Title: Data and Applications Security Developments and Directions
1Data and Applications Security Developments and
Directions
- Dr. Bhavani Thuraisingham
- The University of Texas at Dallas
- Lecture 2
- Supporting Technologies
- January 11, and January 18, 2006
2Objective of the Unit
- This unit will provide an overview of the
supporting technologies
3Outline of Part I Information Security
- Operating Systems Security
- Network Security
- Designing and Evaluating Systems
- Web Security
- Other Security Technologies
4Operating System Security
- Access Control
- Subjects are Processes and Objects are Files
- Subjects have Read/Write Access to Objects
- E.g., Process P1 has read acces to File F1 and
write access to File F2 - Capabilities
- Processes must presses certain Capabilities /
Certificates to access certain files to execute
certain programs - E.g., Process P1 must have capability C to read
file F
5Mandatory Security
- Bell and La Padula Security Policy
- Subjects have clearance levels, Objects have
sensitivity levels clearance and sensitivity
levels are also called security levels - Unclassified
- Compartments are also possible
- Compartments and Security levels form a partially
ordered lattice - Security Properties
- Simple Security Property Subject has READ access
to an object of the subjects security level
dominates that of the objects - Star () Property Subject has WRITE access to an
object if the subjects security level is
dominated by that of the objects\
6Covert Channel Example
- Trojan horse at a higher level covertly passes
data to a Trojan horse at a lower level - Example
- File Lock/Unlock problem
- Processes at Secret and Unclassified levels
collude with one another - When the Secret process lock a file and the
Unclassified process finds the file locked, a 1
bit is passed covertly - When the Secret process unlocks the file and the
Unclassified process finds it unlocked, a 1 bit
is passed covertly - Over time the bits could contain sensitive data
7Network Security
- Security across all network layers
- E.g., Data Link, Transport, Session,
Presentation, Application - Network protocol security
- Ver5ification and validation of network protocols
- Intrusion detection and prevention
- Applying data mining techniques
- Encryption and Cryptography
- Access control and trust policies
- Other Measures
- Prevention from denial of service, Secure
routing, - - -
8Steps to Designing a Secure System
- Requirements, Informal Policy and model
- Formal security policy and model
- Security architecture
- Identify security critical components these
components must be trusted - Design of the system
- Verification and Validation
9Product Evaluation
- Orange Book
- Trusted Computer Systems Evaluation Criteria
- Classes C1, C2, B1, B2, B3, A1 and beyond
- C1 is the lowest level and A1 the highest level
of assurance - Formal methods are needed for A1 systems
- Interpretations of the Orange book for Networks
(Trusted Network Interpretation) and Databases
(Trusted Database Interpretation) - Several companion documents
- Auditing, Inference and Aggregation, etc.
- Many products are now evaluated using the federal
Criteria
10Security Threats to Web/E-commerce
11Approaches and Solutions
- End-to-end security
- Need to secure the clients, servers, networks,
operating systems, transactions, data, and
programming languages - The various systems when put together have to be
secure - Composable properties for security
- Access control rules, enforce security policies,
auditing, intrusion detection - Verification and validation
- Security solutions proposed by W3C and OMG
- Java Security
- Firewalls
- Digital signatures and Message Digests,
Cryptography
12E-Commerce Transactions
- E-commerce functions are carried out as
transactions - Banking and trading on the internet
- Each data transaction could contain many tasks
- Database transactions may be built on top of the
data transaction service - Database transactions are needed for multiuser
access to web databases - Need to enforce concurrency control and recovery
techniques
13Types of Transaction Systems
- Stored Account Payment
- e.g., Credit and debit card transactions
- Electronic payment systems
- Examples First Virtual, CyberCash, Secure
Electronic Transaction - Stored Value Payment
- Uses bearer certificates
- Modeled after hard cash
- Goal is to replace hard cash with e-cash
- Examples E-cash, Cybercoin, Smart cards
14What is E-Cash?
- Electronic Cash is stored in a hardware token
- Token may be loaded with money
- Digital cash from the bank
- Buyer can make payments to sellers token
(offline) - Buyer can pay to sellers bank (online)
- Both cases agree upon protocols
- Both parties may use some sort of cryptographic
key mechanism to improve security
15Other Security Technologies
- Data and Applications Security
- Middleware Security
- Insider Threat Analysis
- Risk Management
- Trust and Economics
- Biometrics
16Outline of Part II Data Management
- Concepts in database systems
- Types of database systems
- Distributed Data Management
- Heterogeneous database integration
- Federated data management
17An Example Database System
Adapted from C. J. Date, Addison Wesley, 1990
18Metadata
- Metadata describes the data in the database
- Example Database D consists of a relation EMP
with attributes SS, Name, and Salary - Metadatabase stores the metadata
- Could be physically stored with the database
- Metadatabase may also store constraints and
administrative information - Metadata is also referred to as the schema or
data dictionary
19Functional Architecture
Data Management
User Interface Manager
Schema (Data Dictionary) Manager (metadata)
Security/ Integrity Manager
Query Manager
Transaction Manager
Storage Management
File Manager
Disk Manager
20DBMS Design Issues
- Query Processing
- Optimization techniques
- Transaction Management
- Techniques for concurrency control and recovery
- Metadata Management
- Techniques for querying and updating the
metadatabase - Security/Integrity Maintenance
- Techniques for processing integrity constraints
and enforcing access control rules - Storage management
- Access methods and index strategies for efficient
access to the database
21Types of Database Systems
- Relational Database Systems
- Object Database Systems
- Deductive Database Systems
- Other
- Real-time, Secure, Parallel, Scientific,
Temporal, Wireless, Functional,
Entity-Relationship, Sensor/Stream Database
Systems, etc.
