Fine-Grained Access Control for Database Management Systems

نویسندگان

  • Hong Zhu
  • Kevin Lü
چکیده

The pervasive nature of computing paradigm has made Database Management Systems (DBMS) a predominate technology for business and enterprise applications. With the explosion of information in the computing world and the extensive use of information services, the role of database systems is continuously growing. These rapid technological advances require companies to adopt Database Management Systems that should not only be fast, scalable and reliable but also provide security from internal and external threats. However, the proliferation of information systems in organizations worldwide (communication, transport, education, manufacturing, medicine, business etc.), has increased difficulty in controlling access to data which sometimes results in instigation of various security attacks. This increased reliance on information systems imposes different protection and privacy requirements on DBMSs. Moreover, the advancement in database technology (mainly including Object-Oriented and NoSQL) has made traditional security controls no longer adequate for providing effective security measures, since design and principles of such databases are completely different from those of traditional databases. These latest database paradigms invoke many provoking thoughts towards the security of data. The number of attacks including code injection, inference attacks, DoS attacks can be launched on these databases and basic database vulnerabilities such as unauthorized access, excessive privilege abuse, out-dated patches and misconfigurations may lead to avenues of attack on databases. In this tip, sensitive data of an organization needs to be protected through various security controls primarily by practicing Authentication, Authorization, Encryption, Intrusion Detection System, Auditing and Availability mechanisms. Among these mechanisms, Access Control is considered one of the strong driving forces for protecting the data of an organization as well as preserving the privacy of individual users. In order to provide the strong shield of protection in Database Management Systems, a fine-grained access control scheme, to control access at the row and column level or even at cell-level, should be effectively implemented for the traditional and the latest

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Seminar Report Fine-grained Access Control in Databases

Today, there are countless terabytes of data processed by IT systems, and we store a measurable portion of that data in the relational database management systems (RDBMS). Access control in these IT systems, is one of the cornerstones of any Information Security Policy. The granularity of such access control can be on different levels, like on directories or folder level, database level, table ...

متن کامل

Fine-Grained Data Security in Virtual Organizations

Controlling the access to data based on user credentials is a fundamental part of database management systems. In most cases, the level at which information is controlled extends only to a certain level of granularity. In some scenarios, however, there is a requirement to control access at a more granular way allowing the users to see only the data they are supposed to see in a database table. ...

متن کامل

Xml Access Control in Native and Rdbms - Supported Xml Databases

As the eXtensible Markup Language (XML) has emerged as the de facto standard for storing and exchanging information in the Internet Age, the needs for efficient yet secure access of XML data naturally arise. It becomes increasingly important to be able to tailor information in XML data for various users and applications, while preserving confidentiality. In this dissertation, we ask how fine-gr...

متن کامل

Formal Reasoning about Fine-Grained Access Control Policies

Nowadays, most of the main database management systems offer, in one way or another, the possibility of protecting data using fine-grained access control (FGAC) policies, i.e., policies that depend on dynamic properties of the system state. Reasoning about FGAC policies typically amounts to answering questions about whether a security-related property holds in a (possibly infinite) set of syste...

متن کامل

PSALM: Accurate Sampling for Cardinality Estimation in a Multi-user Environment

In database systems that support fine-grained access controls, each user has access rights that determine which tuples are accessible and which are inaccessible. Queries are answered as if the inaccessible tuples are not present in the database. Thus, users with different access rights may get different answers to a given query. To process queries efficiently in the presence of fine-grained acc...

متن کامل

A Multi-level Access Control Scheme For Multimedia

Security of multimedia database systems becomes a critical problem, especially with the proliferation of multimedia data and applications. One of the most challenging issues is to provide a content-based multimedia database access control that efficiently handles different user’s access with possible fine-grained restrictions at a specific level of the multimedia data. However, the realization ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007