ADMT chp2
ADMT chp2
TECHNIQUES
St. Francis Institute of Technology, Department of Information Technology
The material in this presentation belongs to St. Francis Institute of Technology and is solely for educational purposes. Distribution and modifications of the content is prohibited.
TOPICS TO BE COVERED
•Advanced Database Access protocols: Discretionary Access Control
Based on Granting and Revoking Privileges;
•Mandatory Access Control and Role-Based Access Control.
•Remote Database access protocol
•Overview of Advanced Database models like Mobile databases,
Temporal databases, Spatial databases.
INTRODUCTION TO DATABASE
SECURITY ISSUES
The security mechanism of a DBMS must include provisions for
restricting access to the database as a whole
This function is called access control and is handled by creating
user accounts and passwords to control login process by the
DBMS.
INTRODUCTION TO DATABASE
SECURITY ISSUES
The security problem associated with databases is that of
controlling the access to a statistical database, which is used to
provide statistical information or summaries of values based on
various criteria. Eg. a database for population statistics
INTRODUCTION TO DATABASE
SECURITY ISSUES
Q1: SELECT COUNT (*) FROM PERSON WHERE ;
Q2: SELECT AVG (Income) FROM PERSON WHERE ;
Now suppose that we are interested in finding the Salary of Jane Smith, and we
know that she has a Ph.D. degree and that she lives in the city of Bellaire, Texas.
We issue the statistical query Q1 with the following condition:
(Last_degree=‘Ph.D.’ AND Sex=‘F’ AND City=‘Bellaire’
AND State=‘Texas’)
If we get a result of 1 for this query, we can issue Q2 with the same condition and
find the Salary of Jane Smith.
INTRODUCTION TO DATABASE
SECURITY ISSUES
Another security is that of flow control, which prevents information
from flowing in such a way that it reaches unauthorized users.
INTRODUCTION TO DATABASE
SECURITY ISSUES
A final security issue is data encryption, which is used to protect
sensitive data (such as credit card numbers) that is being
transmitted via some type of communication network.
The data is encoded using some encoding algorithm.
An unauthorized user who access encoded data will have
difficulty deciphering it, but authorized users are given decoding
or decrypting algorithms (or keys) to decipher data.
REVOKING PRIVILEGES
In some cases it is desirable to grant a privilege to a user
temporarily. For example,
The owner of a relation may want to grant the SELECT privilege
to a user for a specific task and then revoke that privilege once
the task is completed.
Hence, a mechanism for revoking privileges is needed. In SQL, a
REVOKE command is included for the purpose of canceling
privileges.
AN EXAMPLE
Suppose that the DBA creates four accounts
A1, A2, A3, A4
and wants only A1 to be able to create base relations. Then the DBA must
issue the following GRANT command in SQL
GRANT CREATETAB TO A1;
In SQL2 the same effect can be accomplished by having the DBA issue a
CREATE SCHEMA command as follows:
CREATE SCHEMA EXAMPLE AUTHORIZATION A1;
AN EXAMPLE CONT…
User account A1 can create tables under the schema called EXAMPLE.
Suppose that A1 creates the two base relations EMPLOYEE and
DEPARTMENT
A1 is then owner of these two relations and hence all the relation privileges
on each of them.
Suppose that A1 wants to grant A2 the privilege to insert and delete tuples in
both of these relations, but A1 does not want A2 to be able to propagate
these privileges to additional accounts:
GRANT INSERT, DELETE ON
EMPLOYEE, DEPARTMENT TO A2;
AN EXAMPLE CONT…
AN EXAMPLE CONT…
Suppose that A1 wants to allow A3 to retrieve information from either of the
two tables and also to be able to propagate the SELECT privilege to other
accounts.
A1 can issue the command:
GRANT SELECT ON EMPLOYEE, DEPARTMENT
TO A3 WITH GRANT OPTION;
A3 can grant the SELECT privilege on the EMPLOYEE relation to A4 by issuing:
GRANT SELECT ON EMPLOYEE TO A4;
Notice that A4 can’t propagate the SELECT privilege because GRANT
OPTION was not given to A4
AN EXAMPLE CONT…
Suppose that A1 decides to revoke the SELECT privilege on the EMPLOYEE
relation from A3; A1 can issue:
REVOKE SELECT ON EMPLOYEE FROM A3;
The DBMS must now automatically revoke the SELECT privilege on EMPLOYEE
from A4, too, because A3 granted that privilege to A4 and A3 does not have
the privilege any more.
