Secure Database Design
نویسندگان
چکیده
The most commercially available database provides security facility for a single table. However the situation has been changed, as enterprises move from local database to information backbone composed of cooperating heterogeneous database and then direct sharing of information between enterprise on the Internet. A strict security measure at database level is essential for a secure database design. This paper describes the secure SQL features as propounded by Winslett et al[1] which is an extension of SQL[4,5,6] .The object oriented model are more complex than relational model, and object orientation is not based on a formal mathematical model like relational model. For this reason the model for secure object oriented database are complex than the relational secure database model. For a object-oriented database, separate security assumption is to be made about the object orientation model. A discussion has been presented about the different security aspect of object-oriented database and relational database and finally it compares the security measures of both the approaches. A brief discussion is presented on security and user authorization in SQL2. It also indicates various choices that one may implement while designing a secure database.
منابع مشابه
Separating indexes from data: a distributed scheme for secure database outsourcing
Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...
متن کاملSecure Database Development
DEFINITION This entry considers how to build secure database system software. In particular, it describes how to build a general-purpose database management system where security is an important design parameter. For the database community the words secure database design may refer to the schema design to produce a database for a specific application with some level of security properties. Ther...
متن کاملSecurity Constraint Processing in a Multilevel Secure Distributed Database Management System
In a multilevel secure distributed database management system, users cleared at different security levels access and share a distributed database consisting of data at different sensitivity levels. An approach to assigning sensitivity levels, also called security levels, to data is one which utilizes constraints or classification rules. Security constraints provide an effective classification p...
متن کاملFuture Trends in Secure Chip Data Management
Secure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous in applications with strong security requirements. Secure chips host personal data that must be carefully managed and protected, thus requiring embedded data management techniques. However, secure chips have severe hardware constraints which make traditional database techniques irrelevant. We previously addressed the...
متن کاملTowards the Design and Implementation of a Multilevel Secure Deductive Database Management System
In this paper we describe a preliminary design and implementation of a multilevel secure deductive database management system (MLSIDEDBMS). In particular, logic as a dara model for multilevel databases, reasoning across security levels, architectural issues for an MLSIDEDBMS, and a prototype implementation are discussed.
متن کامل