1 / 31

Data and Applications Security Developments and Directions

This course provides an overview of concepts, developments, challenges, and directions in data and applications security. Topics include database security, data management security, object security, data mining for security applications, privacy, and more.

kfalcon
Download Presentation

Data and Applications Security Developments and Directions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 30, 2013

  2. Objective of the Unit • This unit provides an overview of the course. The course describes concepts, developments, challenges, and directions in data and applications security. Topics include • database security, distributed data management security, object security, data warehouse security, data mining for security applications, privacy, secure semantic web, secure digital libraries, secure knowledge management and secure sensor information management, biometrics

  3. Outline of the Unit • Outline of Course • Course Work • Course Rules • Contact • Appendix

  4. Outline of the Course • Unit #1: Introduction to Data and Applications • Part I: Background • Unit #2: Data Management • Unit #3: Information Security • Unit #4: Information Management including Semantic Web • Part II: Discretionary Security • Unit #5: Concepts • Unit #6: Policy Enforcement • Part III: Mandatory Security • Unit #7: Concepts • Unit #8: Architectures

  5. Outline of the Course (Continued) • Part IV: Secure Relational Data Management • Unit #9: Data Model • Unit #10: Functions • Unit #11: Prototypes and Products • Part V: Inference Problem • Unit #12: Concepts • Unit #13: Constraint Processing • Unit #14: Conceptual Structures • Part VI: Secure Distributed Data Management • Unit #15: Secure Distributed data management • Unit #16: Secure Heterogeneous Data Integration • Unit #17: Secure Federated Data Management

  6. Outline of the Course (Continued) • Part VII: Secure Object Data Management • Unit #18: Secure Object Management • Unit #19: Secure Distributed Objects and Modeling Applications • Unit #20: Secure Multimedia Systems • Part VIII: Data Warehousing, Data Mining and Security • Unit #21: Secure Data Warehousing • Unit #22: Data Mining for Security Applications • Unit #23: Privacy • Additional Lectures: • Insider Threat Detection • Reactively Adaptive Malware

  7. Outline of the Course (Continued) • Part IX: Secure Information Management (Oct 25, Nov 1, Nov 8) • Unit #24: Secure Digital Libraries • Unit #25: Secure Semantic Web (web services, XML security) • Unit #26: Secure Information and Knowledge Management • Additional Topics • Secure Web Services and identity management • Social Network Security and Privacy • Secure cloud computing and secure cloud query processing • Part X: Dependable data management and forensics (Nov 15) • Unit #27: Secure Dependable Data Management • Unit #28: Secure Sensor and Wireless Data Management • Unit #29: Other Technologies, e.g., digital forensics, biometrics, etc.

  8. Outline of the Course (Continued) • Part XI: Emerging Technologies (November 22) • TBD • Unit #30 Conclusion to the Course

  9. Tentative Schedule • August 30: Introduction • September 6: Policies and Access Control • September 13: Multilevel Data Management • September 20: Inference Problem • September 27: Secure Distributed Data Management; Intro to Semantic Web • October 4: Secure Objects, Data Warehousing, Data Mining, Security • October 11: Data Mining for Malware Detection, Privacy, Review for Exam • October 18: Exam #1 • October 25: Secure web services, Secure semantic web and XML security • November 1: Secure Cloud Computing • November 8: Secure Knowledge Management and Social Networking • November 15: Secure Dependable Data Management, Digital Forensics • November 22: Mobile phone security and special topics • November 29: Holiday • December 6: Selected project presentations and review • December 13: Exam #2: 11am – 1:45pm

  10. Tentative Schedule (new dates in red) • Assignment #1 due date: September 20, 2013 • Assignment #2: due date: September 27, 2013 • Term paper #1: October 11, 2013 • Exam #1: October 18, 2013 • Assignment #3: October 25, 2013 (November 1, 2013) • Assignment #4: November 1: 2013 (November 8, 2013) • Term paper #2: November 8, 2013 (November 15, 2013) • Project: November 22, 2013 (December 2, 2013) • Exam #2TBD

  11. Course Work • Two term papers; each worth 8 points • Two exams each worth 24 points • Programming project worth 12 points • Four homework assignments each worth 6 points • Total 100 points • Course Book: Database and Applications Security: Integration Data Management and Information Security, Bhavani Thuraisingham, CRC Press, 2005 • Will also include papers as reading material

  12. Some Topics for Papers: Any topic in data and applications security • XML Security (will be discussed on October 25) • Inference Problem • Privacy • Secure Biometrics (after exam #1) • Intrusion Detection • E-Commerce Security (will be discussed after exam #1) • Secure Sensor Information Management (after exam #1) • Secure Distributed Systems • Secure Semantic Web (after exam #1) • Secure Data Warehousing • Insider Threat Analysis • Secure Multimedia/geospatial Systems • Malware detection • Policies and access control • Designs of multilevel secure databases

