Presentation is loading. Please wait.

Presentation is loading. Please wait.

CSCE 824 Secure and Distributed Database Management Systems FarkasCSCE 8241.

Similar presentations


Presentation on theme: "CSCE 824 Secure and Distributed Database Management Systems FarkasCSCE 8241."— Presentation transcript:

1 CSCE 824 Secure and Distributed Database Management Systems FarkasCSCE 8241

2 Course Aim Advanced understanding of DBMS concepts Advanced understanding of DBMS concepts –From relation to un- and semi- structured data models –New type of applications –Security needs FarkasCSCE 8242

3 Reference Materials Required text book: Required text book: –T. Ozsu and P. Valduriez, Principles of Distributed Database Systems, Springer; 3rd Edition. edition (March 2, 2011), ISBN-10: 1441988335 Recommended: Recommended: –M. Gertz, S. Jajodia, Handbook of database security: applications and trend, Springer 2008 –Castano, Fugini, Martella, Samarati: Database Security, Addison-Wesley, 1995 FarkasCSCE 8243

4 Conference Proceedings and Journals Proceedings of Secure Data Management Workshop, links: 2012 http://www.hitech-projects.com/sdm- workshop/sdm12.html, 2011 http://www.hitech- projects.com/sdm-workshop/sdm11.html Proceedings of Secure Data Management Workshop, links: 2012 http://www.hitech-projects.com/sdm- workshop/sdm12.html, 2011 http://www.hitech- projects.com/sdm-workshop/sdm11.htmlhttp://www.hitech-projects.com/sdm- workshop/sdm12.htmlhttp://www.hitech- projects.com/sdm-workshop/sdm11.htmlhttp://www.hitech-projects.com/sdm- workshop/sdm12.htmlhttp://www.hitech- projects.com/sdm-workshop/sdm11.html Proceedings of IFIP WG 11.3 Data and Application Security and Privacy, links: 2012 http://conferences.telecom-bretagne.eu/dbsec2012/, 2011 http://www.egr.vcu.edu/dbsec2011/ Proceedings of IFIP WG 11.3 Data and Application Security and Privacy, links: 2012 http://conferences.telecom-bretagne.eu/dbsec2012/, 2011 http://www.egr.vcu.edu/dbsec2011/ http://conferences.telecom-bretagne.eu/dbsec2012/http://www.egr.vcu.edu/dbsec2011/ http://conferences.telecom-bretagne.eu/dbsec2012/http://www.egr.vcu.edu/dbsec2011/ Proceedings of International Conference of Very Large Databases (VLDB), links: 2012 http://www.vldb2012.org/, 2011 http://www.vldb.org/2011/ Proceedings of International Conference of Very Large Databases (VLDB), links: 2012 http://www.vldb2012.org/, 2011 http://www.vldb.org/2011/ http://www.vldb2012.org/ http://www.vldb.org/2011/ http://www.vldb2012.org/ http://www.vldb.org/2011/ FarkasCSCE 8244

5 Journals and Books IEEE Transactions on Knowledge and Data Engineering (TKDE) IEEE Transactions on Knowledge and Data Engineering (TKDE) ACM Transactions on Information and System Security (TISSEC) ACM Transactions on Information and System Security (TISSEC) M. Gertz, S. Jajodia, Handbook of database security: applications and trend, Springer 2008 M. Gertz, S. Jajodia, Handbook of database security: applications and trend, Springer 2008 FarkasCSCE 8245

6 Challenge Research project : there will be one individual student research project. Students must present the related work and their results to the class in the last lectures of the semester. Research project : there will be one individual student research project. Students must present the related work and their results to the class in the last lectures of the semester. Homework assignments. There will be several homework exercises and reading for the lectures. Homework assignments. There will be several homework exercises and reading for the lectures. Tests : there will be two tests covering the course materials. Both tests are open book, in-class tests. The second test (final exam) is comprehensive. Tests : there will be two tests covering the course materials. Both tests are open book, in-class tests. The second test (final exam) is comprehensive. FarkasCSCE 8246

