Database Access Control & Privacy: Is There a Common Ground?

Database Access Control & Privacy: Is There a Common Ground?

Database Access Control & Privacy: Is There A Common Ground? Surajit Chaudhuri Raghav Kaushik Ravi Ramamurthy Microsoft Research Microsoft Research Microsoft Research [email protected] [email protected] [email protected] ABSTRACT fore | (1) data is accessed using SQL queries, (2) the results Data privacy issues are increasingly becoming important for returned are deterministic, hence the utility of query results many applications. Traditionally, research in the database is clear, (3) there is no restriction on the class of queries community in the area of data security can be broadly clas- that can be executed, and (4) there is no restriction on the sified into access control research and data privacy research. total number of query executions. In other words, an access Surprisingly, there is little overlap between these two areas. control mechanism is fully compatible with the functionality In this paper, we open up a discussion that asks if there is of a general purpose database system. Not surprisingly, ac- a suitable middle-ground between these areas. Given that cess control is supported in all commercial database systems the only infrastructure provided by database systems where and the SQL standard. (In fact, some commercial database much sensitive data resides is access control, we ask the ques- systems also support fine-grained access control [11].) tion how the database systems infrastructure can step up to The main limitation of the traditional access control mech- assist with privacy needs. anism in supporting data privacy is that it is \black and white". Consider for example advanced data analysis tasks such as location-aware services of operational Business In- 1. INTRODUCTION telligence that need to stitch together multiple sources of Data privacy issues are becoming increasingly important data such as sales history, demographics and location sensors for our society. This is evidenced by the fact that the re- many of which have sensitive data. For these examples, ef- sponsible management of sensitive data is explicitly being fective analytics needs to leverage many \signals" derived by mandated through laws such as the Sarbanes-Oaxley Act aggregating data from sources who have sensitive private in- and the Health Insurance Portability and Accountability formation, at the same time without revealing any sensitive Act (HIPAA). Accordingly, data privacy has received sub- individual information. But the access control mechanism stantial attention in previous work [3]. The key technical offers only two choices | (1) release no aggregate informa- challenge is to balance utility with the need to preserve pri- tion thereby preserving privacy at the expense of utility, or vacy of individual data. Initial work on data privacy fo- (2) release accurate aggregates thus risking privacy breaches cused on data publishing where an \anonymized" data set is for utility. released to the public for analysis. However, the evidence There is considerable previous work in privacy-preserving increasingly points out the privacy risks inherent in this ap- query answering that goes beyond the \black and white" proach [9]. It is now believed that a query-based approach world of access control [1, 8]. The class of queries is generally where the database system answers a query in a privacy- restricted to aggregate queries and the approach adopted sensitive manner is generally superior from the privacy per- broadly is to add noise to the aggregates. However, non- spective to the data publishing paradigm [9]. aggregate queries are a large class of database queries and However, the only support provided by database systems the support for them is rather limited in the above bodies where much sensitive structured data reside is the mecha- of previous work. nism for access control. Briefly, the idea is to authorize a In this paper, we ask if we can get the best of both user to access only a subset of the data. The authorization worlds | combine the advantages offered by access control is enforced by explicitly rewriting queries to limit access to mechanisms while at the same time going beyond the \black the authorized subset. Such a model of authorization is in- and white"world by leveraging previous work on privacy pre- tuitive to application developers and users of the database serving query answering. We can break down this question system. The programming model remains the same as be- as follows: (1) What is the database API that combines tra- ditional access control mechanisms with privacy-preserving query answering? (2) How do we implement the suggested APIs in a principled manner? (3) How do we mix and match both mechanisms to ensure privacy guarantees? This article is published under a Creative Commons Attribution License We explore a natural hybrid system that combines (a) a (http://creativecommons.org/licenses/by/3.0/), which permits distribution set of authorization predicates restricting access per user to and reproduction in any medium as well allowing derivative works, pro- only a subset of the data, and (b) a set of \noisy" views that vided that you attribute the original work to the author(s) and CIDR 2011. 5th Biennial Conference on Innovative Data Systems Re- (as the term suggests) expose perturbed aggregate informa- search (CIDR '11) tion over data not accessible through the authorization pred- January 9-12, 2011, Asilomar, California, USA. icates. For example in an employee-department database, we could allow employees to see their own employee record Q Result(Q’) and also publish a \noisy" view exposing the average salary of the organization. This hybrid potentially has significant advantages. Accessing data through a set of views is natural Policy for users of database systems and thus provides a simple ex- Query Rewriter tension to today's database API. It offers the functionality of access control for queries that refer only to the database ta- Q’ bles and views, and the privacy guarantees of previous work for queries that only refer to the \noisy" views. In addition, Execution Engine we obtain value beyond the sum of the individual parts by DBMS allowing rich queries that refer to both database tables and \noisy" views. We implement the\noisy"views by using previous work on implementing differential privacy [5, 8]. In order to answer Figure 1: Leveraging Fine-Grained Access Control question (3) above, we introduce the notion of differential privacy relative to an authorization policy and explain its without loss of generality, in the rest of this paper, we re- desirable theoretical properties. We show that the seemingly strict authorization predicates to only be specified for tables. ad hoc hybrid system described above satisfies differential We now formalize the notion of an access control policy. privacy relative to the authorization policy. We note that it is possible to expose the APIs we propose Definition 1. A access control policy P specifies for each by extending libraries supporting differential privacy such as user and for each database table, a corresponding authoriza- PINQ with access control mechanisms. However, given that tion predicate. We also refer to an access control policy as the recent trend in the industry is to implement data secu- an authorization policy. rity primitives in the database server, our discussion in this We assume that the function auth(T, u) denotes the autho- paper is presented as a modification to the database server. rization predicate on table T corresponding to user u. For We think of our paper more as a first step in initiating dis- instance, in the above example auth(T, u) is the predicate cussions on how database systems can provide meaningful empid = u. support to address privacy concerns. We comment on open Let the tables in the database be T1;:::;Tk. Fix issues, including a critique of state of the art privacy models. a database instance A. We refer to the vector <σauth(T1;u)(T1); : : : ; σauth(Tk;u)(Tk)> as evaluated on the 2. REVIEWING ACCESS CONTROL instance A as the authorized subset for user u, denoted There has been a lot of work in the area of access con- P(u; A). (In all our notation, if the user is clear from the trol in databases. The idea with access control is that each context, we drop the reference to the user.) database user gets access to a subset of the database that Queries are executed by rewriting them to add the autho- the user can query. The current SQL standard allows coarse rization predicates. For example, the query: grained access both to database tables as well as views. select salary from employee Recent work [2, 6, 11, 13] has emphasized supporting predicate based fine-grained access control policies in the gets rewritten to: database server. For example, we wish to be able to grant select salary from employee each employee in an organization access their own record in where empid = userID() the employee table. In this paper, we consider fine-grained access control poli- In the same way, update statements are also rewritten to cies. We assume that access control policies expose per user go only against the authorized subset. For example, the a subset of each database table (this is the approach adopted update: by some commercial systems like Oracle VPD). The policy update employee set nickname = 'Jeff' is formally captured by specifying for each user and each database table, an authorization predicate. Since the number is rewritten as follows: of users can be potentially large, the predicate is specified update employee set nickname = 'Jeff' succinctly as a parameterized predicate that references the where empid = userID() function userID() that provides the identity of the current user. For example, we can grant each employee access to We note that in general, the access control policy can allow a their own record as follows.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us