Lecturer : Assoc. Prof. Dang Tran Khah Presenter: Tran Thach Lam 1.

Slides:



Advertisements
Similar presentations
Database Systems: Design, Implementation, and Management
Advertisements

Distributed Databases John Ortiz. Lecture 24Distributed Databases2  Distributed Database (DDB) is a collection of interrelated databases interconnected.
Transaction.
Chapter 13 (Web): Distributed Databases
DDBMS Security - Bakul Gada.
1 Minggu 12, Pertemuan 23 Introduction to Distributed DBMS (Chapter , 22.6, 3rd ed.) Matakuliah: T0206-Sistem Basisdata Tahun: 2005 Versi: 1.0/0.0.
ABCSG - Distributed Database 1 Data Management Distributed Database Data Replication.
Distributed Database Management Systems
Distributed DBMSPage 5. 1 © 1998 M. Tamer Özsu & Patrick Valduriez Outline Introduction Background Distributed DBMS Architecture  Distributed Database.
Overview Distributed vs. decentralized Why distributed databases
1 © Prentice Hall, 2002 Chapter 13: Distributed Databases Modern Database Management 6 th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden.
Distributed DBMSPage 5. 1 © 1998 M. Tamer Özsu & Patrick Valduriez Outline Introduction Background Distributed DBMS Architecture  Distributed Database.
Definition of terms Definition of terms Explain business conditions driving distributed databases Explain business conditions driving distributed databases.
Distributed Databases
Distributed Databases and DBMSs: Concepts and Design
Secure Data Architectures
1 Distributed and Parallel Databases. 2 Distributed Databases Distributed Systems goal: –to offer local DB autonomy at geographically distributed locations.
Database Design – Lecture 16
III. Current Trends: 1 - Distributed DBMSsSlide 1/32 III. Current Trends Part 1: Distributed DBMSs: Concepts and Design Lecture 12 (2 hours) Lecturer:
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Multilevel Secure Database.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Multilevel Secure Database.
Lecture 5: Sun: 1/5/ Distributed Algorithms - Distributed Databases Lecturer/ Kawther Abas CS- 492 : Distributed system &
Session-8 Data Management for Decision Support
Database Systems: Design, Implementation, and Management Ninth Edition Chapter 12 Distributed Database Management Systems.
Week 5 Lecture Distributed Database Management Systems Samuel ConnSamuel Conn, Asst Professor Suggestions for using the Lecture Slides.
Distributed Database Systems Overview
DDBMS Distributed Database Management Systems Fragmentation
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Multilevel Secure Data Management.
Kjell Orsborn UU - DIS - UDBL DATABASE SYSTEMS - 10p Course No. 2AD235 Spring 2002 A second course on development of database systems Kjell.
1 Distributed Databases BUAD/American University Distributed Databases.
CS338Parallel and Distributed Databases11-1 Parallel and Distributed Databases Lecture Topics Multi-CPU and distributed systems Monolithic system Client–server.
Distributed database system
Topic Distributed DBMS Database Management Systems Fall 2012 Presented by: Osama Ben Omran.
MBA 664 Database Management Systems Dave Salisbury ( )
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Security for Distributed Data Management.
Chapter 12 Distributed Data Bases. Learning Objectives What a distributed database management system (DDBMS) is and what its components are How database.
Introduction to Distributed Databases Yiwei Wu. Introduction A distributed database is a database in which portions of the database are stored on multiple.
Archictecture for MultiLevel Database Systems Jeevandeep Samanta.
Trustworthy Semantic Web Dr. Bhavani Thuraisingham The University of Texas at Dallas Inference Problem March 4, 2011.
 Distributed Database Concepts  Parallel Vs Distributed Technology  Advantages  Additional Functions  Distribution Database Design  Data Fragmentation.
Chapter 1 Database Access from Client Applications.
1 Chapter 22 Distributed DBMS Concepts and Design CS 157B Edward Chen.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Database Security Database System Implementation CSE 507 Some slides adapted from Navathe et. Al.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #2 Supporting Technologies:
1 Chapter 22 Distributed DBMSs - Concepts and Design Simplified Transparencies © Pearson Education Limited 1995, 2005.
Database System Implementation CSE 507
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Webs
Data and Applications Security Developments and Directions
Information Security Analytics
Outline Introduction Background Distributed DBMS Architecture
Information Security Analytics
Distributed Databases
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Webs
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Trustworthy Semantic Web
Data and Applications Security Developments and Directions
Outline Introduction Background Distributed DBMS Architecture
Data and Applications Security Developments and Directions
Presentation transcript:

