Jan. 2014Dr. Yangjun Chen ACS-49021 Database security and authorization (Ch. 22, 3 rd ed. – Ch. 23, 4 th ed. – Ch. 24, 6 th )

Slides:



Advertisements
Similar presentations
7- Sicurezza delle basi di dati
Advertisements

4/6/2017.
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Database Security by Muhammad Waheed Aslam SIS Project Leader ITC/KFUPM.
DDBMS Security - Bakul Gada.
Copyright © 2004 Pearson Education, Inc.. Chapter 23 Database Security and Authorization.
Chapter 11 Database Security: An Introduction Copyright © 2004 Pearson Education, Inc.
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Security and Integrity
Database Management System
Database Security - Farkas 1 Database Security and Privacy.
Access Control Intro, DAC and MAC System Security.
Security Fall 2009McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
Security Fall 2006McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
System Administration Accounts privileges, users and roles
Oracle8 - The Complete Reference. Koch a& Loney1 By What Authority? Presented by Victor Matos.
CSCI 5707: Database Security Pusheng Zhang University of Minnesota March 2, 2004.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 24 Database Security.
View n A single table derived from other tables which can be a base table or previously defined views n Virtual table: doesn’t exist physically n Limitation.
Database Security John Ortiz. Lecture 23Database Security2 Secure Passwords  Two main requirements for choosing a secure password:  1) MUST be easy.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
7 Copyright © 2004, Oracle. All rights reserved. Administering Users.
Controlling User Access. Objectives After completing this lesson, you should be able to do the following: Create users Create roles to ease setup and.
Chapter 11 Database Security: An Introduction Copyright © 2004 Pearson Education, Inc.
DATABASE SECURITY MODULE 5.
D ISCRETIONARY A CCESS C ONTROLS Truong Quynh Chi Faculty of Computer Science & Engineering HCMC University of Technology
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
Copyright © 2007 Ramez Elmasri and Shamkant B. Navathe Chapter 6 Data Integrity and Security.
Controlling User Access Fresher Learning Program January, 2012.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Copyright © 2004, Oracle. All rights reserved. CONTROLLING USER ACCESS Oracle Lecture 8.
Academic Year 2014 Spring Academic Year 2014 Spring.
Chapter 11 Database Security: An Introduction Copyright © 2004 Pearson Education, Inc.
Database Security: Concepts, Approaches and Challenges
Database Security and Authorization. DB security Secrecy: Users should not be able to see things they are not supposed to. – E.g., A student can’t see.
COEN 350: Network Security Authorization. Fundamental Mechanisms: Access Matrix Subjects Objects (Subjects can be objects, too.) Access Rights Example:
Database Security Chapter Terms Security – all the processes and mechanisms by which computer-based equipment, information and services are.
Chapter 9 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Database Management Systems, 2 nd Edition, R. Ramakrishnan and J. Gehrke1 Security Lecture 17.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 24 Database Security.
13 Copyright © Oracle Corporation, All rights reserved. Controlling User Access.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
1 Copyright © 2006, Oracle. All rights reserved. Controlling User Access ( 사용자 접근 제어 )
1 Copyright © 2009, Oracle. All rights reserved. Controlling User Access.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Database Security and Authorization Introduction to DB Security Access Controls Database Security and the DBA Discretionary Access Control The privileges.
Database Security Database System Implementation CSE 507 Some slides adapted from Navathe et. Al.
Copyright © 2007 Ramez Elmasri and Shamkant B. Navathe Slide
Database Security Advanced Database Dr. AlaaEddin Almabhouh.
IST 210 Security. IST 210 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed to. E.g., A student can’t.
AdvDB-6 J. Teuhola Database Security Security = protection from unauthorized use 6.1. Security issues Legal / ethical / ownership issues Policy.
Database Security and Authorization
Database Security and Authorization
CHAPTER 30 Database Security. CHAPTER 30 Database Security.
Database System Implementation CSE 507
Controlling User Access
Controlling User Access
Chapter 23 Database Security and Authorization
1 Introduction to Database Security Issues
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
TABLES AND INDEXES Ashima Wadhwa.
Database Security and Authorization
Database Security.
Database Security.
OS Access Control Mauricio Sifontes.
Access Control.
DATABASE SECURITY For CSCL (BIM).
Database Security Chapter 30
AUTHORIZATION AND ACCESS CONTROL DATA SECURITY identification Authentication Authorization.
Presentation transcript:

Jan. 2014Dr. Yangjun Chen ACS Database security and authorization (Ch. 22, 3 rd ed. – Ch. 23, 4 th ed. – Ch. 24, 6 th )

Jan. 2014Dr. Yangjun Chen ACS How do we protect the database from unauthorized access? Who should be able to see employee salaries, student grades, … ? Who should be able to update … ? Techniques include/involve: passwords log-in process - new entry for the log: {who, where, when} privileges encryption accounts - system (DBA), user security

Jan. 2014Dr. Yangjun Chen ACS We study two mechanisms: Discretionary access control (DAC) privileges such as read, write, update are granted to users a certain amount of discretion is given to the owner or anyone else with appropriate authority Mandatory access control (MAC) multilevel security is applied to data and users controlled by a central authority, not by owners of an object the owner/creator of an object does not decide who has clearance to see the object security

Jan. 2014Dr. Yangjun Chen ACS Note: US DoD has four basic divisions for systems: A, B, C, D lowest to highest is D, C1, C2, B1, B2, B3, A1 C1, C2, B1, B2, B3, A1 require DAC B1, B2, B3, A1 require MAC security

