteúdo relacionado

Mais procurados

Homogeneous ddbms
Homogeneous ddbmsHomogeneous ddbms
Homogeneous ddbmsPooja Dixit
 
Database 2 ddbms,homogeneous & heterognus adv & disadvan
Database 2 ddbms,homogeneous & heterognus adv & disadvanDatabase 2 ddbms,homogeneous & heterognus adv & disadvan
Database 2 ddbms,homogeneous & heterognus adv & disadvanIftikhar Ahmad
 
Distributed dbms cs712 power point slides lecture 1
Distributed dbms   cs712 power point slides lecture 1Distributed dbms   cs712 power point slides lecture 1
Distributed dbms cs712 power point slides lecture 1Aimal Syeda
 
Types and Functions of DDBMS
Types and Functions of DDBMSTypes and Functions of DDBMS
Types and Functions of DDBMSAdeel Rasheed
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1thilaganga
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed SystemRKGhosh3
 
Database system architecture
Database system architectureDatabase system architecture
Database system architectureDk Rukshan
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed SystemSunita Sahu
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systemscfenoy
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed systemishapadhy
 
Distributed computing
Distributed computingDistributed computing
Distributed computingshivli0769
 
A survey of peer-to-peer content distribution technologies
A survey of peer-to-peer content distribution technologiesA survey of peer-to-peer content distribution technologies
A survey of peer-to-peer content distribution technologiessharefish
 
Database system concepts and architecture
Database system concepts and architectureDatabase system concepts and architecture
Database system concepts and architectureJafar Nesargi
 
Distributed System
Distributed SystemDistributed System
Distributed SystemIqra khalil
 

Mais procurados (20)

Lecture 1 ddbms
Lecture 1 ddbmsLecture 1 ddbms
Lecture 1 ddbms
 
Homogeneous ddbms
Homogeneous ddbmsHomogeneous ddbms
Homogeneous ddbms
 
Database 2 ddbms,homogeneous & heterognus adv & disadvan
Database 2 ddbms,homogeneous & heterognus adv & disadvanDatabase 2 ddbms,homogeneous & heterognus adv & disadvan
Database 2 ddbms,homogeneous & heterognus adv & disadvan
 
DDBMS
DDBMSDDBMS
DDBMS
 
Distributed dbms cs712 power point slides lecture 1
Distributed dbms   cs712 power point slides lecture 1Distributed dbms   cs712 power point slides lecture 1
Distributed dbms cs712 power point slides lecture 1
 
Ijetcas14 583
Ijetcas14 583Ijetcas14 583
Ijetcas14 583
 
Types and Functions of DDBMS
Types and Functions of DDBMSTypes and Functions of DDBMS
Types and Functions of DDBMS
 
distributed dbms
distributed dbmsdistributed dbms
distributed dbms
 
Distributed D B
Distributed  D BDistributed  D B
Distributed D B
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
 
Database system architecture
Database system architectureDatabase system architecture
Database system architecture
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
 
Cloud Computing & Distributed Computing
Cloud Computing & Distributed ComputingCloud Computing & Distributed Computing
Cloud Computing & Distributed Computing
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed system
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
A survey of peer-to-peer content distribution technologies
A survey of peer-to-peer content distribution technologiesA survey of peer-to-peer content distribution technologies
A survey of peer-to-peer content distribution technologies
 
Database system concepts and architecture
Database system concepts and architectureDatabase system concepts and architecture
Database system concepts and architecture
 
Distributed System
Distributed SystemDistributed System
Distributed System
 

Destaque

Intro to Distributed Database Management System
Intro to Distributed Database Management SystemIntro to Distributed Database Management System
Intro to Distributed Database Management SystemAli Raza
 
Database, 3 Distribution Design
Database, 3 Distribution DesignDatabase, 3 Distribution Design
Database, 3 Distribution DesignAli Usman
 
An Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management SystemAn Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management SystemIJSRD
 
Distributed Databases
Distributed DatabasesDistributed Databases
Distributed Databaseselliando dias
 
Fragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed DatabaseFragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed DatabaseAbhilasha Lahigude
 
Database Security
Database SecurityDatabase Security
Database Securityalraee
 
Apricot users from across the pond
Apricot users from across the pondApricot users from across the pond
Apricot users from across the pondapricotbyctk
 
Database Integration to Improve Accessibility to High-Throughput Sequence Data
Database Integration to Improve Accessibility to High-Throughput Sequence DataDatabase Integration to Improve Accessibility to High-Throughput Sequence Data
Database Integration to Improve Accessibility to High-Throughput Sequence DataTazro Ohta
 
Database exam questions
Database exam questionsDatabase exam questions
Database exam questionsToxic-_-Minion
 
IWMW 1997: Database-WWW Integration
IWMW 1997: Database-WWW IntegrationIWMW 1997: Database-WWW Integration
IWMW 1997: Database-WWW IntegrationIWMW
 
Database Continuous Integration
Database Continuous IntegrationDatabase Continuous Integration
Database Continuous IntegrationSteven Wang
 
Why All the Buzz About Database Integration Solutions?
Why All the Buzz About Database Integration Solutions? Why All the Buzz About Database Integration Solutions?
Why All the Buzz About Database Integration Solutions? apricotbyctk
 
Comparison of dbms
Comparison of dbmsComparison of dbms
Comparison of dbmsTech_MX
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access controlJyotishkar Dey
 
Current trends in data security nursing research ppt
Current trends in data security nursing research pptCurrent trends in data security nursing research ppt
Current trends in data security nursing research pptNursing Path
 
Privacy Preserving DB Systems
Privacy Preserving DB SystemsPrivacy Preserving DB Systems
Privacy Preserving DB SystemsAshraf Bashir
 

Destaque (20)

Intro to Distributed Database Management System
Intro to Distributed Database Management SystemIntro to Distributed Database Management System
Intro to Distributed Database Management System
 
Database, 3 Distribution Design
Database, 3 Distribution DesignDatabase, 3 Distribution Design
Database, 3 Distribution Design
 
An Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management SystemAn Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management System
 
Distributed Databases
Distributed DatabasesDistributed Databases
Distributed Databases
 
Fragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed DatabaseFragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed Database
 
Database Security
Database SecurityDatabase Security
Database Security
 
dos_security_final
dos_security_finaldos_security_final
dos_security_final
 
Apricot users from across the pond
Apricot users from across the pondApricot users from across the pond
Apricot users from across the pond
 
Database Integration to Improve Accessibility to High-Throughput Sequence Data
Database Integration to Improve Accessibility to High-Throughput Sequence DataDatabase Integration to Improve Accessibility to High-Throughput Sequence Data
Database Integration to Improve Accessibility to High-Throughput Sequence Data
 
Module 2 handouts part 2
Module 2 handouts part 2Module 2 handouts part 2
Module 2 handouts part 2
 
Database exam questions
Database exam questionsDatabase exam questions
Database exam questions
 
IWMW 1997: Database-WWW Integration
IWMW 1997: Database-WWW IntegrationIWMW 1997: Database-WWW Integration
IWMW 1997: Database-WWW Integration
 
Database Continuous Integration
Database Continuous IntegrationDatabase Continuous Integration
Database Continuous Integration
 
Why All the Buzz About Database Integration Solutions?
Why All the Buzz About Database Integration Solutions? Why All the Buzz About Database Integration Solutions?
Why All the Buzz About Database Integration Solutions?
 
