Database Security Protection Via Inference Detection
نویسندگان
چکیده
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and infer sensitive information from a series of seemingly innocuous data access. In this paper, we proposed a detection system that utilizes both the user’s current query and past query log to determine if the current query answer can infer sensitive information. A semantic inference model (SIM) is constructed based on the data dependency, database schema and semantic relationship among data. After the SIM is instantiated via specific instances, it can then be mapped to a Bayesian network and used for evaluating the inference probability. The decision of answering the current query is based on if any of the sensitive attributes can be inferred with a probability higher than their pre-specified thresholds. This detection system is being extended to the cases of multiple collaborative users based on the query history of all the users and their collaborative levels for specific sensitive information.
منابع مشابه
Protection of Data Base Security via Collaborative Inference Detection
-Throughout companies, government departments, and doctors’ offices, database systems are used. This particular system stores and retrieves sensitive information such as social security numbers, financial statements, and highly classified data. Organizations with sensitive data in their hands need to be secured using different security techniques and policies. In order to secure the data on a c...
متن کاملFine-Grained Access Control for Database Management Systems
The pervasive nature of computing paradigm has made Database Management Systems (DBMS) a predominate technology for business and enterprise applications. With the explosion of information in the computing world and the extensive use of information services, the role of database systems is continuously growing. These rapid technological advances require companies to adopt Database Management Sys...
متن کاملDatabase Security Architecture for Detection of Malicious Transactions in Database
The protection of the data over the database is some how mandatory for the organization, so there is a demand of the security mechanism to protect the database. Even the existing security measures at the database application level are not able to protect the database completely from some malicious actions and reason may be especially because of insider attack. The main objective here, is to des...
متن کاملApplying Data Mining to Data Security
The decrease in the costs of storage devices and the advances in data warehousing advocate a new area of research knowledge discovery in databases. There have been research e orts that apply these techniques to computer security. Unlike previous e orts which focus on operating system and network layer, we use data mining techniques to detect misuse in database systems at the application layer w...
متن کاملProtecting databases from inference attacks
l This work was supported under Maryland Procurement 05ce Contract No. h4DA904-94-C-6120. prise. Using available secure database management systems, an enterprise has the ability to provide various degrees of protection for the data.This protection can range from access lists to label-based protection, where security labels are assigned to the data based on its sensitivity. Access to this data ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006