  13. Term Papers: Example Format • Abstract • Introduction • Background on the Topic • Survey of various techniques, designs etc, (e.g., access control policies, inference control methods) • Analyze the techniques, designs etc. and give your opinions • Directions for further work • Summary and Conclusions • References

  14. Term Papers: Example Format - II • Abstract • Introduction • Background on the Topic and Related Work • Discuss strengths and weaknesses of others’ work • Give your own design and say why it is better • Directions for further work • Summary and Conclusions • References

  15. Project Report Format • Overview of the Project • Design of the System • Input/Output • Future Enhancements • References

  16. Some Project Topics • Quivery Modification on XML Documents • Access control for web systems • Intrusion detection system • Access control for multimedia systems • E.g., access control for image, video • Role-based access control system • Access control for object systems • Secure data warehouse

  17. Course Rules • Course attendance is mandatory; unless permission is obtained from instructor for missing a class with a valid reason (documentation needed for medical emergency for student or a close family member – e.g., spouse, parent, child). Attendance will be collected every lecture. 3 points will be deducted out of 100 for each lecture missed without approval. • Each student will work individually • Late assignments will not be accepted. All assignments have to be turned in just after the lecture on the due date • No make up exams unless student can produce a medical certificate or give evidence of close family emergency • Copying material from other sources will not be permitted unless the source is properly referenced • Any student who plagiarizes from other sources will be reported to the appropriate UTD authroities

  18. Assignment #1, 2, 3, 4 Assignment #1: Posted in Lecture 8 Assignment #2 Posted in Lecture 11 Assignment #3: Posted in Lecture 19 Assignment #4: Posted in Lecture 24

  19. Papers to Read for Exam #1 • RBAC: Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman: Role-Based Access Control Models. IEEE Computer 29(2): 38-47 (1996) • UCON: Jaehong Park, Ravi S. Sandhu: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1): 128-174 (2004) - first 20 pages • DCON: Roshan K. Thomas, Ravi S. Sandhu: Towards a Multi-dimensional Characterization of Dissemination Control. POLICY 2004: 197-200 (IEEE) • Bhavani M. Thuraisingham: Mandatory Security in Object-Oriented Database Systems. OOPSLA 1989: 203-210 • Bhavani M. Thuraisingham, William Ford: Security Constraints in a Multilevel Secure Distributed Database Management System. IEEE Trans. Knowl. Data Eng. 7(2): 274-293 (1995) (distributed inference control)

  20. Papers to Read for Exam #1 • RakeshAgrawal, RamakrishnanSrikant: Privacy-Preserving Data Mining. SIGMOD Conference 2000: 439-450 • Elisa Bertino, Bhavani M. Thuraisingham, Michael Gertz, Maria Luisa Damiani: Security and privacy for geospatial data: concepts and research directions. SPRINGL 2008: 6-19 • Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham: A Hybrid Model to Detect Malicious Executables. ICC 2007: 1443-1448 • PallabiParveen, Nate McDaniel, Varun S. Hariharan, Bhavani M. Thuraisingham, Latifur Khan: Unsupervised Ensemble Based Learning for Insider Threat Detection SocialCom/PASSAT 2012: 718-727 • Bhavani M. Thuraisingham: Data Mining, National Security, Privacy and Civil Liberties. SIGKDD Explorations 4(2): 1-5 (2002)

  21. Suggested papers for Malware detection • Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham: E-Mail Worm Detection Using Data Mining. IJISP 1(4): 47-61 (2007) • Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham, Xinran Wang, Peng Liu, Sencun Zhu: Detecting Remote Exploits Using Data Mining. IFIP Int. Conf. Digital Forensics 2008: 177-189 • Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingham: A new intrusion detection system using support vector machines and hierarchical clustering. VLDB J. 16(4): 507-521 (2007)

  22. Index to Lectures for Exam #1 Introduction to course Lecture 1: Introduction to data and applications security Lecture 2: Cyber security modules (extra credit) Lecture 3: Access control Lecture 4: Malware (extra credit) Lecture 5: Data Mining (will not be included) Lecture 6: Data and application development security Lecture 7: Multilevel secure data management Lecture 8: Assignment #1 Lecture 9: Inference problem – 1 Lecture 10: Inference problem – 2 Lecture 11: Assignment #2

  23. Index to Lectures for Exam #1 Lecture 12: Unsupervised ensemble based learning for insider threat Lecture 13: Secure distributed data management (will include information sharing) Lecture 14: Intro to semantic web (not included in exam) Lecture 15: Secure object Lecture 16: Data warehouse, data mining security Lecture 17: Data mining for malware detection Lecture 18: Privacy Lecture 19: Assignment #3 Note: Inference problem or secure distributed data will also distributed inference control