3 design
3 design3 design
3 design
 
Comparison of dbms
Comparison of dbmsComparison of dbms
Comparison of dbms
 
Sl02 2x2 (1)
Sl02 2x2 (1)Sl02 2x2 (1)
Sl02 2x2 (1)
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
 
Current trends in data security nursing research ppt
Current trends in data security nursing research pptCurrent trends in data security nursing research ppt
Current trends in data security nursing research ppt
 
Privacy Preserving DB Systems
Privacy Preserving DB SystemsPrivacy Preserving DB Systems
Privacy Preserving DB Systems
 

Semelhante a DISTRIBUTED DATABASE SECURITY "STATE-OF-THE-ART

Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemConference Papers
 
Data Integration in Multi-sources Information Systems
Data Integration in Multi-sources Information SystemsData Integration in Multi-sources Information Systems
Data Integration in Multi-sources Information Systemsijceronline
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityIGEEKS TECHNOLOGIES
 
Big data security and privacy issues in the
Big data security and privacy issues in theBig data security and privacy issues in the
Big data security and privacy issues in theIJNSA Journal
 
BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD
BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD
BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD IJNSA Journal
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd Iaetsd
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116IJRAT
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data SharingIJERA Editor
 
A Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudA Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudPaaSword EU Project
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The SecurityRachel Phillips
 
APS-Presentation-MK.pptx
APS-Presentation-MK.pptxAPS-Presentation-MK.pptx
APS-Presentation-MK.pptxMadhura Arvind
 
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
E.F. Codd (1970).  Evolution of Current Generation Database Tech.docxE.F. Codd (1970).  Evolution of Current Generation Database Tech.docx
E.F. Codd (1970). Evolution of Current Generation Database Tech.docxjacksnathalie
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityAssociate Professor in VSB Coimbatore
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based dataASAITHAMBIRAJAA
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based datahemanthbbc
 

Semelhante a DISTRIBUTED DATABASE SECURITY "STATE-OF-THE-ART (20)

Database security
Database securityDatabase security
Database security
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
 
Data Integration in Multi-sources Information Systems
Data Integration in Multi-sources Information SystemsData Integration in Multi-sources Information Systems
Data Integration in Multi-sources Information Systems
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
Big data security and privacy issues in the
Big data security and privacy issues in theBig data security and privacy issues in the
Big data security and privacy issues in the
 
BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD
BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD
BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processing
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
 
Security for Big Data
Security for Big DataSecurity for Big Data
Security for Big Data
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
A Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudA Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the Cloud
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
APS-Presentation-MK.pptx
APS-Presentation-MK.pptxAPS-Presentation-MK.pptx
APS-Presentation-MK.pptx
 
Ijcatr04051015
Ijcatr04051015Ijcatr04051015
Ijcatr04051015
 
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
E.F. Codd (1970).  Evolution of Current Generation Database Tech.docxE.F. Codd (1970).  Evolution of Current Generation Database Tech.docx
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based data
 
phr
phrphr
phr
 

Mais de Mohamed Zeinelabdeen Abdelgader Farh jber

الآثار الأخلاقية المترتبة على الملكية الفكرية في أفريقيا
الآثار الأخلاقية المترتبة على الملكية الفكرية في أفريقياالآثار الأخلاقية المترتبة على الملكية الفكرية في أفريقيا
الآثار الأخلاقية المترتبة على الملكية الفكرية في أفريقياMohamed Zeinelabdeen Abdelgader Farh jber
 
Comparison of the workflow management systems bizagi, process maker, and joget
Comparison of the workflow management systems bizagi, process maker, and jogetComparison of the workflow management systems bizagi, process maker, and joget
Comparison of the workflow management systems bizagi, process maker, and jogetMohamed Zeinelabdeen Abdelgader Farh jber
 
Comparison of the workflow management systems bizagi, process maker, and joget
Comparison of the workflow management systems bizagi, process maker, and jogetComparison of the workflow management systems bizagi, process maker, and joget
Comparison of the workflow management systems bizagi, process maker, and jogetMohamed Zeinelabdeen Abdelgader Farh jber
 

Mais de Mohamed Zeinelabdeen Abdelgader Farh jber (13)

الآثار الأخلاقية المترتبة على الملكية الفكرية في أفريقيا
الآثار الأخلاقية المترتبة على الملكية الفكرية في أفريقياالآثار الأخلاقية المترتبة على الملكية الفكرية في أفريقيا
الآثار الأخلاقية المترتبة على الملكية الفكرية في أفريقيا
 
