Lecture 6 - Database Security Design
Lecture 6 - Database Security Design
ICSE 6203:
Database Management Systems
Lecture 6
Database Security Design
Dr. E. A. Kalinga|UDSM|CoICT|CSE 1
2/21/2012
Dr. E. A. Kalinga|UDSM|CoICT|CSE 2
2/21/2012
Dr. E. A. Kalinga|UDSM|CoICT|CSE 3
2/21/2012
Dr. E. A. Kalinga|UDSM|CoICT|CSE 4
2/21/2012
Dr. E. A. Kalinga|UDSM|CoICT|CSE 5
2/21/2012
Dr. E. A. Kalinga|UDSM|CoICT|CSE 6
2/21/2012
Dr. E. A. Kalinga|UDSM|CoICT|CSE 7
2/21/2012
Dr. E. A. Kalinga|UDSM|CoICT|CSE 8
2/21/2012
Untrusted Untrusted
front end front end
Trusted DBMS
Trusted OS
Database
Dr. E. A. Kalinga|UDSM|CoICT|CSE 9
2/21/2012
Untrusted Untrusted
front end front end
Untrusted DBMS
Database
Untrusted Untrusted
front end front end
Trusted filter
Cryptographic unit
Append stamp Check stamp
Untrusted DBMS
Database
Dr. E. A. Kalinga|UDSM|CoICT|CSE 10
2/21/2012
Trusted Trusted
front end front end
Trusted OS
Database
Trusted Trusted
front end front end
Database Database
high & low low data
data
Dr. E. A. Kalinga|UDSM|CoICT|CSE 11
2/21/2012
Dr. E. A. Kalinga|UDSM|CoICT|CSE 12
2/21/2012
Ingres
• Subjects are users and groups.
• All users in a group are given a set of
authorizations, giving them the right to execute
certain applications.
• When executing an application a user must
enter the role and password for that role.
• Objects are databases, catalogues, tables,
views, procedures. Ingres uses Grant and Grant
Option for rights Select, Insert, Delete, Update
and Execute.
• Auditdb command for inspecting audits.
Dr. E. A. Kalinga|UDSM|CoICT|CSE 13
2/21/2012
Oracle
• B1 version for Unix, A1 for GEMSOS.
• Subjects can be created, altered and dropped.
• The administrator defines a role, grants
privileges to the role and then grants the role
to subjects.
• Granting roles to roles creates hierarchy.
• Connect privilege to connect to database.
• Resource privilege to create base tables.
• DBA privilege to also create users.
Oracle (cont.)
• Objects are databases, tables, views, etc.
Objects have security labels, defines at the
relation level.
• Operations Select, Insert, Update, Delete,
Alter, Index and Reference on tables. Only
Select, Insert, Update and Delete on views.
Execute privilege on procedures.
• Grant option is available.
• Column privileges for Update, Insert,
Reference.
• Audit command to inspect audit trails.
Dr. E. A. Kalinga|UDSM|CoICT|CSE 14
2/21/2012
Dr. E. A. Kalinga|UDSM|CoICT|CSE 15
2/21/2012
Dr. E. A. Kalinga|UDSM|CoICT|CSE 16
2/21/2012
Dr. E. A. Kalinga|UDSM|CoICT|CSE 17
2/21/2012
Dr. E. A. Kalinga|UDSM|CoICT|CSE 18
2/21/2012
Dr. E. A. Kalinga|UDSM|CoICT|CSE 19
2/21/2012
Dr. E. A. Kalinga|UDSM|CoICT|CSE 20