DB Security Nawathe 2024
DB Security Nawathe 2024
Control Measures
• Control measures
• Access control
• Handled by creating user accounts and passwords
• Inference control (for statistical DBs)
• Must ensure information about individuals cannot be accessed
• Flow control
• Prevents information from flowing to unauthorized users
• Data encryption
• Used to protect sensitive transmitted data
Database Security and the DBA
• Database administrator (DBA)
• Central authority for administering database system
• Superuser or system account
• DBA-privileged commands
• Account creation
• Privilege granting
• Privilege revocation
• Security level assignment
• A1 to A3
• GRANT SELECT On Emp, Dept TO A3 WITH GRANT OPTION;
• A3 given the WITH GRANT OPTION
• A3 can give privilege to other users
• A3 to A4
• GRANT SELECT On Emp TO A4;
• A4 cannot propagate the SELECT privilege
(d) Polinstantiation
Comparing Discretionary Access Control and
Mandatory Access Control
• SELECT email
FROM Email-Addresses
WHERE email = ‘[email protected]’
• SELECT email-address
FROM Email-Addresses
WHERE email = 'anything' OR 'x'='x';
Simple SQL Injection
$name = $_REQUEST['name'];
$query = “SELECT * FROM suppliers WHERE name = '" . $name . "';"
$result = mysql_query($query);
Figure 30.3 The PERSON relation schema for illustrating statistical database security
Inference Problem
Inference Example
Introduction to Statistical Database Security (cont’d.)
• Only statistical queries are allowed
• Flow control
• Regulates the distribution or flow of information among accessible objects
• Verifies information contained in some objects does not flow explicitly or
implicitly into less protected objects
• Flow policy
• Specifies channels along which information is allowed to move
• Simple form: confidential and nonconfidential
• Covert channels
• Allows information to pass from a higher classification level to a lower
classification level through improper means
• Timing channel requires temporal synchronization
• Storage channel does not require temporal synchronization
Encryption and Public Key Infrastructures
Digital Certificates
• Combines value of a public key with the identity of the person or
service that holds the corresponding private key into a digitally signed
statement
• Information included in the certificate
• Owner information
• Public key of the owner
• Date of certificate issue and validity period
• Issuer identification
• Digital signature
Privacy Issues and Preservation
• Data quality
• Quality stamps
• Application-level recovery techniques to automatically repair incorrect data
• Intellectual property rights
• Digital watermarking techniques
• Database survivability
• Confinement: take immediate action to eliminate/reduce attacker's access
• Damage assessment
• Reconfiguration
• Repair: recover corrupted or lost data and reinstall failed system functions
• Fault treatment: identify the weaknesses and holes
Oracle Label-Based Security
Figure 30.4 Oracle label security architecture. Data from: Oracle (2007)
How Data Labels and User Labels Work Together
Figure 30.5 Data labels and user labels in Oracle. Data from: Oracle (2007)
Summary
• Threats to databases
• Types of control measures
• Access control
• Inference control
• Flow control
• Encryption
• Mandatory access control
• SQL injection
• Key-based infrastructures