Jan. 2014Dr. Yangjun Chen ACS Discretionary access control (in the context of relational systems) based on granting and revoking of privileges privileges are assigned at two levels: account (user) - each account can be assigned privileges (rights or capabilities) relation - the privilege to access a particular relation is controlled (restricted) Discretionary

Jan. 2014Dr. Yangjun Chen ACS Discretionary access control account level create - schema, table, view alter - indexes, table (attributes, indexes) drop - table, index, view example grant createtab to A1 ; if A1 now creates a table X, then A1 owns X, and has all privileges on table X, and A1 can grant privileges to others Discretionary

Jan. 2014Dr. Yangjun Chen ACS Discretionary access control relation level type of access: read, write, update privileges on relations and columns access matrix model: subject1 object1 object2 object3 subject2 subject3 read/write/update Users/ accounts/ programs Relations/records/columns/views Discretionary operations

Jan. 2014Dr. Yangjun Chen ACS Discretionary access control: suppose A1 executes: create table employee (…); create table department (…); grant insert, delete on employee, department to A2; grant select on employee, department to A3; grant update on employee(salary) to A4; A1 employeedepartment A2 A3 all insert, delete select all insert, delete select employee.salary A4 update Discretionary

Jan. 2014Dr. Yangjun Chen ACS Discretionary access control: Views suppose A1 executes: create view EmployeesInDiv5 as select name, position, manager from employee e, department d where d.div = 5 and e.deptno = d.deptno; grant select on EmployeesInDiv5 to A4; employeedepartment A4 all select all EmployeesInDiv5 A1 all Discretionary

Jan. 2014Dr. Yangjun Chen ACS Mandatory access control for multilevel security Bell LaPadula model: specifies the allowable paths of information flow: information with high secret - information with low secret set of subjects S, and a set of objects O Mandatory S: user account programs O: relation tuple column view

Jan. 2014Dr. Yangjun Chen ACS each s in S and o in O has a fixed security class class(s) a clearance of s class(o) a classification level of o security classes are ordered by <= U (Unclassified) <= C (confidential) <= S (Secret) <= TS (Top Secret) (public <= sensitive <= top secret)

Jan. 2014Dr. Yangjun Chen ACS Mandatory access control for multilevel security Two properties of the Bell LaPadula model: Simple Security Property a subject s is not allowed read access to an object o unless class(s) >= class(o) Mandatory To see something, your clearance must be at least that of what you want In the military model, the security clearance of someone receiving a piece of information must be at least as high as the classification of the information

Jan. 2014Dr. Yangjun Chen ACS Mandatory access control for multilevel security Second property of the Bell LaPadula model: Star Property a subject s is not allowed write access to an object o unless class(s) <= class(o) Mandatory In the military model, a person writting some information at one level may pass that information along only to people at levels no lower than the level of the person To create/update something, your clearance must be no greater than the object you are creating/updating

Jan. 2014Dr. Yangjun Chen ACS Mandatory access control for multilevel security Implementation of the Bell LaPadula model: for each original attribute in a relation, add a classification attribute add a classification attribute for the tuple (row) - value is maximum of all classifications within the tuple these classification attributes are transparent to the user Mandatory

Jan. 2014Dr. Yangjun Chen ACS Mandatory access control for multilevel security Implementation example: suppose U <= C <= S Mandatory Employee relation Smith 40,000 Fair Brown 80,000 Good Name Salary JobPerformance The user view without MAC Smith U 40,000 C Fair S S Brown C 80,000 S Good C S Name C 1 Salary C 2 JobPerformance C 3 TC system view with MAC

Jan. 2014Dr. Yangjun Chen ACS Mandatory access control for multilevel security Implementation example: Mandatory Stored Rows: we store only the required tuples that then allow us to materialize tuples for lower levels For example, allows us to materialize tuples for Classes U, C, and S: U: C: S: Smith U 40,000 C Fair S S Smith null null Smith 40,000 null Smith 40,000 Fair

Jan. 2014Dr. Yangjun Chen ACS Mandatory access control for multilevel security Implementation example: Mandatory What does a class C user see if he/she executes Select * from Employee Smith 40,000 null Name Salary JobPerformance Smith U 40,000 C Fair S S Brown C 80,000 S Good C S Name C 1 Salary C 2 JobPerformance C 3 TC Brown null Good The result is filtered

Jan. 2014Dr. Yangjun Chen ACS Mandatory access control for multilevel security Implementation example: Mandatory What happens if a class C user executes Update Employee set Salary=100,000 Smith U 40,000 C Fair S S Brown C 80,000 S Good C S Name C 1 Salary C 2 JobPerformance C 3 TC Smith U 100,000 C Fair S S Brown C 80,000 S Good C S Name C 1 Salary C 2 JobPerformance C 3 TC Brown C 100,000 C Good C C Class C attribute is updated Class S attribute forces polyinstantiation What does the Star Property say? Let’s assume the result is to be class C.

Jan. 2014Dr. Yangjun Chen ACS Mandatory access control for multilevel security Implementation example: Mandatory Stored Rows: our update example required a row to be polyinstantiated For example, updating the Salary field in requires two rows for us to be able to materialize records for classes S, C, and U Brown C 80,000 S Good C S Brown C 100,000 C Good C C Two rows with the same key!

Jan. 2014Dr. Yangjun Chen ACS Mandatory access control for multilevel security Implementation example: Mandatory What does a class C user see if he/she executes Select * from Employee The result is filtered Smith U 100,000 C Fair S S Brown C 80,000 S Good C S Name C 1 Salary C 2 JobPerformance C 3 TC Brown C 100,000 C Good C C Smith 100,000 null Name Salary JobPerformance Brown 100,000 Good Only the row with TC=C is used