Database security - Concepts, approaches, and challenges

被引:169
作者
Bertino, E [1 ]
Sandhu, R
机构
[1] Purdue Univ, Comp Sci & Elect & Comp Engn Dept, W Lafayette, IN 47907 USA
[2] Purdue Univ, CERIAS, W Lafayette, IN 47907 USA
[3] George Mason Univ, Informat Sci Engn Dept, Fairfax, VA 22030 USA
基金
美国国家科学基金会;
关键词
data confindentiality; data privacy; relational and object databases; XML;
D O I
10.1109/TDSC.2005.9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Though a number of techniques, such as encryption and electronic signatures, are currently available to protect data when transmitted across sites, a truly comprehensive approach for data protection must also include mechanisms for enforcing access control policies based on data contents, subject qualifications and characteristics, and other relevant contextual information, such as time. It is well understood today that the semantics of data must be taken into account in order to specify effective access control policies. Also, techniques for data integrity and availability specifically tailored to database systems must be adopted. In this respect, over the years the database security community has developed a number of different techniques and approaches to assure data confidentiality, integrity, and availability. However, despite such advances, the database security area faces several new challenges. Factors such as the evolution of security concerns, the "disintermediation" of access to data, new computing paradigms and applications, such as grid-based computing and on-demand business, have introduced both new security requirements and new contexts in which to apply and possibly extend current approaches. In this paper, we first survey the most relevant concepts underlying the notion of database security and summarize the most well-known techniques. We focus on access control systems, on which a large body of research has been devoted, and describe the key access control models, namely, the discretionary and mandatory access control models, and the role-based access control (RBAC) model. We also discuss security for advanced data management systems, and cover topics such as access control for XML. We then discuss current challenges for database security and some preliminary approaches that address some of these challenges.
引用
收藏
页码:2 / 19
页数:18
相关论文
共 93 条
[1]  
AGRAWAL R, 2004, P 2004 ACM SIGM C
[2]  
AGRAWAL R, 2002, P VER LARG DAT C VLD
[3]  
AHAD R, 1992, P INT C EXT DAT TECH
[4]  
Ahn G.-J., 2000, ACM Transactions on Information and Systems Security, V3, P207, DOI 10.1145/382912.382913
[5]  
[Anonymous], 2002, P VLDB 02
[6]  
[Anonymous], 2000, INTRUSION DETECTION
[7]  
[Anonymous], MTR2997 MITR CORP
[8]  
Astrahan M. M., 1976, ACM Transactions on Database Systems, V1, P97, DOI 10.1145/320455.320457
[9]  
Bacon J., 2002, ACM Transactions on Information and Systems Security, V5, P492, DOI 10.1145/581271.581276
[10]  
Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979