DOC PREVIEW
UTD CS 6V81 - Lecture #6 Multilevel Secure Database Management Systems - II

This preview shows page 1-2-19-20 out of 20 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 20 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 20 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 20 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 20 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 20 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Data and Applications Security Developments and DirectionsOutlineOverview of MLS/DBMS DesignsOverview of MLS/DBMS Designs (Concluded)Some MLS/DBMS Commercial Products Developed (late 1980s, early 1990s)Some Challenges: Inference ProblemSome Challenges: PolyinstantiationSome Challenges: Covert ChannelMultilevel Secure Data Model: Classifying DatabasesMultilevel Secure Data Model: Classifying RelationsMultilevel Secure Data Model: Classifying Attributes/ColumnsMultilevel Secure Data Model: Classifying Tuples/RowsMultilevel Secure Data Model: Classifying ElementsMultilevel Secure Data Model: Classifying ViewsMultilevel Secure Data Model: Classifying MetadataMLS/DBMS Functions OverviewMLS/DBMS Functions Secure Query ProcessingMLS/DBMS Functions Secure Transaction ManagementMLS/DBMS Functions Secure Integrity ManagementStatus and DirectionsData and Applications Security Developments and DirectionsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #6Multilevel Secure Database Management Systems - IIJanuary 27, 2005OutlineMLS/DBMS Designs and PrototypesChallengesMultilevel Secure Data ModelsMLS/DBMS FunctionsDirectionsOverview of MLS/DBMS DesignsHinke-Schaefer (SDC Corporation) Introduced operating system providing mandatory access controlIntegrity Lock Prototypes: Two Prototypes developed at MITRE using Ingres and Mistress relational database systemsSeaView: Funded by Rome Air Development Center (RADC) (now Air Force Rome Laboratory) and used operating system providing mandatory access control and introduced polyinstationLock Data Views (LDV) : Extended kernel approach developed by Honeywell and funded by RADC and investigated inference and aggregationOverview of MLS/DBMS Designs (Concluded)ASD, ASD-Views: Developed by TRW based on the Trusted subject approach. ASD Views provided access control on viewsSDDBMS: Effort by Unisys funded by RADC and investigated the distributed approachSINTRA: Developed by Naval Research Laboratory based on the replicated distributed approachSWORD: Designed at the Defense Research Agency in the UK and there goal was not to have polyinstantiationSome MLS/DBMS Commercial Products Developed (late 1980s, early 1990s)Oracle (Trusted ORACLE7 and beyond): Hinke-Schafer and Trusted Subject based architecturesSybase (Secure SQL Server): Trusted subjectARC Professional Services Group (TRUDATA/SQLSentry): Integrity LockInformix (Informix-On-LineSecure): Trusted SubjectDigital Equipment Corporation (SERdb) (this group is now part of Oracle Corp): Trusted SubjectInfoSystems Technology Inc. (Trusted RUBIX): Trusted SubjectTeradata (DBC/1012): Secure Database MachineIngres (Ingres Intelligent Database): Trusted SubjectSome Challenges: Inference ProblemInference is the process of forming conclusions from premisesIf the conclusions are unauthorized, it becomes a problemInference problem in a multilevel environmentAggregation problem is a special case of the inference problem - collections of data elements is Secret but the individual elements are UnclassifiedAssociation problem: attributes A and B taken together is Secret - individually they are UnclassifiedSome Challenges: PolyinstantiationMechanism to avoid certain signaling channelsAlso supports cover storiesExample: John and James have different salaries at different levelsEMPSS# Name Salary1 John 20 2 Paul 303 James 401 John 70 4 Mary 803 James 60LevelUUUSSSSome Challenges: Covert ChannelDatabase transactions manipulate data locks and covertly pass informationTwo transactions T1 and T2; T1 operates at Secret level and T2 operates at Unclassified levelRelation R is classified at Unclassified levelT1 obtains read lock on R and T2 obtains write lock on R T1 and T2 can manipulate when they request locks and signal one bit information for each attempt and over time T1 could covertly send sensitive information to T1Multilevel Secure Data Model: Classifying DatabasesEMPSS# Ename Salary D# 1 John 20K 102 Paul 30K 203 Mary 40K 20DEPTD# Dname Mgr10MathSmith20 Physics JonesDATABASE D: Level = SecretMultilevel Secure Data Model: Classifying RelationsEMP: Level = SecretSS# Ename Salary D# 1 John 20K 102 Paul 30K 203 Mary 40K 20DEPT: Level = UnclassifiedD# Dname Mgr10MathSmith20 Physics JonesMultilevel Secure Data Model: Classifying Attributes/ColumnsEMPSS#: S Ename: U Salary: S D#: U 1 John 20K 102 Paul 30K 203 Mary 40K 20DEPTD#: UDname: U Mgr: S10MathSmith20 Physics JonesU = UnclassifiedS = SecretMultilevel Secure Data Model: Classifying Tuples/RowsEMPSS# Ename Salary D# 1 John 20K 10 U2 Paul 30K 20 S3 Mary 40K 20 TSDEPTD# Dname Mgr10MathSmith U20 Physics Jones CLevel LevelU = UnclassifiedC = ConfidentialS = SecretTS = TopSecretMultilevel Secure Data Model: Classifying ElementsEMPSS#: Ename: Salary D#:1, S John, U 20K, C 10, U2, S Paul, U 30K, S 20, U3, S Mary, U 40K, S 20, UDEPTD#: UDname: U Mgr: S10, UMath, USmith, C20, U Physics, UJones, SU = UnclassifiedC = ConfidentialS = SecretMultilevel Secure Data Model: Classifying ViewsEMPSS# Ename Salary D# 1 John 20K 102 Paul 30K 203 Mary 40K 204 Jane 20K 205 Bill 20K 106 Larry 20K 101 Michelle 30K 20SECRET VIEW EMP (D# = 20)SS# Ename Salary2 Paul 30K3 Mary 40K4 Jane 20K1 Michelle 30KUNCLASSIFIED VIEW EMP (D# = 10)SS# Ename Salary1 John 20K5 Bill 20K6 Larry 20KEMPSS# Ename Salary D# 1 John 20K 102 Paul 30K 203 Mary 40K 204 Jane 20K 205 Bill 20K 106 Larry 20K 101 Michelle 30K 20EMPSS# Ename Salary D# 1 John 20K 102 Paul 30K 203 Mary 40K 204 Jane 20K 205 Bill 20K 106 Larry 20K 101 Michelle 30K 20SECRET VIEW EMP (D# = 20)SS# Ename Salary2 Paul 30K3 Mary 40K4 Jane 20K1 Michelle 30KUNCLASSIFIED VIEW EMP (D# = 10)SS# Ename Salary1 John 20K5 Bill 20K6 Larry 20KMultilevel Secure Data Model: Classifying MetadataRelation RELRelation Attribute LevelEMP SS# SecretEMP Ename UnclassifiedEMP Salary ConfidentialEMP D# UnclassifiedDEPT D# UnclassifiedDEPT Dname Unclassified DEPT Mgr ConfidentialMLS/DBMS FunctionsOverviewMultilevel Secure Database


View Full Document

UTD CS 6V81 - Lecture #6 Multilevel Secure Database Management Systems - II

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download Lecture #6 Multilevel Secure Database Management Systems - II
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture #6 Multilevel Secure Database Management Systems - II and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture #6 Multilevel Secure Database Management Systems - II 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?