Data and Applications Security Developments and DirectionsOutlineWhy Multimedia Data Management System?Architectures: Loose IntegrationArchitectures: Tight IntegrationData Model: ScenarioMultimedia Data Access: Some approachesMetadata for MultimediaStorage MethodsSecurity IssuesAccess Control for Multimedia DatabasesMLS SecurityExample Security Architecture: Integrity LockInference ControlSecuring Geospatial DataFramework for Geospatial Data Security (Joint with UCDavis and Purdue U.)Example of several GIS repositories and GIS themes/layers for Northern California (Gertz, Bertino, Thuraisingham)Example (Continued)Policy Example (Bertino, Gertz, Thuraisingham)Policy Example (Continued)Policy Example (Concluded)Policy LanguageSlide 23DirectionsData and Applications Security Developments and DirectionsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #20Secure Multimedia Data Management and Geospatial data managementMarch 19, 2008OutlineMultimedia Data Management SystemsSecuritySecure Geospatial data managementWhy Multimedia Data Management System?Need persistent storage for managing large quantities of multimedia dataA Multimedia data manager manages multimedia data such as text, images, audio, animation, videoExtended by a Browser to produce a Hypermedia data management systemHeterogeneity with respect to data typesNumerous Applications-Entertainment, Defense and Intelligence, Telecommunications, Finance, MedicalArchitectures:Loose IntegrationMultimediaFile ManagerMetadataModule for IntegratingData Manager with File ManagerUser InterfaceData Manager for MetadataMultimediaFilesArchitectures:Tight IntegrationUser InterfaceUser InterfaceMM-DBMS:Integrated data manager and file managerMM-DBMS:Integrated data manager and file managerMultimediaDatabaseMultimediaDatabaseData Model:ScenarioExample:Object representationObject A2000 Frames4/958/955/9510/95Object B3000 FramesMultimedia Data Access: Some approachesText data-Selection with index features-Methods: Full text scanning, Inverted files, Document clusteringAudio/Speech data-Pattern matching algorithmsMatching index features given for searching and ones available in the databaseImage data-Identifying geometric boundaries, Identifying spatial relationships, Image clusteringVideo data-Retrieval with metadata, Pattern matching with imagesMetadata for MultimediaMetadata may be annotations and stored in relations-I.e., Metadata from text, images, audio and video are extracted as stored as text-Text metadata may be converted to relations by tagging and extracting conceptsMetadata may be images of video data-E.g., certain frames may be captured as metadataMultimedia data understanding-Extracting metadata from the multimedia dataStorage MethodsSingle disk storage-Objects belonging to different media types in same diskMultiple disk storage-Objects distributed across disksExample: individual media types stored in different disksI.e., audio in one disk and video in anotherNeed to synchronize for presentation (real-time techniques)Multiple disks with striping-Distribute placement of media objects in different disksCalled disk stripingSecurity IssuesAccess ControlMultilevel SecurityArchitectureSecure Geospatial Information SystemsAccess Control for Multimedia DatabasesAccess Control for Text, Images, Audio and VideoGranularity of Protection-TextJohn has access to Chapters 1 and 2 but not to 3 and 4-ImagesJohn has access to portions of the imageAccess control for pixels?-Video and AudioJohn has access to Frames 1000 to 2000Jane has access only to scenes in US-Security constraintsAssociation based constraintsE.g., collections of images are classifiedMLS SecurityBookObjectIntroductionSet of SectionsReferencesIntroduction: Level = UnclassifiedSet of Sections: Level = TopSecretReferences: Level = SecretExample Security Architecture: Integrity LockMultimediaDatabaseTrusted Agentto computechecksumsSensorData ManagerUntrustedMultimedia DataManagerCompute ChecksumBased on say multimedia data value(such as video object content)Security level and ChecksumCompute ChecksumBased on multimedia data valueand Security level retrievedfrom the stored multimedia databaseInference ControlMetadata,ConstraintsUser Interface ManagerInference EngineActs as an Inference ControllerMultimediaDatabaseMultimediaDatabaseManagerSecuring Geospatial DataGeospatial images could be Digital Raster Images that store images as pixels or Digital Vector Images that store images as points, lines and polygonsGSAM: Geospatial Authorization Model specifies subjects, credentials, objects (e.g, points, lines, pixels etc.) and the access that subjects have to objectsReference: Authorization Model for Geospatial Data; Atluri and Chun, IEEE Transactions on Dependable and Secure Computing, Volume 1, #4, October – December 2004.Framework for Geospatial Data Security (Joint with UCDavis and Purdue U.)Example of several GIS repositories and GIS themes/layers for Northern California (Gertz, Bertino, Thuraisingham)Assume a single GIS data repository that manages information about parcels (being the basic units of geography for local government) and cadastre, including land use and zoning, environmental areas, and municipal utility services. Such type of repository is typically used by public sector staff to assist property owners and to support emergency, fire, and police operations. The latter type of usage includes identifying property structures and owners. Parcel maps in particular can be useful to do damage assessment after a disaster.Example (Continued)They are also an important access point during emergencies for linking data from different GIS repositories. While such types of geospatial are used to serve the public, e.g., through Web-based interfaces, not all data layers are made publicly available. For example, property owner information is not publicly accessible A similar separation of public and private GIS data can be made for other types of themes. For example, environmental theme layers do not make information about locations of endangered species or nesting sites public. Based on this type of separation of GIS data, the following question arises: “What security mechanisms are used to specify and enforce different types of access to data in a single GIS repository?” In particular, “What provisions do GSI data managers have to (1) give public
View Full Document