AuditGuard: a system for database auditing under retention restrictions
نویسندگان
چکیده
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a historical record of the past that can also pose a serious threat to privacy. In many domains, retention policies govern how long data can be preserved by an institution. Regulations like FERPA and HIPAA (in the U.S.) or the Directive of Data Protection (in the EU), require strict retention periods to be observed, mandating the disposal of past data. In addition, institutions often adopt their own retention policies, choosing to remove sensitive data after a period of time to avoid its unintended release, or to avoid disclosure that could be forced by subpeona. Policies that limit data retention conflict with the goal of accurate auditing, and data owners have to carefully balance the need for accurate auditing with the privacy goals of retention policies. Unfortunately, existing technologies make balancing these goals difficult. Most database systems include audit logs, but there are few mechanisms for limiting access to logs beyond wholesale destruction of the log for a given time period. Some proposed database systems support persistence, in which past states are retained. These can be used for some (but not all) audit functions, and also lack effective protection mechanisms for past versions of data. The AuditGuard system is a flexible database audit mechanism which retains history and enforces retention policy. It allows an auditor to selectively remove data from a log of the past, while still retaining non-sensitive aspects of history that can be vital to an audit. The main components of the AuditGuard system are the following:
منابع مشابه
Log Sanitization: Auditing a Database Under Retention Restrictions
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a historical record of the past that can also pose a serious threat to privacy. Policies which limit data retention conflict with the goal of accurate auditing, and data owners have to carefully balance the need for policy co...
متن کاملAuditing Sum Queries
In an on-line statistical database, the query system should leave unanswered queries asking for sums that could lead to the disclosure of confidential data. To check that, every sum query and previously answered sum queries should be audited. We show that, under a suitable query-overlap restriction, an auditing procedure can be efficiently worked out using flow-network computation.
متن کاملRisk management of business tax compliance and related strategies in tax auditing
The present study is related to the management and strategy of dealing with the risk of business tax compliance in tax audits using the Grand Theory method. The statistical population of the study is managers, elites and experts in the field of taxation who have been selected from the snowball or chain sampling method for the interview according to the purpose of the research. After receiving t...
متن کامل1 Database Auditing
Government regulations and increased awareness of security issues have increased the auditing requirements of information technology systems. In this paper, we will discuss three government regulations and how they have impacted information technology systems. We classify database auditing systems by considering features of the basic components of an auditing system as proposed by Bishop: the l...
متن کاملA Collaborative Continuous Auditing Model under Service-Oriented Architecture Environments
Relying on XML and Web Service technologies under Service-Oriented Architecture (SOA) environments, this paper presents a model for continuous auditing on internal control, referred to as Collaborative Continuous Auditing Model (CCAM). By the wrapping of data transformation components with Enterprise Resource Planning databases, software venders can provide schema-matching services for the clie...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- PVLDB
دوره 1 شماره
صفحات -
تاریخ انتشار 2008