Consistent Query Plan Generation in Secure Cooperative Data Access
نویسندگان
چکیده
In this paper, we consider an environment where a group of parties have their own relational databases, and provide restricted access to other parties. In order to implement desired bushiness services, each party defines a set of authorization rules over the join of basic relations, and the accessible information is constrained by these rules. However, authorization rules are given based on the business requirements and the enforcement issues of the rules may not have been taken into consideration. In this paper, we propose an algorithm to check the rule enforceability for each given authorization rule, and also present mechanisms to generate a query execution plan for an authorized query which is consistent with the authorization rules. As finding the optimal query plan can be very difficult, we propose an algorithm to generate efficient query plans. In addition, we compare the generated query plans with the optimal query plans through case studies. The results show the effectiveness of our approach.
منابع مشابه
Adaptive XML Access Control Based on Query Nesting, Modification and Simplification
Access control is an important aspect in guaranteeing data privacy within XML data sources which are accessed by users with different access rights. The goal of predicative access control for XML data sources is to use XPath expressions to describe that fragment of a given document or database that can be accessed by queries of a certain user. Our approach to access control hides the XML data s...
متن کاملSeparating indexes from data: a distributed scheme for secure database outsourcing
Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...
متن کاملانتخاب مناسبترین زبان پرسوجو برای استفاده از فراپیوندها جهت استخراج دادهها در حالت دیتالوگ در سامانه پایگاه داده استنتاجی DES
Deductive Database systems are designed based on a logical data model. Data (as opposed to Relational Databases Management System (RDBMS) in which data stored in tables) are saved as facts in a Deductive Database system. Datalog Educational System (DES) is a Deductive Database system that Datalog mode is the default mode in this system. It can extract data to use outer joins with three query la...
متن کاملCooperative Caching for Timely and Secure Data Access in Disruption Tolerant Networks
Disruption Tolerant Networks (DTNs) consist of mobile devices that contact each other opportunistically. Propose the original approach to support cooperative caching in DTNs, which enable the sharing and coordination of cached data among multiple nodes and reduces data access delay. The fundamental idea is to intentionally cache data at a set of network central locations (NCLs), which can be ea...
متن کاملXML Query Processing in XTC
In the past, the development of a declarative, set-based interface to access data in a DBMS was a key factor for the success of database systems. For XML, the lingua franca for declarative data access is XQuery. This paper summarizes the XQuery processing concepts that have been developed in the XTC system (the XML Transaction Coordinator)—a native XML database management system. We step throug...
متن کامل