Lecturer : Assoc. Prof. Dang Tran Khah Presenter: Tran Thach Lam 1

Outline DDBMS System architecture Security policy Multilevel Data/Metadata Distribution Distributed Query Processing Transaction Management Some Issues 2

DDBMS A distributed database is a collection of data which is distributed over agerent computers of a computer network. Each site of the network has autonomous processing capability and can perform local applications. A distributed database management system supports the creation and maintenance of a distributed database 3

DDBMS 4

5

System Architecture 6

Secure distributed processor 7

Secure Policy An effective mandatory security policy for an MLS/DDBMS should ensure that users only acquire the information at or below their level Consists of a set of policies for mandatory security, discretionary security, integrity and authentication, 8

Security Policy Subjects are the active entities (such as processes) and objects are the passive entities(such as tuples or relations). Subjects and objects are assigned security levels. (unclassified < confidential < secret < top secret). A subject has read access to an object if the subject’s security level dominates the security level of the object. A subject has write access to an object if the subject’s security level is the security level of the object. A subject S1 can send a message to another subject S2 if the security level of S2 dominates. 9

Secure Policy 10

Secure Policy TCB : Trusted Computing Base The TCB hosts various trusted applications such as an MLS/DBMS and an SDP. Additional security policy extensions may be enforced by these applications depending on their designs. Two DMMs (DQPs, DTMs, DCPs) at different nodes can communicate with each other only if they both operate at the same level. Additional security policy cxtensions are enforced by certain modules of the SDP. 11

Multilevel Data/Metadata Distribution Local Data Distribution Distribution Across Sites Metadata Management Inference Problem 12

Local Data Distribution Multilevel relational data model that is used to represent the multilevel database at each local node. Each tuple is assigned a security level. 13

Distribution Across Sites Global multilevel relations could be totally or partially replicated across sites. The global relation is partitioned into horizontal subsets. The subsets could be stored across several sites. 14

Views 15

Metadata Management 16

Inference Problem Data mining, data warehouse. Now have sophisticated tools that they can employ to get data and deduce patterns that could be sensitive. Query processor of the MLS/DDBMS need examined and augmented with constraint processors 17

Distributed Query Processing Distributed Query Processor Strategies 18

Distributed Query Processor 19

Strategies 2 query-processing strategies for the join operation. Non-distributed join: Fragments of each relation at or below the user’s level are merged The lower-level polyinstantiated tuples are eliminated Join operation is performed. Distributed join: Join operations are performed between various fragments. The results of the individual join operations are merged. 20

Nondistributed join 21

Nondistributed join 22

Distributed join 23

Distributed join 24

Transaction Management Distributed Transaction Management Concurrency Control 25

Distributed Transaction Management 26

Distributed Transaction Management Policies : Each transaction is executed at the level of the user who requests the execution. A transaction does not change levels during its execution. Read /write into objects according to the mandatory security policy enforced by the system. 27

Concurrency Control Two techniques Locking Time stamping The techniques can actually handle any number of security levels. 28

Concurrency Control Locking: 2-phase locking : a transaction acquires all necessary locks first before releasing any. 2 types of lock : shared lock : read request exclusive lock: write request 29

Concurrency Control Time stamping: All transactions are given a time stamp when they begin. Data object : Read stamp & write stamp Transaction’s read request: time stamp > Obj write stamp Transaction’s write request: time stamp > Obj write & read stamp 30

Issue Covert channels : a Secret user’s query could have sensitive information that is sent to an Unclassified DBMS. Unclassified data is replicated at the St and TS databases, Secret data is replicated at the TS database. This way, a user’s query is sent only to the DBMS at the user’s level => Replicated approach 31

Other Issues Security constraints in a distributed environment Network security Issues for heterogeneous database systems Inference problem Database design 32

Type of Security Multilevel Security Discretionary Security 33

Discretionary Security Access control rules for specified type of access of user on data. An authenticator manage info of all users. Communicated each other. 34

Conclusion Idefined architecture for an MLS/DDBMS and discussed a security policy and multilevel data distribution issues. Issues on query processing, transaction management. Investigating issues on processing security constraints in a distributed environment, network security issues for an MLS/DDBMS, and security issues for heterogeneous database systems. => Forthcoming papers. 35

END 36