Auditing Compliance with a Hippocratic Database
نویسندگان
چکیده
We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensitive) data subject to disclosure review. An audit component accepts audit expressions and returns all queries (deemed “suspicious”) that accessed the specified data during their execution. The overhead of our approach on query processing is small, involving primarily the logging of each query string along with other minor annotations. Database triggers are used to capture updates in a backlog database. At the time of audit, a static analysis phase selects a subset of logged queries for further analysis. These queries are combined and transformed into an SQL audit query, which when run against the backlog database, identifies the suspicious queries efficiently and precisely. We describe the algorithms and data structures used in a DB2-based implementation of this framework. Experimental results reinforce our design choices and show the practicality of the approach.
منابع مشابه
Compliance with data protection laws using Hippocratic Database active enforcement and auditing
C. M. Johnson T. W. A. Grandison Governments worldwide are enacting data protection laws that restrict the disclosure and processing of personal information. These laws impose administrative and financial burdens on companies that manage personal information and may hinder the legitimate and valuable sharing and analysis of this information. In this paper we describe an integrated set of techno...
متن کاملSecuring electronic health records without impeding the flow of information
OBJECTIVE We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without impeding the legitimate management, sharing, and analysis of personal health information. APPROACH The Hippocratic Database approach to securing electronic health records involves (1) active enforcement of fine-grained d...
متن کاملRisk management of business tax compliance and related strategies in tax auditing
The present study is related to the management and strategy of dealing with the risk of business tax compliance in tax audits using the Grand Theory method. The statistical population of the study is managers, elites and experts in the field of taxation who have been selected from the snowball or chain sampling method for the interview according to the purpose of the research. After receiving t...
متن کاملFeasibility of Automated Information Security Compliance Auditing
According to AS/NZS ISO/IEC 27001:2006 [11], management of an organization should provide evidence of its commitment to the establishment, implementation, operation, monitoring, review, maintenance and improvement of the organization’s information security management system. The objective of this research project was to explore the feasibility of designing an intelligent documentation system to...
متن کاملCritical Assessment of Auditing Contributions to Effective and Efficient Security in Database Systems
Database auditing has become a very crucial aspect of security as organisations increase their adoption of database management systems (DBMS) as major asset that keeps, maintain and monitor sensitive information. Database auditing is the group of activities involved in observing a set of stored data in order to be aware of the actions of users. The work presented here outlines the main auditing...
متن کامل