The commonly used model for multilevel security, known as the Bell-LaPadula
model, classifies each subject (user, account, program) and object (relation,
tuple, column, view, operation) into one of the security classifications, TS, S, C,
or U:
Clearance (classification) of a subject S as class(S) and to the classification of an
object O as class(O). Thus achieving DAC.
EXAMPLE
SQL INJECTION
One of the most common threats to a database system.
In an SQL Injection attack, the attacker injects a string input through the
application, which changes or manipulates the SQL statement to the attacker’s
advantage.
It can harm the database in various ways, such as unauthorized manipulation
of the database, or retrieval of sensitive data.
It can also be used to execute system level commands that may cause the
system to deny service to the application.
SQL INJECTION
SQL Manipulation: the most common type of injection attack, changes an SQL command in the
application
Eg. by adding conditions to the WHERE-clause of a query, or by expanding a query with
additional query components using set operations such as UNION, INTERSECT, or MINUS.
SELECT * FROM users WHERE username = ‘jake’ and PASSWORD =
‘jakespasswd’
The attacker can try to change (or manipulate) the SQL statement, by changing it as follows:
SELECT * FROM users WHERE username = ‘jake’ and (PASSWORD =
‘jakespasswd’ or ‘x’ = ‘x’)
As a result, the attacker who knows that ‘jake’ is a valid login of some user is able to log into
the database system as ‘jake’ without knowing his password and is able to do everything that
‘jake’ may be authorized to do to the database system.
In EMP_BT, the current version of each employee typically has a special value, uc (Until Changed), as its transaction end
time, which indicates that the tuple represents correct information until it is changed by some other transaction.
ADMT CHP2 SLIDES BY: MS. SHREE J. 60
The material in this presentation belongs to St. Francis Institute of Technology and is solely for educational purposes. Distribution and modifications of the content is prohibited.
SPATIO-TEMPORAL DATA
Average Monthly
Temperature of land
and ocean
MULTIMEDIA DATABASES
In the years ahead multimedia information systems are expected to
dominate our daily lives.
Our houses will be wired for bandwidth to handle interactive
multimedia applications.
Our high-definition TV/computer workstations will have access to
a large number of databases, including digital libraries, image
and video databases that will distribute vast amounts of
multisource multimedia content.
MULTIMEDIA DATABASES
Types of multimedia data are available in current systems
Text: May be formatted or unformatted. For ease of parsing
structured documents, standards like SGML and variations such as
HTML are being used.
Graphics: Examples include drawings and illustrations that are
encoded using some descriptive standards (e.g. CGM, PICT,
postscript).
MULTIMEDIA DATABASES
Types of multimedia data are available in current systems (contd.)
Images: Includes drawings, photographs, and so forth, encoded in
standard formats such as bitmap, JPEG, and MPEG. Compression
is built into JPEG and MPEG.
These images are not subdivided into components. Hence
querying them by content (e.g., find all images containing circles)
is nontrivial.
Animations: Temporal sequences of image or graphic data.
MULTIMEDIA DATABASES
Types of multimedia data are available in current systems (contd.)
Video: A set of temporally sequenced photographic data for
presentation at specified rates– for example, 30 frames per
second.
Structured audio: A sequence of audio components comprising
note, tone, duration, and so forth.
Audio: Sample data generated from aural recordings in a string
of bits in digitized form. Analog recordings are typically
converted into digital form before storage.
MULTIMEDIA DATABASES
Types of multimedia data are available in current systems (contd.)
Composite or mixed multimedia data: A combination of
multimedia data types such as audio and video which may be
physically mixed to yield a new storage format or logically mixed
while retaining original types and formats. Composite data also
contains additional control information describing how the
information should be rendered.
MULTIMEDIA DATABASES
Nature of Multimedia Applications:
Multimedia data may be stored, delivered, and utilized in many
different ways.
Applications may be categorized based on their data
management characteristics.
List out characteristics of Temporal Database (Dec 2020)……5M each…Ans: Chp 26,
pg. 957 , pg. 943
Difference between Mandatory Access control and Discretionary access control also
explain Access control list and access control list with respect to same. (Dec
2020)……10M…Ans: Chp 24, pg. 842, 847, 851
Note: Chapter number and page numbers are from the book, Elmasri and Navathe,
“Fundamentals of Database Systems”, 6th Edition, PEARSON Education.
ADMT CHP2 SLIDES BY: MS. SHREE J. 83
The material in this presentation belongs to St. Francis Institute of Technology and is solely for educational purposes. Distribution and modifications of the content is prohibited.