* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Distributed DBMS Security
Global serializability wikipedia , lookup
Commitment ordering wikipedia , lookup
Serializability wikipedia , lookup
Microsoft Access wikipedia , lookup
Open Database Connectivity wikipedia , lookup
Relational model wikipedia , lookup
Microsoft Jet Database Engine wikipedia , lookup
Functional Database Model wikipedia , lookup
Clusterpoint wikipedia , lookup
ContactPoint wikipedia , lookup
DDBMS Security - Bakul Gada Overview Introduction to Database Security Security Issues in centralized databases Security issues in Distributed Databases Introduction Data security – Protect data against unauthorized access. Two aspects – – Data protection. Authorization Control. Aspects of Data security Data Protection – Can be achieved using data encryption techniques. Authorization Control – It ensures that only authorized users perform, operations that they are allowed to perform on the database. Reference: Principles of Distributed Database Systems – M. Tamer Ozsu & Patrick Valduriez Authorization Control It includes two main issues – Access control – Unauthorized Access to data should not be allowed. Integrity Only authorized users should be allowed to modify data in the database. Centralized Authorization Control Allowing a user to do a particular operation on the subsets of database. In RDBMS these subsets can be defined using Views. – Views allow limited access to database Methods of Authorization Control Discretionary Access Control – Based on privileges or access rights Mandatory Access control – Based on policies that can’t be changed by individual users Reference: Database Management Systems - R.Ramakrishnan / J Gehrke (2nd ed.) Discretionary Access Control This can be implemented at two levels – Account Level – Set privileges for each account on different relations Relation Level Set privileges to access each individual relation or view Reference: Database Management Systems - R.Ramakrishnan / J Gehrke (2nd ed.) GRANT and REVOKE commands SQL supports discretionary access control through grant and revoke commands. – Syntax for GRANT and REVOKE commands GRANT < operation type(s)> ON <object> TO <user(s)> REVOKE < operation type(s)> ON <object> TO <user(s)> Reference: Principles of Distributed Database Systems – M. Tamer Ozsu & Patrick Valduriez Mandatory Access Control Users classified based on security classes – – – – Top Secret (TS) Secret (S) Confidential (C) Unclassified (U) Bell –LaPadula Model Most Popular Model for multilevel security. Two restrictions are enforced on data access based on subject/object classification. – – A subject S is not allowed to read an object O unless class(S) class(O) A subject S is not allowed to write an object O unless class(S) class(O) Reference: Bell D.E and LaPadula L.J., "Secure Computer Systems: Unified Exposition and Multics Interpretation", THE MITRE Corporation, July 1975. Authorization Control in Distributed Environment. More Complex. Remote User Authentication Management of distributed authorization rules Handling of Views and User Groups Reference: Principles of Distributed Database Systems – M. Tamer Ozsu & Patrick Valduriez Solution Information for authenticating users is replicated at all sites. All sites of the DDBMS identify & authenticate themselves similarly to the way users do. Integrity How to guarantee database consistency ? A database is said to be consistent if it satisfies the set of integrity constraints. Concurrency control techniques – – – – Locking Technique Timestamp Ordering Multiversion Concurrency Control Validation Concurrency Control Ref: Fundamentals of Database Systems - Elmasri & Navathe (3rd ed) Integrity in Distributed Databases Concurrency Control techniques need to be employed in Distributed databases. Two general classes – – Pessimistic Concurrency Control Optimistic Concurrency Control Summary Security issues in Distributed Databases are more complex as compared to Centralized Databases. But they can be taken care of through careful study. Future Right now, RDBMS is a better choice for distributed applications. OODBMSs are much more difficult to implement in a distributed environment. Steps are being taken to do the same.