Fine-Grained Data Security in Virtual Organizations

2009 ◽  
pp. 1663-1669
Author(s):  
Harith Indraratne ◽  
Gábor Hosszú

Controlling the access to data based on user credentials is a fundamental part of database management systems. In most cases, the level at which information is controlled extends only to a certain level of granularity. In some scenarios, however, there is a requirement to control access at a more granular way allowing the users to see only the data they are supposed to see in a database table. Fine-grained access control (FGAC) provides row-level security capabilities to secure information stored in modern relational database management systems. In case of creating the virtual networking infrastructure of virtual organizations, the security of the data stored in database management systems is a very important issue. Several models have been proposed by research community and database vendors for specifying and enforcing row-level access control at the database layer. This article reviews the most important facts of some significant FGAC models and current implementations of such in two commercial database management systems. We describe a novel concept of implementing FGAC in SQL Server 2005, which resembles Oracle 10g database management system’s FGAC solution virtual private databases (VPD).

Author(s):  
Harith Indraratne ◽  
Gabor Hosszú

Controlling the access to data based on user credentials is a fundamental part of database management systems. In most cases, the level at which information is controlled extends only to a certain level of granularity. In some scenarios, however, there is a requirement to control access at a more granular way allowing the users to see only the data they are supposed to see in a database table. Fine-grained access control (FGAC) provides row-level security capabilities to secure information stored in modern relational database management systems. In case of creating the virtual networking infrastructure of virtual organizations, the security of the data stored in database management systems is a very important issue. Several models have been proposed by research community and database vendors for specifying and enforcing row-level access control at the database layer. This article reviews the most important facts of some significant FGAC models and current implementations of such in two commercial database management systems. We describe a novel concept of implementing FGAC in SQL Server 2005, which resembles Oracle 10g database management system’s FGAC solution virtual private databases (VPD).


Author(s):  
Sakil Ahmad Ansari ◽  
Jaychand Vishwakarma

Transactions are vital for database management systems (DBMSs) because they provide transparency to concurrency and failure. Concurrent execution of transactions may lead to contention for access to data, which in a multilevel secure DBMS (MLSIDBMS) may lead to insecurity. In this paper we examine security issues involved in database concurrency control for MLS/DBMSs and show how a scheduler can affect security. We introduce Data Conflict Security; (DC-Security) a property that implies a system is free of convert channels due to contention for access to data. We present a definition of DC Security based on noninterference. Two properties that constitute a necessary condition for DC-Security are introduced along with two other simpler necessary conditions. We have identified a class of schedulers we call Output-State-Equivalent for which another criterion implies DC-Security. The criterion considers separately the behavior of the scheduler in response to those inputs that cause rollback and those that do not. We characterize the security properties of several existing scheduling protocols and find many to be insecure


Sign in / Sign up

Export Citation Format

Share Document