Consistent Query Plan Generation in Secure Cooperative Data Access

نویسندگان

  • Meixing Le
  • Krishna Kant
  • Sushil Jajodia
چکیده

In this paper, we consider an environment where a group of parties have their own relational databases, and provide restricted access to other parties. In order to implement desired bushiness services, each party defines a set of authorization rules over the join of basic relations, and the accessible information is constrained by these rules. However, authorization rules are given based on the business requirements and the enforcement issues of the rules may not have been taken into consideration. In this paper, we propose an algorithm to check the rule enforceability for each given authorization rule, and also present mechanisms to generate a query execution plan for an authorized query which is consistent with the authorization rules. As finding the optimal query plan can be very difficult, we propose an algorithm to generate efficient query plans. In addition, we compare the generated query plans with the optimal query plans through case studies. The results show the effectiveness of our approach.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptive XML Access Control Based on Query Nesting, Modification and Simplification

Access control is an important aspect in guaranteeing data privacy within XML data sources which are accessed by users with different access rights. The goal of predicative access control for XML data sources is to use XPath expressions to describe that fragment of a given document or database that can be accessed by queries of a certain user. Our approach to access control hides the XML data s...

متن کامل

Separating indexes from data: a distributed scheme for secure database outsourcing

Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...

متن کامل

انتخاب مناسب‌ترین زبان پرس‌وجو برای استفاده از فرا‌‌پیوندها جهت استخراج داده‌ها در حالت دیتالوگ در سامانه پایگاه داده استنتاجی DES

Deductive Database systems are designed based on a logical data model. Data (as opposed to Relational Databases Management System (RDBMS) in which data stored in tables) are saved as facts in a Deductive Database system. Datalog Educational System (DES) is a Deductive Database system that Datalog mode is the default mode in this system. It can extract data to use outer joins with three query la...

متن کامل

Cooperative Caching for Timely and Secure Data Access in Disruption Tolerant Networks

Disruption Tolerant Networks (DTNs) consist of mobile devices that contact each other opportunistically. Propose the original approach to support cooperative caching in DTNs, which enable the sharing and coordination of cached data among multiple nodes and reduces data access delay. The fundamental idea is to intentionally cache data at a set of network central locations (NCLs), which can be ea...

متن کامل

XML Query Processing in XTC

In the past, the development of a declarative, set-based interface to access data in a DBMS was a key factor for the success of database systems. For XML, the lingua franca for declarative data access is XQuery. This paper summarizes the XQuery processing concepts that have been developed in the XTC system (the XML Transaction Coordinator)—a native XML database management system. We step throug...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014