DOC PREVIEW
UTD CS 6V81 - Secure Multimedia Data Management and Geospatial data management

This preview shows page 1-2-23-24 out of 24 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Data and Applications Security Developments and DirectionsOutlineWhy Multimedia Data Management System?Architectures: Loose IntegrationArchitectures: Tight IntegrationData Model: ScenarioMultimedia Data Access: Some approachesMetadata for MultimediaStorage MethodsSecurity IssuesAccess Control for Multimedia DatabasesMLS SecurityExample Security Architecture: Integrity LockInference ControlSecuring Geospatial DataFramework for Geospatial Data Security (Joint with UCDavis and Purdue U.)Example of several GIS repositories and GIS themes/layers for Northern California (Gertz, Bertino, Thuraisingham)Example (Continued)Policy Example (Bertino, Gertz, Thuraisingham)Policy Example (Continued)Policy Example (Concluded)Policy LanguageSlide 23DirectionsData and Applications Security Developments and DirectionsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #20Secure Multimedia Data Management and Geospatial data managementMarch 19, 2008OutlineMultimedia Data Management SystemsSecuritySecure Geospatial data managementWhy Multimedia Data Management System?Need persistent storage for managing large quantities of multimedia dataA Multimedia data manager manages multimedia data such as text, images, audio, animation, videoExtended by a Browser to produce a Hypermedia data management systemHeterogeneity with respect to data typesNumerous Applications-Entertainment, Defense and Intelligence, Telecommunications, Finance, MedicalArchitectures:Loose IntegrationMultimediaFile ManagerMetadataModule for IntegratingData Manager with File ManagerUser InterfaceData Manager for MetadataMultimediaFilesArchitectures:Tight IntegrationUser InterfaceUser InterfaceMM-DBMS:Integrated data manager and file managerMM-DBMS:Integrated data manager and file managerMultimediaDatabaseMultimediaDatabaseData Model:ScenarioExample:Object representationObject A2000 Frames4/958/955/9510/95Object B3000 FramesMultimedia Data Access: Some approachesText data-Selection with index features-Methods: Full text scanning, Inverted files, Document clusteringAudio/Speech data-Pattern matching algorithmsMatching index features given for searching and ones available in the databaseImage data-Identifying geometric boundaries, Identifying spatial relationships, Image clusteringVideo data-Retrieval with metadata, Pattern matching with imagesMetadata for MultimediaMetadata may be annotations and stored in relations-I.e., Metadata from text, images, audio and video are extracted as stored as text-Text metadata may be converted to relations by tagging and extracting conceptsMetadata may be images of video data-E.g., certain frames may be captured as metadataMultimedia data understanding-Extracting metadata from the multimedia dataStorage MethodsSingle disk storage-Objects belonging to different media types in same diskMultiple disk storage-Objects distributed across disksExample: individual media types stored in different disksI.e., audio in one disk and video in anotherNeed to synchronize for presentation (real-time techniques)Multiple disks with striping-Distribute placement of media objects in different disksCalled disk stripingSecurity IssuesAccess ControlMultilevel SecurityArchitectureSecure Geospatial Information SystemsAccess Control for Multimedia DatabasesAccess Control for Text, Images, Audio and VideoGranularity of Protection-TextJohn has access to Chapters 1 and 2 but not to 3 and 4-ImagesJohn has access to portions of the imageAccess control for pixels?-Video and AudioJohn has access to Frames 1000 to 2000Jane has access only to scenes in US-Security constraintsAssociation based constraintsE.g., collections of images are classifiedMLS SecurityBookObjectIntroductionSet of SectionsReferencesIntroduction: Level = UnclassifiedSet of Sections: Level = TopSecretReferences: Level = SecretExample Security Architecture: Integrity LockMultimediaDatabaseTrusted Agentto computechecksumsSensorData ManagerUntrustedMultimedia DataManagerCompute ChecksumBased on say multimedia data value(such as video object content)Security level and ChecksumCompute ChecksumBased on multimedia data valueand Security level retrievedfrom the stored multimedia databaseInference ControlMetadata,ConstraintsUser Interface ManagerInference EngineActs as an Inference ControllerMultimediaDatabaseMultimediaDatabaseManagerSecuring Geospatial DataGeospatial images could be Digital Raster Images that store images as pixels or Digital Vector Images that store images as points, lines and polygonsGSAM: Geospatial Authorization Model specifies subjects, credentials, objects (e.g, points, lines, pixels etc.) and the access that subjects have to objectsReference: Authorization Model for Geospatial Data; Atluri and Chun, IEEE Transactions on Dependable and Secure Computing, Volume 1, #4, October – December 2004.Framework for Geospatial Data Security (Joint with UCDavis and Purdue U.)Example of several GIS repositories and GIS themes/layers for Northern California (Gertz, Bertino, Thuraisingham)Assume a single GIS data repository that manages information about parcels (being the basic units of geography for local government) and cadastre, including land use and zoning, environmental areas, and municipal utility services. Such type of repository is typically used by public sector staff to assist property owners and to support emergency, fire, and police operations. The latter type of usage includes identifying property structures and owners. Parcel maps in particular can be useful to do damage assessment after a disaster.Example (Continued)They are also an important access point during emergencies for linking data from different GIS repositories. While such types of geospatial are used to serve the public, e.g., through Web-based interfaces, not all data layers are made publicly available. For example, property owner information is not publicly accessible A similar separation of public and private GIS data can be made for other types of themes. For example, environmental theme layers do not make information about locations of endangered species or nesting sites public. Based on this type of separation of GIS data, the following question arises: “What security mechanisms are used to specify and enforce different types of access to data in a single GIS repository?” In particular, “What provisions do GSI data managers have to (1) give public


View Full Document

UTD CS 6V81 - Secure Multimedia Data Management and Geospatial data management

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download Secure Multimedia Data Management and Geospatial data management
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Secure Multimedia Data Management and Geospatial data management and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Secure Multimedia Data Management and Geospatial data management 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?