Database Security—Concepts, Approaches, and Challenges

Database Security—Concepts, Approaches, and Challenges

2 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 2, NO. 1, JANUARY-MARCH 2005 Database Security—Concepts, Approaches, and Challenges Elisa Bertino, Fellow, IEEE, and Ravi Sandhu, Fellow, IEEE Abstract—As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Though a number of techniques, such as encryption and electronic signatures, are currently available to protect data when transmitted across sites, a truly comprehensive approach for data protection must also include mechanisms for enforcing access control policies based on data contents, subject qualifications and characteristics, and other relevant contextual information, such as time. It is well understood today that the semantics of data must be taken into account in order to specify effective access control policies. Also, techniques for data integrity and availability specifically tailored to database systems must be adopted. In this respect, over the years the database security community has developed a number of different techniques and approaches to assure data confidentiality, integrity, and availability. However, despite such advances, the database security area faces several new challenges. Factors such as the evolution of security concerns, the “disintermediation” of access to data, new computing paradigms and applications, such as grid-based computing and on- demand business, have introduced both new security requirements and new contexts in which to apply and possibly extend current approaches. In this paper, we first survey the most relevant concepts underlying the notion of database security and summarize the most well-known techniques. We focus on access control systems, on which a large body of research has been devoted, and describe the key access control models, namely, the discretionary and mandatory access control models, and the role-based access control (RBAC) model. We also discuss security for advanced data management systems, and cover topics such as access control for XML. We then discuss current challenges for database security and some preliminary approaches that address some of these challenges. Index Terms—Data confindentiality, data privacy, relational and object databases, XML. æ 1INTRODUCTION S organizations increase their adoption of database and human points of view as a consequence of unauthorized Asystems as the key data management technology for data observation. Incorrect modifications of data, either day-to-day operations and decision making, the security of intentional or unintentional, result in an incorrect database data managed by these systems becomes crucial. Damage state. Any use of incorrect data may result in heavy losses and misuse of data affect not only a single user or for the organization. When data is unavailable, information application, but may have disastrous consequences on the crucial for the proper functioning of the organization is not entire organization. The recent rapid proliferation of Web- readily available when needed. based applications and information systems have further Thus, a complete solution to data security must meet the increased the risk exposure of databases and, thus, data following three requirements: 1) secrecy or confidentiality protection is today more crucial than ever. It is also refers to the protection of data against unauthorized important to appreciate that data needs to be protected disclosure, 2) integrity refers to the prevention of unauthor- not only from external threats, but also from insider threats. ized and improper data modification, and 3) availability Security breaches are typically categorized as unauthor- refers to the prevention and recovery from hardware and ized data observation, incorrect data modification, and data software errors and from malicious data access denials unavailability. Unauthorized data observation results in the makingthedatabasesystemunavailable.Thesethree disclosure of information to users not entitled to gain access requirements arise in practically all application environ- to such information. All organizations, ranging from ments. Consider a database that stores payroll information. commercial organizations to social organizations, in a It is important that salaries of individual employees not be variety of domains such as healthcare and homeland released to unauthorized users, that salaries be modified protection, may suffer heavy losses from both financial only by the users that are properly authorized, and that paychecks be printed on time at the end of the pay period. Similarly, consider the Web site of an airline company. E. Bertino is with the Computer Science and Electric and Computer Engineering Department and CERIAS, Purdue University, West Lafay- Here, it is important that customer reservations only be ette, IN 47907. E-mail: [email protected]. available to the customers they refer to, that reservations of . R. Sandhu is with the Information Science Engineering Department, a customer not be arbitrarily modified, and that information George Mason University, Fairfax, VA 22030. E-mail: [email protected]. on flights and reservations always be available. In addition Manuscript received 2 Sept. 2004; revised 11 Jan. 2005; accepted 1 Mar. 2005; to these requirements, privacy requirements are of high published online 4 Apr. 2005. relevance today. Though the term privacy is often used as For information on obtaining reprints of this article, please send e-mail to: a synonym for confidentiality, the two requirements are [email protected], and reference IEEECS Log Number TDSC-0130-0904. quite different. Techniques for information confidentiality 1545-5971/05/$20.00 ß 2005 IEEE Published by the IEEE Computer Society BERTINO AND SANDHU: DATABASE SECURITY—CONCEPTS, APPROACHES, AND CHALLENGES 3 may be used to implement privacy; however, assuring when transmitted over a network in the case of distributed privacy requires additional techniques, such as mechanisms systems. Both authentication and encryption techniques are for obtaining and recording the consents of users. Also, widely discussed in the current literature on computer confidentiality can be achieved be means of withholding network security and we refer the reader to [62] for details data from access, whereas privacy is required even after the on such topics. We will, however, discuss the use of data has been disclosed. In other words, the data should be encryption techniques in the context of secure outsourcing used only for the purposes sanctioned by the user and not of data, as this is an application of cryptography which is misused for other purposes. specific to database management. We do not attempt to be Data protection is ensured by different components of a exhaustive, but try to articulate the rationale for the database management system (DBMS). In particular, an approaches we believe to be promising. access control mechanism ensures data confidentiality. When- 1.1 A Short History ever a subject tries to access a data object, the access control mechanism checks the rights of the user against a set of Early research efforts in the area of access control models authorizations, stated usually by some security adminis- and confidentiality for DBMSs focused on the development trator. An authorization states whether a subject can of two different classes of models, based on the discretionary perform a particular action on an object. Authorizations access control policy and on the mandatory access control policy. are stated according to the access control policies of the This early research was cast in the framework of relational organization. Data confidentiality is further enhanced by database systems. The relational data model, being a the use of encryption techniques, applied to data when declarative high-level model specifying the logical structure being stored on secondary storage or transmitted on a of data, made the development of simple declarative network. Recently, the use of encryption techniques has languages for the specification of access control policies gained a lot of interest in the context of outsourced data possible. These earlier models and the discretionary models management; in such contexts, the main issue is how to in particular, introduced some important principles [45] perform operations, such as queries, on encrypted data that set apart access control models for database systems [54]. Data integrity is jointly ensured by the access control from access control models adopted by operating systems mechanism and by semantic integrity constraints. When- and file systems. The first principle was that access control ever a subject tries to modify some data, the access control models for databases should be expressed in terms of the mechanism verifies that the user has the right to modify logical data model; thus authorizations for a relational the data, and the semantic integrity subsystem verifies that database should be expressed in terms of relations, relation the updated data are semantically correct. Semantic correct- attributes, and tuples. The second principle is that for ness is verified by a set of conditions, or predicates, that databases, in addition to name-based access control, where the must be verified against the database state. To detect protected objects are specified by giving their names, tampering, data can be digitally signed. Finally, the content-based access

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    18 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us