Whodunit: An Auditing Tool for Detecting Data Breaches

نویسندگان

  • Raghav Kaushik
  • Ravishankar Ramamurthy
چکیده

Commercial database systems provide support to maintain an audit trail that can be analyzed offline to identify potential threats to data security. We present a tool that performs data auditing that asks for an audit trail of all users and queries that referenced sensitive data, for example “find all queries and corresponding users that referenced John Doe’s salary in the last six months”. Our tool: (1) handles complex SQL queries including constructs such as grouping, aggregation and subqueries, (2) has privacy guarantees, and (3) incorporates novel optimization techniques for efficiently auditing a large workload of complex SQL queries.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Designing an Automated Audit Tool for the Targeted Risk Exposure Reduction

The risk exposure of an organization is the cost of being noncompliant for all process instances that are subject to auditing and it can be reduced by auditing internal controls for every process instance, detecting and eliminating the cause of non-compliance. This paper discusses the design consideration for an automated auditing tool to achieve the desired level of risk exposure reduction. A ...

متن کامل

Detecting Malicious Java Code Using Virtual Machine Auditing

The Java Virtual Machine (JVM) is evolving as an infrastructure for the efficient execution of large-scale, network-based applications. To enable secure execution in this environment, industrial and academic efforts have implemented extensive support for verification of type-safety, authentication, and access control. However, JVMs continue to lack intrinsic support for intrusion detection. Exi...

متن کامل

Auditing the Data Confidentiality of Wireless Local Area Networks

Wireless Local Area Networks (WLANs) provide many significant advantages to the contemporary business enterprise. WLANs also provide considerable security challenges for network administrators and users. Data confidentiality (ie, unauthorised access to data) breaches are the major security vulnerability within WLANs. To date, the major IT security standards from the International Standards Orga...

متن کامل

IOTA: Detecting Erroneous I/O Behavior via I/O Transaction Auditing

The correctness of the I/O system—and thus the correctness of the computer—can be compromised by hardware faults, driver bugs, and security breaches in downloaded device drivers. To detect erroneous I/O behavior, we have developed I/O Transaction Auditing (IOTA), which checks the high-level behavior of I/O transactions. In an IOTA-protected system, the operating system creates a signature of th...

متن کامل

Structural requirements for auditing educational and research processes (Case: Shahed University)

The present study identified the structural requirements for auditing educational and research processes in universities. The problem posed in this research is the lack of specific and appropriate structural dimensions for educational and research auditing. The study is descriptive and used the exploratory method. Questionnaires were used to collect data. Data analysis revealed that formalizati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • PVLDB

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2011