1 / 33

CSCE 824

CSCE 824. Secure (and Distributed) Database Management Systems. Course Aim. Advanced understanding of DBMS concepts From relation to un- and semi-structured data models New type of applications Security needs. Reference Materials. Recommended :

herrone
Download Presentation

CSCE 824

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CSCE 824 Secure (and Distributed) Database Management Systems CSCE 824

  2. Course Aim • Advanced understanding of DBMS concepts • From relation to un- and semi-structured data models • New type of applications • Security needs CSCE 824

  3. Reference Materials • Recommended: • T. Ozsu and P. Valduriez, Principles of Distributed Database Systems, Springer; 3rd Edition. edition (March 2, 2011), ISBN-10: 1441988335 • M. Gertz, S. Jajodia, Handbook of database security: applications and trend, Springer 2008 • Online materials CSCE 824

  4. Conference Proceedings and Journals • Proceedings of Secure Data Management Workshop, links: 2012 http://www.hitech-projects.com/sdm-workshop/sdm12.html , 2011 http://www.hitech-projects.com/sdm-workshop/sdm11.html • Proceedings of IFIP WG 11.3 Data and Application Security and Privacy, links: 2012 http://conferences.telecom-bretagne.eu/dbsec2012/ , 2011 http://www.egr.vcu.edu/dbsec2011/ • Proceedings of International Conference of Very Large Databases (VLDB), links: 2012 http://www.vldb2012.org/ , 2011 http://www.vldb.org/2011/ CSCE 824

  5. Journals and Books • IEEE Transactions on Knowledge and Data Engineering (TKDE) • ACM Transactions on Information and System Security (TISSEC) • M. Gertz, S. Jajodia, Handbook of database security: applications and trend, Springer 2008 CSCE 824

  6. Challenge • Research project: there will be one group research project. Students must present the related work and their results to the class in the last lectures of the semester. • Homework assignments. There will be several homework exercises and reading for the lectures. • Tests: there will be two tests covering the course materials. Both tests are open book, in-class tests. CSCE 824

  7. Grading • Research project: 35%, Test 1 : 20%, Test 2: 25%, Homework assignment: 20% • 90 < A; 87 < B+ <= 90; 80 < B <= 87; 76 < C+ <=80; 65 < C <= 76; 60 < D+ <= 65; 50 <D <= 60 CSCE 824

  8. Topics Covered • Weeks 1-5: Distributed and Non-traditional Databases • Weeks 6-11: Database Security • Weeks 12-15: Student Presentations CSCE 824

  9. Students’ IntroductionNameMajorInterest in class CSCE 824

  10. Information Assurance Studies

  11. IA Specialization • Graduate level • Core Requirement (3 Hours) • CSCE 522: Information Security Principles (3 credits) – meets CNSS 4011 standard • Additional Requirements: • Elective IA course (3 credit) • 2nd elective course (3 credits) or 500-level or above CSCE course with IA project component

  12. CNSS Certifications • Old criteria: • National Training Standard for Information Systems Security Professionals, CNSSI No. 4011 • National Training Standard for System Administrators in Information Systems Security, CNSSI No. 4013 • National Training Standard for Information Systems Security Officers, CNSSI No. 4014 • New criteria: Knowledge Units

  13. IA&S Courses • Offered since 2000 • 12 new courses • 4 undergraduate and graduate • 8 graduate students only • Approved by USC • Accredited by the Committee on National Security Systems (CNSS)

  14. IA&S Certificate Programhttp://www.cse.sc.edu/isl/education/iaands (modifications are approved, starting Fall 2016)

  15. Graduation requirements 12 hours of graduate study with B average • 6 hours core courses • 6 hours of elective courses

  16. Core Courses • CSCE 522 – Information Systems Security Principles • offered every Fall semester -- APOGEE • CSCE 715– Network Security • offered every Fall semester

  17. Elective Courses • CSCE 517 – Computer Crime and Forensics • CSCE 557 – Introduction to Cryptography • CSCE 548 – Secure Software Construction • CSCE 716 – Design for Reliability • CSCE 717 – Comp. Systems Performance • CSCE 727 – Information Warfare • CSCE 813 – Internet Security • CSCE 814 – Distributed Systems Security • CSCE 824 – Secure Databases

  18. Center for Information Assurance Engineering (CIAE) • http://www.cse.sc.edu/isl • Information about: • Research • Education • Publications • People • Useful links

  19. Questions? CSCE 824

  20. Database Management System (DBMS) • Collection of • interrelated data and • set of programs to access the data • Convenient and efficient processing of data • Database Application Software CSCE 824

  21. Evolution of Database Systems • Early days: customized applications built on top of file systems • Drawbacks of using file systems to store data: • Data redundancy and inconsistency • Difficulty in accessing data • Atomicity of updates • Concurrency control • Security • Data isolation — multiple files and formats • Integrity problems CSCE 824

  22. Abstraction • View level: different perspectives • Application programs hide irrelevant data • Logical level: data models • Logical representation of data • Different approaches: hierarchical, network, object oriented, semi-structured, etc. • Data independence principle • Physical level: how data is stored CSCE 824

  23. Data Models • A collection of tools for describing • Data • Relationships among data items • Semantics of stored data • Database constraints CSCE 824

  24. Database Management Systems • Smaller and smaller systems • Past: large and expensive DBMS • Present: DBMS in most personal computers • More and more data stored – BIG DATA • Past: few MB • Present: terabyte (1012 bytes), petabyte (1015 bytes) • Functionality: from physical to view level • Optimization CSCE 824

  25. Data Definition Language (DDL) • Defines the database schema and constraints • DDL compiler data dictionary • Metadata – data about data CSCE 824

  26. Data Manipulation Language (DML) • Accessing and manipulating the data • Query Languages • Procedural – user specifies what data is required and how to get those data • Nonprocedural – user specifies what data is required without specifying how to get those data CSCE 824

  27. Current Demands • Efficient data processing of large data sets • Long running transactions • Real-time demand • Usability for specific applications • … CSCE 824

  28. Data Security

  29. Security Objectives • Confidentiality: prevent/detect/deter improper disclosure of information • Integrity: prevent/detect/deter improper modification of information • Availability: prevent/detect/deter improper denial of access to services CSCE 824

  30. Security Threats • Poor design • Insufficient quality control • Accidents • Attacks CSCE 824

  31. Achieving Security • Policy • What to protect? • Mechanism • How to protect? • Assurance • How good is the protection? CSCE 824

  32. Database Security • Security Policy • Access control models • Inference control • Integrity protection • Privacy problems • Fault tolerance and recovery • Auditing and intrusion detection • TOOLS CSCE 824

  33. Next Class Relational data model CSCE 824

More Related