موزع البريد الرقمي
موزع البريد الرقمي موزع البريد الرقمي
موزع البريد الرقمي
 
Comparison of the workflow management systems bizagi, process maker, and joget
Comparison of the workflow management systems bizagi, process maker, and jogetComparison of the workflow management systems bizagi, process maker, and joget
Comparison of the workflow management systems bizagi, process maker, and joget
 
Comparison of the workflow management systems bizagi, process maker, and joget
Comparison of the workflow management systems bizagi, process maker, and jogetComparison of the workflow management systems bizagi, process maker, and joget
Comparison of the workflow management systems bizagi, process maker, and joget
 
Black & White Box testing
Black & White Box testingBlack & White Box testing
Black & White Box testing
 
Workflow Management Systems Comparison Study
 Workflow Management Systems Comparison Study Workflow Management Systems Comparison Study
Workflow Management Systems Comparison Study
 
Transaction management transparencies
Transaction management transparenciesTransaction management transparencies
Transaction management transparencies
 
Transaction management for a main memory database
Transaction management for a main memory databaseTransaction management for a main memory database
Transaction management for a main memory database
 
Embedded systems1
Embedded systems1Embedded systems1
Embedded systems1
 
B trees
B treesB trees
B trees
 
Web servers
Web serversWeb servers
Web servers
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
Online Msc Application Workflow Management System
Online Msc Application Workflow Management SystemOnline Msc Application Workflow Management System
Online Msc Application Workflow Management System
 

