Multi-Tenant Database Access Control

Multi-Tenant Database Access Control

2013 IEEE 16th International Conference on Computational Science and Engineering Multi-tenant Database Access Control Haitham Yaish, Madhu Goyal Centre for Quantum Computation & Intelligent Systems Faculty of Engineering and Information Technology University of Technology, Sydney P.O. Box 123, Broadway NSW 2007, Australia [email protected], [email protected] Abstract— Storing data in the cloud is a new multi-tenant they need [9],[12]. These multi-tenant data isolation database solution that has recently emerged to deliver approaches have challenges in supporting highly database for multiple users, who can store and access their manageable database schema, and in providing data over the internet. This multi-tenant database designed configurable database fields [5],[11],[22],[26]. These to be used by multiple tenants and each tenant may have challenges are (1) isolating tenants data by ensuring that multiple users. Therefore, this database type demands a each tenant can access only his own data, (2) ensuring that special multi-tenant access control model, which provides an access control not only for multiple tenants, but also for the tenants’ data is robust and secure, (3) optimizing multiple users per tenant. In this paper, we are proposing a database performance [10],[5],[8],[27], (4) designing a multi-tenant access control model based on a multi-tenant database structure which works with different business database schema called Elastic Extension Tables (EET). In domain applications [1], and (5) fulfilling different this model, we define access control data architecture, and tenants’ business requirements by using a tenant-aware the EET access grants which can be granted to tenants’ data management based on Shared Database - Shared users. Moreover, we propose an access control algorithm, Schema approach [19]. which allows users to access the data granted to them based There are various models of multi-tenant database on a number of groups or roles assigned to these users. designs and techniques, which have studied and implemented to overcome multi-tenant database challenges Keywords- Cloud Computing, Access Control, Multi- like Private Tables, Extension Tables, Universal Table, tenancy, Multi-tenant Database, Elastic Extension Tables. Pivot Tables, Chunk Table, Chunk Folding, and XML [11],[14],[16],[24],[25]. Nevertheless, these techniques are I. INTRODUCTION still not overcoming multi-tenant database challenges [24]. The growth of multi-tenant Cloud Computing services Based on this analysis, we have proposed a novel multi- draws attention to security challenges, which are emerging tenant database schema design to create and configure due to the cloud vendor’s resource sharing [13]. It is multi-tenant applications, by introducing an Elastic unlikely that the cloud users would risk their data and their Extension Tables (EET), which consists of Common computing applications over the cloud in favour of Tenant Tables (CTT), Extension Tables (ET), and Virtual reducing the Total Cost of Ownership (TCO), or using a Extension Tables (VET) [14]. This design enables tenants flexible cloud service, unless the cloud service providers creating and configuring their own virtual database schema provide reliable and secure services [18]. Outsourcing data including a required number of tables and columns, virtual to the cloud is one of the critical security challenges database relationships, and assigning suitable data types because this data is accessed among a large number of and constraints for columns during multi-tenant application users from different organisations [18]. There are three run-time execution [14]. Furthermore, EET allows tenants data isolation approaches applied to the cloud. The first to choose from three database models. The first model is approach is called Separate Database, which is the multi-tenant relational database. The second model simplest data isolation approach that stores each tenant combines multi-tenant relational database and virtual data in a separate database. The second approach is called relational database. The third model is a virtual relational Shared Database - Separate Schema, which hosts all the database. tenants in the same database instance, but each tenant has In this paper, we are proposing an access control his own database schema. The last approach is called method called Elastic Extension Tables Access Control Shared Database - Shared Schema, which allows tenants to (EETAC). This method permits each tenant in the multi- store their data in the same database and same schema. In tenant database to have several users with different types of other words, a given table can store different table rows grants to access the tenant’s data. Further, we propose an for different tenants, and a tenant ID column will access control algorithm which allows users to access their differentiate and isolate the tenant’s data [8],[9],[12],[19]. data that stored in columns and rows, and granted to them. In this paper, we are focusing on the Shared Database - Furthermore, we ran two experiments to verify