A Unified Audit Expression Model for Auditing SQL Queries

نویسندگان

  • Vikram Goyal
  • Shyam K. Gupta
  • Anand Gupta
چکیده

A privacy auditing framework for Hippocratic databases accepts an administrator formulated audit expression and returns all suspicious user queries that satisfy the given constraints in that audit expression. Such an expression should be expressive, precise, unambiguous and flexible to describe various characteristics of a privacy violation such as target data (sensitive data subject to disclosure review), suspicion notion, authorized privacy policy parameters through which the violation is possible, and time duration of the privacy violation. Earlier proposed audit expression models for the auditing are not flexible and do not specify suspicion notion with in the audit expression for the auditing of past user accesses. We propose a unified model for an audit expression which can specify earlier proposed audit expressions along with different suspicion notions. The model includes (i) a suspicion notion model which unifies earlier proposed suspicion notions, and (ii) mechanisms to specify data versions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Whodunit: An Auditing Tool for Detecting Data Breaches

Commercial database systems provide support to maintain an audit trail that can be analyzed offline to identify potential threats to data security. We present a tool that performs data auditing that asks for an audit trail of all users and queries that referenced sensitive data, for example “find all queries and corresponding users that referenced John Doe’s salary in the last six months”. Our ...

متن کامل

Auditing Compliance with a Hippocratic Database

We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensitive) data subject to disclosure review. An audit component accepts audit expressions and returns all queries (deemed “suspicious”) that accessed the specified data during their execution. The overhead of our approach on...

متن کامل

Log Sanitization: Auditing a Database Under Retention Restrictions

Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a historical record of the past that can also pose a serious threat to privacy. Policies which limit data retention conflict with the goal of accurate auditing, and data owners have to carefully balance the need for policy co...

متن کامل

Ethical Guidelines for Internal Audit Reporting Lines

The present study identifies ethical ways of auditing reporting, which define the relationship between internal audit and the various authorities of the organization. Defining these lines as determinants of impartiality and independence of internal audit is of great importance. In this research, the structural equation model has been used to test the proposed model. The information required for...

متن کامل

Factors Affecting the Internal Audit Effectiveness in the Viewpoint of Audit Committee Members

Objective: Thisresearch has studied the effect of five main factors including competence of internal audit department, size of internal audit department, relationship between internal and external audit, management support for internal audit, and independence of internal audit on the internal audit effectiveness in companies that listed in the Tehran Stock Exchange in 2017. Methods: Data was c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008