7 Grading Research project: 40%, Test 1 : 20%, Test 2: 25%, Homework assignment: 20% Research project: 40%, Test 1 : 20%, Test 2: 25%, Homework assignment: 20% 90 < A; 87 < B+ <= 90; 80 < B <= 87; 76 < C+<=80; 90 < A; 87 < B+ <= 90; 80 < B <= 87; 76 < C+<=80; 65 < C <= 76; 60 < D+ <= 65; 50 <D <= 60 65 < C <= 76; 60 < D+ <= 65; 50 <D <= 60 FarkasCSCE 8247

8 Topics Covered Weeks 1-4: Distributed Databases Weeks 1-4: Distributed Databases Weeks 5-7: Non-traditional databases Weeks 5-7: Non-traditional databases Weeks 7-11: Database Security Weeks 7-11: Database Security Weeks 12-15: Student Presentations Weeks 12-15: Student Presentations FarkasCSCE 8248

9 Students’ Introduction FarkasCSCE 8249

10 FarkasCSCE 82410 Database Management System (DBMS) Collection of Collection of –interrelated data and –set of programs to access the data Convenient and efficient processing of data Convenient and efficient processing of data Database Application Software Database Application Software

11 FarkasCSCE 82411 Evolution of Database Systems Early days: customized applications built on top of file systems Early days: customized applications built on top of file systems Drawbacks of using file systems to store data: Drawbacks of using file systems to store data: –Data redundancy and inconsistency –Difficulty in accessing data –Atomicity of updates –Concurrency control –Security –Data isolation — multiple files and formats –Integrity problems

12 FarkasCSCE 82412 Abstraction View level: different perspectives View level: different perspectives –Application programs hide irrelevant data Logical level: data models Logical level: data models –Logical representation of data –Different approaches: hierarchical, network, object oriented, semi-structured, etc. – Data independence principle Physical level: how data is stored Physical level: how data is stored

13 FarkasCSCE 82413 Data Models A collection of tools for describing A collection of tools for describing –Data –Relationships among data items –Semantics of stored data –Database constraints

14 FarkasCSCE 82414 Database Management Systems Smaller and smaller systems Smaller and smaller systems –Past: large and expensive DBMS –Present: DBMS in most personal computers More and more data stored – BIG DATA More and more data stored – BIG DATA –Past: few MB –Present: terabyte (10 12 bytes), petabyte (10 15 bytes) Functionality: from physical to view level Functionality: from physical to view level Optimization Optimization

15 FarkasCSCE 82415 Data Definition Language (DDL) Defines the database schema and constraints Defines the database schema and constraints DDL compiler  DDL compiler  data dictionary Metadata – data about data Metadata – data about data

16 FarkasCSCE 82416 Data Manipulation Language (DML) Accessing and manipulating the data Accessing and manipulating the data Query Languages Query Languages –Procedural – user specifies what data is required and how to get those data –Nonprocedural – user specifies what data is required without specifying how to get those data

17 Current Demands Efficient data processing of large data sets Efficient data processing of large data sets Long running transactions Long running transactions Real-time demand Real-time demand Usability for specific applications Usability for specific applications … FarkasCSCE 82417

18 Data Security

19 FarkasCSCE 82419 Security Objectives Confidentiality: prevent/detect/deter improper disclosure of information Confidentiality: prevent/detect/deter improper disclosure of information Integrity: prevent/detect/deter improper modification of information Integrity: prevent/detect/deter improper modification of information Availability: prevent/detect/deter improper denial of access to services Availability: prevent/detect/deter improper denial of access to services

20 FarkasCSCE 82420 Security Threats Poor design Poor design Insufficient quality control Insufficient quality control Accidents Accidents Attacks Attacks

21 FarkasCSCE 82421 Achieving Security Policy Policy –What to protect? Mechanism Mechanism –How to protect? Assurance Assurance –How good is the protection?

22 FarkasCSCE 82422 Database Security Security Policy Security Policy Access control models Access control models Inference control Inference control Integrity protection Integrity protection Privacy problems Privacy problems Fault tolerance and recovery Fault tolerance and recovery Auditing and intrusion detection Auditing and intrusion detection

23 FarkasCSCE 82423 Next Class Relational data model


Download ppt "CSCE 824 Secure and Distributed Database Management Systems FarkasCSCE 8241."

Similar presentations


Ads by Google