DISTRIBUTED DATABASE SECURITY "STATE-OF-THE-ART

  • 1. DISTRIBUTED DATABASE SECURITY “State-of-the-art” Prepared by :- Mohammed Siddig Ahmed. Omer SalihDawood. Mohammed zein.
  • 2. introduction The developments in computer networking technology and database systems technology resulted in the development of distributed databases in the late 1970s. There are various architectural for a distributed database systems :- the control is centralized while the data is distributed. the data as well as control are distributed. Multidatabase architectures . non-multidatabase approach(no local database management systems (DBMSs))
  • 3. Multilevel Security Much of the work in secure distributed database systems has focused on multilevel security. the early work in the field began with the US. Air Force Summer Study . approaches based on distributed data and centralized control architectures were proposed. Prototypes based on these approaches were also developed during the late 1980s and early 1990s
  • 4. Multilevel Security Con. Two approaches were proposed at the Summer Study:- the Partitioned approach . trusted front-end database system is connected to non-trusted back-end. second approach was examined where data is replicated. In this approach, the unclassified data is replicated at the Secret and Top-Secret databases, and the Secret data is replicated at the Top-Secret database
  • 5. Inference Problem This problem has been discussed a great deal over the past three decades. An extensive investigation of the inference problem for distributed database systems began around 1992. There is still work on this problem especially with emerging technologies such as data warehousing, data mining and the web.
  • 6. Hippocratic databases During the late of 1990s and early and mid of 2000s . These databases are designed such that data collection and disclosure are only performed with the consent of the user who’s data is in question.
  • 7. trusted mediator At the same time the trusted mediator databaseshas received a great deal of attention the TIHI (Trusted Interoperation of Healthcare Information) project uses a trusted mediator to determine which queries should or should not be allowed . several commercial systems. Google Health. Microsoft HealthVault,
  • 8. Blind comparer During the mid and late of 2000s . share privacy-sensitive data across distinct organizations. allowing organizations to keep their legacy databases and maintain ownership of the data that they currently store
  • 10. Improve Blind comparer On the late of 2000s. to make the blind comparer more secure it was better to use fake queries and declassification techniques
  • 11. Federated database security “state of the art”
  • 12.
  • 14.
  • 15.
  • 19. External schema .Federated Database Security:
  • 20.
  • 22.
  • 23.
  • 26.
  • 27. Integrated Distributed Database A common problem within most large corporations is the diversity of database systems. multi-vendor database servers. components of security (availability, integrity, confidentiality).
  • 28. Research Directions (1998) Security is an important issue in health care environments where large amounts of highly sensitive personal data are processed. appeared in the late nineties methodology based on the combination of DAC and MAC security models and uses hierarchies of user roles and data sets
  • 32. Beginning of the millennium
  • 33. Research Directions (2002) New architecture that uses mediators and a primitive ticket-based authorization model to manage disparate policies in information enclaves.
  • 35. Mediation Infrastructure A middleware architecture for security policy mediation in information enclaves. It begins by assessing existing technology for software interoperability.
  • 36. Mediator & primitive authorization Mediators can be used in conjunction with other integration technologies to achieve a standard architecture for security policy coordination . The primitive authorization model architecture provides a common foundation for policy facilitates and coordination
  • 38. At the end of 2006
  • 39. Research Directions (2006) Some researchers develop “Mediator” to map different policies. The deficiency is its lower efficiency. They proposed the concept of “authority propagation” to realize the integration AC policies.
  • 40. Authority Propagating Tree (APT) Model Use “tree” to express the ministration of authorities for Graph Theory offer convenient means describing attribution flows. The Advantages of APT It can represent RBAC, MAC and DAC policies. It can track the whole authority granting history. Because of the above advantages the APT can generate a new access control model .
  • 41.
  • 46.
  • 49. APT
  • 50.
  • 51. References Google Health, “http://www.google.com/health.” Microsoft HealthVault, http://www.healthvault.com/. M. Siegenthaler and K. Birman, “Sharing private information across distributed databases,” in submitted for publication, 2009. -Susanne Busse, Ralf-DetlefKutsche, Ulf Leser, Herbert Weber, Federated Information Systems:Concepts, Terminology and Architectures, TechnischeUniversit.t Berlin,1999. JAMES A. LARSON, Federated Database Systems for Managing Distributed, Heterogeneous, and Autonomous Databases’, 1990. W. Eßmayr, G. Pernul, A M. Tjoa, A Security Concept for Federated Database Systems, 1st Int. Congress on Ethical, Legal, and Social Aspects of Digital Information, Monte-Carlo, Monaco, March 1997. Sabrina De CapitanidiVimercati ,PierangelaSamarati, Access Control in Federated Systems.
  • 52. References Eugene F. Fodor, Deriving Global Authorizations for Federated Databases.1999. Ajoy Kumar, Federated Identity Management,2004. Arun Kumar Yadav, An Approach for Ensuring Concurrency Control of Global Transactions in Heterogeneous Distributed Database,2010. http://en.wikipedia.org/wiki/Federated_database_system. Marie Khair, IoannisMavridis & George Pangalos, Design of secure distributed medical database systems, Database and Expert Systems Applications, 9th International Conference, DEXA'98 Vienna, Austria, August 24–28, 1998. John Hale, Pablo Galiasso, Mauricio Papa, SujeetShenoi,Security Policy Coordination for Heterogeneous Information Systems, IEEE 6 Aug 2002. LIU Xin, HAN Zhen & SHEN Chang-Xiang,An Integrated Access Control Model of Distributed Database Systems, First International Conference on Innovative Computing, Information and Control - Volume III (ICICIC'06), 2006.
  • 53. References Bell, D.E., and La Padula, L.J. “Secure Computer Systems: A Refinement of the Mathematical Fundations” [J],ESD-TR-73-278, Vol.III, AD 780 528, Electronic Systems Division, Air Force System Command, Hanscom AFB, Bedford, Massachusetts, November. 1974. R.S. Sandhu, E.J.Coyne, H.L.Feinstein. Role Based Access Control Models. IEEE Computer, February 1996. Vol 29( 2): 38-47. E.Bertino, S.Jajodia, P.Samarati. Supporting Multiple Access Control Policies in Databases System. In: IEEE Symposium on Security and Privacy. Oakland, California. 1996. Liuyi, Database and Information System Security[M, Science Press, China,2000. Xin LIU, Zhen HAN, etc., Research On the Extended Confidential Level of BLP Model, Proceedings of KES 2005, Knowledge-Based Intelligent Information and Engineering Systems PartIV, Pps257-262. JiangZongli, JiangShouxu, Formal Language and Automata Theory, Tsinghua University Press,2003. 

