A Practical Database Security Model Using Purpose- Based Database Access Control and Group Concept

نویسندگان

  • Ji-Young Lim
  • Woo-Cheol Kim
  • Hongchan Roh
  • Sanghyun Park
چکیده

Personal information that is collected online can be misused and abused. Therefore, data security techniques that restrict the usage of data only to purposes specified by data providers are needed. The LDHD model, a well-known database security model, expresses the purpose of data provision in the unit of cell in order to have a detailed control over privacy preservation. However, since this model collects metadata for every pair of users and purposes, its metadata becomes much larger than the actual data themselves and the introduction of a new data user incurs significant changes to the metadata. Thus, it is just an ideal database security model which can hardly be applied to current database management systems. To resolve these problems, this paper first identifies the requirements of database management systems supporting privacy preservation and then suggests a practical database security model called PBDM+G. Instead of collecting metadata for every pair of users and purposes, the PBDM+G model collects it for every purpose, and the collected metadata are grouped for duplicate elimination. The experimental result shows that the PBDM+G model consumes at most 10% of the space needed for the LDHD model while reducing query processing time up to 23.6%. Keywords-database security; access control; privacy preservation

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Authorization Framework for Database Systems

Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...

متن کامل

A hybrid approach for database intrusion detection at transaction and inter-transaction levels

Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...

متن کامل

A Multi-level Access Control Scheme For Multimedia

Security of multimedia database systems becomes a critical problem, especially with the proliferation of multimedia data and applications. One of the most challenging issues is to provide a content-based multimedia database access control that efficiently handles different user’s access with possible fine-grained restrictions at a specific level of the multimedia data. However, the realization ...

متن کامل

Extending the Qualitative Trajectory Calculus Based on the Concept of Accessibility of Moving Objects in the Paths

Qualitative spatial representation and reasoning are among the important capabilities in intelligent geospatial information system development. Although a large contribution to the study of moving objects has been attributed to the quantitative use and analysis of data, such calculations are ineffective when there is little inaccurate data on position and geometry or when explicitly explaining ...

متن کامل

A combination of semantic and attribute-based access control model for virtual organizations

A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010