the Shared Schema isolation approach, which requires a high practicability of granting a tenant’s user accessibility on a degree of data isolation and configuration to ensure the tenant’s table columns and rows, by using EETAC method security and privacy of tenants’ shared data. This multi- and the proposed Elastic Extension Tables Proxy Service tenant data approach consists of two data types: shared (EETPS) [15]. In these experiments, we found that the cost tenants’ data and tenants’ isolated data, by combining of executing a query for a user who is granted access to these data together, tenants can have the complete data fewer numbers of the table columns or rows is less than the 978-0-7695-5096-1/13 $31.00 © 2013 IEEE 870 DOI 10.1109/CSE.2013.131 cost of a user who is granted access to more numbers of the rows, (2) rows for users below the user in a role hierarchy, table columns or rows. (3) rows that are shared by a group which the user belongs The rest of the paper is organized as follows. Section II to, and (4) rows that are manually shared by another user reviews the related work. Section III describes the elastic or group of users [4] [23]. extension tables. Section IV describes the elastic extension In this section, we have discussed different multi- tables proxy service. Section V describes the elastic tenant role based access control methods, and different extension tables access control method. Section VI approaches to access data from a table columns and rows. describes the columns and rows access grant algorithm. However, these access control methods and approaches Section VII gives our experimental results. Section VIII have similar assumptions, but for multi-tenant database concludes this paper. designs other than EET multi-tenant database schema. II. RELATED WORK Therefore, we introduce in this paper an access control method which is suitable for the proposed EET multi- Access control is a security topic which was started tenant database schema [14]. back in the 1960s [18], and various access control models have proposed since then such as Discretionary Access III. ELASTIC EXTENSION TABLES Control (DAC), Mandatory Access Control (MAC), and The proposed multi-tenant database schema is a new Role Based Access Control (RBAC) [2],[16]. David way of designing and creating a multi-tenant database, Ferraiolo and Richard Kuhn are the first who proposed the which consists of three types of tables. The first type is RBAC model in 1992, which introduces the role as a new Common Tenant Tables (CTT) which are shared between concept to associate users to one or more roles, which are tenants who are using a single instance of the multi-tenant associated with one or more permissions [7][16]. database. These are physical relational tables, which can Siebel Systems [17] states that the present single- be applied to any business domain database such as organisation access control model is not suitable for multi- customer relationship management (CRM), accounting, tenant database. Accordingly, it has proposed a multi- human resource (HR), or any other business domain. The tenant role based access control method, which allows second type is Virtual Extension Tables (VET), which having a plurality of tenants, where each tenant is the allow tenants to extend on the existing business domain owner of a separate virtual database. This method supports database, or having their own configurable database an access control subsystem for multiple users who are through creating their virtual database structures from seeking a data access, where each of the users has at least scratch by creating (1) virtual database tables, (2) virtual one organizational access attribute, and the data are stored database relationships between the virtual tables, and (3) in an underlying database. The database is divided into other database constraints. The third type is Extension files; the files are divided into records within the file, and Tables (ET), which consists of eight tables that are used to the individual records are divided into fields. This method construct VETs [14]. The data architecture details of these is based on partitionability of the individual database files eight tables are listed below and shown in Fig. 1. in the database, which are based upon an attribute of The db_table Extension Table: This table allows a ownership and/or a granted access control. tenant to create virtual tables and give them unique IBM DB2 has provided several approaches of data names. access in Database Management System (DBMS) level The table_column Extension Table: This table including views, label-based access (LBAC), and row and allows a tenant to create virtual columns for a column access control (RCAC). The views approach adds virtual table stored in the “db_table” extension more management overhead because this approach uses table. views instead of tables. The LBAC approach is to create The table_row Extension Tables: The row extension labels on tables and columns, and these labels are granted tables store records of virtual extension columns in to users or groups.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us