Database Security
Database Security
First Edition
by William Stallings and Lawrie Brown
Lecture slides by Lawrie Brown
Database Security
Relational Databases
constructed
have
/ table / file
tuple / row / record
attribute / column / field
primary key
foreign
key
view
/ virtual table
centralized administration
ownership-based administration
decentralized administration
two commands:
Cascading Authorizations
categories
of database users:
application owner
end user
administrator
DB
Inference
Inference Example
Inference Countermeasures
inference
inference
need
a difficult problem
cf. employee-salary example
Statistical Databases
provides
two
types:
access
a characteristic formula C
query
Protecting
Against
Inference
Tracker Attacks
divide
C = C1.C2
count(C.D) = count(C1) - count (C1. ~C2)
combination
is called a tracker
each part acceptable query size
overlap is desired result
partitioning
query
Perturbation
data swapping
generate statistics from probability distribution
random-sample query
statistic adjustment
Database Encryption
can encrypt
varying trade-offs
Database Encryption
Summary
introduced
SQL, role-based
inference
statistical