22Relational Database Example
Relation S S SNAME STATUS CITY S1 Smith
20 London S2 Jones 10
Paris S3 Blake 30
Paris S4 Clark 20 London S5
Adams 30 Athens Relation P P
PNAME COLOR WEIGHT CITY P1 Nut
Red 12 London P2 Bolt
Green 17 Paris P3 Screw
Blue 17 Rome P4 Screw
Red 14 London P5 Cam
Blue 12 Paris P6 Cog
Red 19 London
Relation SP S P QTY S1 P1
300 S1 P2 200 S1 P3 400 S1 P4
200 S1 P5 100 S1 P6 100 S2
P1 300 S2 P2 400 S3 P2
200 S4 P2 200 S4 P4 300 S4 P5
400
23Example Class Hierarchy
ID Name Author Publisher
Document Class
Method2
Method1
Print-doc(ID)
Print-doc-att(ID)
Journal Subclass
Book Subclass
of Chapters
Volume
B1
24Example Composite Object
Composite Document Object
Section 2 Object
Section 1 Object
Paragraph 1 Object
Paragraph 2 Object
25Distributed Database System
26Data Distribution
S
I
T
E
1
E
M
P
1
D
E
P
T
1
D
S
S
N
a
m
e
S
a
l
a
r
y
D
n
a
m
e
D
M
G
R
1
0
1
J
o
h
n
2
0
1
0
J
a
n
e
C
.
S
c
i
.
2
0
2
P
a
u
l
3
0
2
0
3
J
a
m
e
s
4
0
3
0
D
a
v
i
d
E
n
g
l
i
s
h
2
0
4
J
i
l
l
5
0
4
0
P
e
t
e
r
F
r
e
n
c
h
1
0
6
0
5
M
a
r
y
2
0
6
J
a
n
e
7
0
S
I
T
E
2
E
M
P
2
D
E
P
T
2
S
S
N
a
m
e
S
a
l
a
r
y
D
D
n
a
m
e
D
M
G
R
9
M
a
t
h
e
w
7
0
5
0
5
0
J
o
h
n
M
a
t
h
D
a
v
i
d
8
0
3
0
7
P
h
y
s
i
c
s
P
a
u
l
2
0
P
e
t
e
r
9
0
4
0
8
27Interoperability of Heterogeneous Database Systems
Database System A
Database System B
(Relational)
(Object- Oriented)
Network
Transparent access to heterogeneous databases -
both users and application programs Query,
Transaction processing
Database System C (Legacy)
28Different Data Models
Network
Node A
Node B
Node C
Node D
Database
Database
Database
Database
Network Model
Object- Oriented Model
Relational Model
Hierarchical Model
Developments Tools for interoperability
commercial products Challenges Global data
model
29Federated Database Management
Database System A
Database System B
Federation F1
Cooperating database systems yet maintaining some
degree of autonomy
Federation F2
Database System C
30Federated Data and Policy Management
Data/Policy for Federation
Export
Export
Data/Policy
Data/Policy
Export
Data/Policy
Component
Component
Data/Policy for
Data/Policy for
Agency A
Agency C
Component
Data/Policy for
Agency B
31Outline of Part I Information Management
- Information Management Framework
- Information Management Overview
- Some Information Management Technologies
- Knowledge Management
32What is Information Management?
- Information management essentially analyzes the
data and makes sense out of the data - Several technologies have to work together for
effective information management - Data Warehousing Extracting relevant data and
putting this data into a repository for analysis - Data Mining Extracting information from the data
previously unknown - Multimedia managing different media including
text, images, video and audio - Web managing the databases and libraries on the
web
33Data Warehouse
Data Warehouse Data correlating Employees
With Medical Benefits and Projects
Could be any DBMS Usually based on the
relational data model
Users Query the Warehouse
Oracle DBMS for Employees
Sybase DBMS for Projects
Informix DBMS for Medical
34Data Mining
35Multimedia Information Management
Broadcast News Editor (BNE)
Video Source
Broadcast News Navigator (BNN)
Correlation
Scene Change Detection
Story GIST Theme
Broadcast Detection
Frame Classifier
Key Frame Selection
Commercial Detection
Imagery
Silence Detection
Story Segmentation
Multimedia Database Management System
Audio
Speaker Change Detection
Closed Caption Text
Token Detection
Named Entity Tagging
Closed Caption Preprocess
Web-based Search/Browse by Program, Person,
Location, ...
Segregate Video Streams
Analyze and Store Video and Metadata
36Image ProcessingExample Change Detection
- Trained Neural Network to predict new pixel
from old pixel - Neural Networks good for multidimensional
continuous data - Multiple nets gives range of expected values
- Identified pixels where actual value
substantially outside range of expected values - Anomaly if three or more bands (of seven) out of
range - Identified groups of anomalous pixels
37Semantic Web
- Adapted from Tim Berners Lees description of the
Semantic Web
- Some Challenges Interoperability between
Layers Security and Privacy cut across all
layers Integration of Services Composability
38Knowledge Management Components
Knowledge
Components of
Management
Components,
Cycle and
Technologies
Cycle
Technologies
Components
Knowledge, Creation
Expert systems
Strategies
Sharing, Measurement
Collaboration
Processes
And Improvement
Training
Metrics
Web