DOC PREVIEW
UTD CS 6V81 - Lecture #11 Inference Problem - I

This preview shows page 1-2-23-24 out of 24 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Data and Applications Security Developments and DirectionsOutlineHistoryStatistical DatabasesAccess Control and InferenceQuery Modification AlgorithmSecurity Constraints / Access Control RulesSecurity Constraints for HealthcareInference Problem in MLS/DBMSRevisiting Security ConstraintsEnforcement of Security ConstraintsQuery AlgorithmsUpdate AlgorithmsDatabase Design AlgorithmsData Warehousing and InferenceData Mining as a Threat to SecuritySecurity Preserving Data MiningInference problem for Multimedia DatabasesInference Control for Semantic WebInference Control for Semantic Web - IIExample Security-Enhanced Semantic WebSecurity, Ontologies and XMLSemantic Model for Inference ControlDirectionsData and Applications Security Developments and DirectionsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #11Inference Problem - ISeptember 24, 2010Outline HistoryAccess Control and InferenceInference problem in MLS/DBMSInference problem in emerging systemsSemantic data model applicationsConfidentiality, Privacy and TrustDirectionsHistory Statistical databases (1970s – present)Inference problem in databases (early 1980s - present) Inference problem in MLS/DBMS (late 1980s – present)Unsolvability results (1990)Logic for secure databases (1990)Semantic data model applications (late 1980s - present)Emerging applications (1990s – present)Privacy (2000 – present)Statistical Databases Census Bureau has been focusing for decades on statistical inference and statistical databaseCollections of data such as sums and averages may be given out but not the individual data elementsTechniques include -Perturbation where results are modified -Randomization where random samples are used to compute summariesTechniques are being used now for privacy preserving data miningAccess Control and InferenceAccess control in databases started with the work in System R and Ingres Projects-Access Control rules were defined for databases, relations, tuples, attributes and elements-SQL and QUEL languages were extended GRANT and REVOKE StatementsRead access on EMP to User group A Where EMP.Salary < 30K and EMP.Dept <> Security-Query Modification: Modify the query according to the access control rulesRetrieve all employee information where salary < 30K and Dept is not SecurityQuery Modification AlgorithmInputs: Query, Access Control RulesOutput: Modified QueryAlgorithm:-Given a query Q, examine all the access control rules relevant to the query-Introduce a Where Clause to the query that negates access to the relevant attributes in the access control rulesExample: rules are John does not have access to Salary in EMP and Budget in DEPT Query is to join the EMP and DEPT relations on Dept #Modify the query to Join EMP and DEPT on Dept # and project on all attributes except Salary and Budget-Output is the resulting querySecurity Constraints / Access Control RulesSimple Constraint: John cannot access the attribute Salary of relation EMPContent-based constraint: If relation MISS contains information about missions in the Middle East, then John cannot access MISSAssociation-based Constraint: Ship’s location and mission taken together cannot be accessed by John; individually each attribute can be accessed by JohnRelease constraint: After X is released Y cannot be accessed by JohnAggregate Constraint: Ten or more tuples taken together cannot be accessed by JohnDynamic Constraint: After the Mission, information about the mission can be accessed by JohnSecurity Constraints for HealthcareSimple Constraint: Only doctors can access medical recordsContent-based constraint: If the patient has Aids then this information is privateAssociation-based Constraint: Names and medical records taken together is privateRelease constraint: After medical records are released, names cannot be releasedAggregate Constraint: The collection of patients is private, individually publicDynamic Constraint: After the patient dies, information about him becomes publicInference Problem in MLS/DBMSInference is the process of forming conclusions from premisesIf the conclusions are unauthorized, it becomes a problemInference problem in a multilevel environmentAggregation problem is a special case of the inference problem - collections of data elements is Secret but the individual elements are UnclassifiedAssociation problem: attributes A and B taken together is Secret - individually they are UnclassifiedRevisiting Security ConstraintsSimple Constraint: Mission attribute of SHIP is SecretContent-based constraint: If relation MISSION contains information about missions in Europe, then MISSION is SecretAssociation-based Constraint: Ship’s location and mission taken together is Secret; individually each attribute is UnclassifiedRelease constraint: After X is released Y is SecretAggregate Constraint: Ten or more tuples taken together is SecretDynamic Constraint: After the Mission, information about the mission is UnclassifiedLogical Constraint: A Implies B; therefore if B is Secret then A must be at least SecretEnforcement of Security Constraints User Interface ManagerConstraintManagerSecurity ConstraintsQuery Processor:Constraints during query and release operationsUpdate Processor:Constraints during update operationDatabase Design ToolConstraints during database design operationMLS DatabaseMLS/DBMSQuery AlgorithmsQuery is modified according to the constraintsRelease database is examined as to what has been releasedQuery is processed and response assembledRelease database is examined to determine whether the response should be releasedResult is given to the userPortions of the query processor are trustedUpdate AlgorithmsCertain constraints are examined during update operationExample: Content-based constraintsThe security level of the data is computedData is entered at the appropriate levelCertain parts of the Update Processor are trustedDatabase Design AlgorithmsCertain constraints are examined during the database design time-Example: Simple, Association and Logical ConstraintsSchema are assigned security levelsDatabase is partitioned accordinglyExample:-If Ships location and mission taken together is Secret, then SHIP (S#, Sname) is Unclassified, LOC-MISS(S#, Location, Mission) is Secret


View Full Document

UTD CS 6V81 - Lecture #11 Inference Problem - I

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download Lecture #11 Inference Problem - I
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture #11 Inference Problem - I and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture #11 Inference Problem - I 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?