Notas do Editor

  1. These multidatabasearchitectures have been studied extensively in the literature.
  2. 1-trusted front-end database system is connected to non-trusted back-end database systems Each back-end database system operates at a single level and manages data at that level.For example, an Unclassified DBMS manages the unclassified data while a Secret DBMS manages Secret data. All communication between the backend database systems is through the front-end database system.2-In this approach, the unclassified data is replicated at the Secret and Top-Secret databases, and the Secret data is replicated at the Top-Secret database.
  3. -at the same time trusted mediator has received a great deal of attention
  4. These are consumer facing services which allow the patient to enter and manage their own information, as well as create sub accounts to allow healthcare providers direct access.
  5. Step 1: Identification of sites, subjects, objects, and permitted actions (identification process). Step 2: Assignment of security labels (labeling process). Step 3: Fragmentation and allocation of data (distribution process). Step 4: Processing of security constraints. Step 5: Definition of permitted actions.
  6. Identification of the subjects 1. Define all the user roles that exist within an application. 2. Group the existing user roles under the corresponding user category depending on the task of the user in the application.Identification of the objects. The security objects are the target of the security protection, and are in another sense the data contained in the application. Data sets represent data with a common use. These data sets are grouped into a number of data categories. Identification of the sites. the function of each site in the context of the whole application, the technical, the type of connection, whether the site is mobile or not and the degree of mobility, the security threats to each site, any special requirementsIdentification of the permitted actions. DAC and MAC security policies 2-Assignment of security labels to the subjects 1. Assign data sets starting with the user roles under a user category. 2. Move data sets shared by all user roles to their common user category. 3. Move data sets shared by all user categories to their common super categories. This procedure is repeated till reaching the root.
  7. The proposed design methodology takes into account and handles all three components of security (availability, integrity, confidentiality). Fragmentation. 1. If the part to be upgraded is the whole table, then all the table and all its rows are upgraded. 2. If the part to be upgraded is just some rows of the table, then just these rows are assigned a higher security label. 3. In the case that the part to be upgraded is only some fields of a table, then this causes the initial table to be fragmented into two tables. One part is assigned a low and another a strictly higher level. Allocation and replication The decision of whether to replicate or not is usually based on two factors: the number of reads versus the number of updates
  8. Personal opiniondiscussed a methodology to combine only two types of access control and limitation of this if we have more than two types I think that process of combination will not successful .
  9. conflicting policies implemented in an ad hoc mannerSecurity managers of mission-critical information enclaves must guarantee the coherence of their policies within global
  10. JDBC provides a standard API for accessing heterogeneous databases, while CORBA enables cross-platform application-level integration.These technologies can be used in concert to provide a common interface for security policy mediators.Each enterprise manages its own policy mediator, which rests on CORBA and JDBC layers. Each mediator contains a current model of its database and prevailing security policy . This is held as a mapping to the primitive authorization modelThe metapolicy concept –a policy about policies– was introduced in . Metapolicies were applied to policy negotiation
  11. verify its security based on the state machine theory
  12. Access Attribute : the type of access mode including select, append, modifySecurity Level : represent categories set privileges on different access mode to an objectRequest element: The set of all the access request elements charged by subjectAccess Request : A certain request charged by a subject to some objectAccess Decision :The set of system decisions on access request denoted as D, D={Yes, No, Error}.Time :The index of event labeled by time
  13. Access Set : is the set of all the current access statuses. representing that subject s has access authority a on objectObject hierarchy : is the paternity of objects described by a rooted tree. The security of an object dominates that of its son.Role hierarchy : is the paternity of objects described by a rooted tree. The security of an object dominates that of its son.APT : is the set of the APTs of all the current objects in the system denoted as APT.Functions : are level functions and role functions that decide the security level of subject/object or the corresponding relation between the roles and the subjects.