A Unified Audit Expression Model for Auditing SQL Queries
نویسندگان
چکیده
A privacy auditing framework for Hippocratic databases accepts an administrator formulated audit expression and returns all suspicious user queries that satisfy the given constraints in that audit expression. Such an expression should be expressive, precise, unambiguous and flexible to describe various characteristics of a privacy violation such as target data (sensitive data subject to disclosure review), suspicion notion, authorized privacy policy parameters through which the violation is possible, and time duration of the privacy violation. Earlier proposed audit expression models for the auditing are not flexible and do not specify suspicion notion with in the audit expression for the auditing of past user accesses. We propose a unified model for an audit expression which can specify earlier proposed audit expressions along with different suspicion notions. The model includes (i) a suspicion notion model which unifies earlier proposed suspicion notions, and (ii) mechanisms to specify data versions.
منابع مشابه
Whodunit: An Auditing Tool for Detecting Data Breaches
Commercial database systems provide support to maintain an audit trail that can be analyzed offline to identify potential threats to data security. We present a tool that performs data auditing that asks for an audit trail of all users and queries that referenced sensitive data, for example “find all queries and corresponding users that referenced John Doe’s salary in the last six months”. Our ...
متن کاملAuditing Compliance with a Hippocratic Database
We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensitive) data subject to disclosure review. An audit component accepts audit expressions and returns all queries (deemed “suspicious”) that accessed the specified data during their execution. The overhead of our approach on...
متن کاملLog Sanitization: Auditing a Database Under Retention Restrictions
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a historical record of the past that can also pose a serious threat to privacy. Policies which limit data retention conflict with the goal of accurate auditing, and data owners have to carefully balance the need for policy co...
متن کاملEthical Guidelines for Internal Audit Reporting Lines
The present study identifies ethical ways of auditing reporting, which define the relationship between internal audit and the various authorities of the organization. Defining these lines as determinants of impartiality and independence of internal audit is of great importance. In this research, the structural equation model has been used to test the proposed model. The information required for...
متن کاملFactors Affecting the Internal Audit Effectiveness in the Viewpoint of Audit Committee Members
Objective: Thisresearch has studied the effect of five main factors including competence of internal audit department, size of internal audit department, relationship between internal and external audit, management support for internal audit, and independence of internal audit on the internal audit effectiveness in companies that listed in the Tehran Stock Exchange in 2017. Methods: Data was c...
متن کامل