  24. Papers to Read for Exam #2 (Cloud) • Bhavani M. Thuraisingham, Vaibhav Khadilkar, Anuj Gupta, Murat Kantarcioglu, Latifur Khan: Secure data storage and retrieval in the cloud. CollaborateCom 2010:1-8 (Relational HIVE + XACML) • Mohammad Farhan Husain, Latifur Khan, Murat Kantarcioglu, Bhavani M. Thuraisingham:Data Intensive Query Processing for Large RDF Graphs Using Cloud Computing Tools.IEEE CLOUD 2010: 1-10 (background paper, not for exam)) • Arindam Khaled, Mohammad Farhan Husain, Latifur Khan, Kevin W. Hamlen, Bhavani M. Thuraisingham: A Token-Based Access Control System for RDF Data in the Clouds.CloudCom 2010: 104-111 (RDF + XACML)) • Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar, Bhavani M. Thuraisingham: Design and Implementation of a Cloud-Based Assured Information Sharing System. MMM-ACNS 2012:36-50 (RDF Only for data and policies)

  25. Papers to Read for Exam #2 (Misc) • Elisa Bertino, Barbara Carminati, Elena Ferrari, Bhavani M. Thuraisingham, Amar Gupta: Selective and Authentic Third-Party Distribution of XML Documents. IEEE Trans. Knowl. Data Eng. 16(10): 1263-1278 (2004) (October 25/Nov 1) – the proofs are not necessary – up to section 6 • Elisa Bertino, Latifur R. Khan, Ravi S. Sandhu, Bhavani M. Thuraisingham: Secure knowledge management: confidentiality, trust, and privacy. IEEE Transactions on Systems, Man, and Cybernetics, Part A (TSMC) 36(3):429-438 (2006) • David W. Chadwick, George Inman: Attribute Aggregation in Federated Identity Management.IEEE Computer 42(5): 33-40 (2009) (November 1, 2013) • Jungin Kim, Bhavani M. Thuraisingham: Dependable and Secure TMO Scheme. ISORC 2006: 133-140

  26. Papers to Read for Exam #2 (Social Networks) • Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu,Bhavani M. Thuraisingham: A semantic web based framework for social network access control. SACMAT 2009:177-186 • Raymond Heatherly, Murat Kantarcioglu, Bhavani M. Thuraisingham: Preventing Private Information Inference Attacks on Social Networks. IEEE Trans. Knowl. Data Eng. (TKDE) 25(8):1849-1862 (2013)(just understand the basic concepts in this paper; math detailed are not necessary)

  27. Some Suggested Papers (Not included for Exam #2) • Tyrone Cadenhead, VaibhavKhadilkar, Murat Kantarcioglu, Bhavani M. Thuraisingham: Transforming provenance using redaction. SACMAT 2011:93-102 • Tyrone Cadenhead, VaibhavKhadilkar, Murat Kantarcioglu, Bhavani M. Thuraisingham: A language for provenance access control. CODASPY 2011:133-144 • Timothy W. Finin, Anupam Joshi, Lalana Kagal, JianweiNiu, Ravi S. Sandhu, William H. Winsborough, Bhavani M. Thuraisingham: ROWLBAC: representing role based access control inOWL. SACMAT 2008:73-82 • Secure Biometrics • http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8110&rep=rep1&type=pdf

  28. Index to Lectures for Exam #2 Lecture 20 – Secure web services Lecture 21 – Trustworthy semantic web Lecture 22 – Secure third party publication Lecture 23 – Secure Cloud Lecture 24 – Assignment #4 Lecture 25 – Data intensive query processing + security Lecture 26 – Attribute aggregation in federated identity Lecture 27 – Secure knowledge management Lecture 28 – Semantic web and social networks Lecture 29 – Security and privacy for social networks Lecture 30 – Virtualization and security Lecture 31 – Secure Dependable data management

  29. Index to Lectures for Exam #2 Lecture 32 - Hadoop/MapReduce Lecture 33 – Digital Forensics / Biometrics Lecture 34 – Cloud-based Assured Information Sharing Lecture 35 – ROWLBAC = RBAC + OWL Lecture 36 – Data Provenance Lecture 37 – Database Vulnerabilities Lecture 38 – Data, Information and Knowledge Management Lecture 39 – Big Data, No-SQL Lecture 40 – Mission Assurance – Building Trusted Applications from Untrusted Systems

  30. Contacts: Instructor • Dr. Bhavani Thuraisingham • Louis Beecherl Distinguished Professor of Computer Science • Executive Director of the Cyber Security Research and Education Institute • Erik Jonsson School of Engineering and Computer Science • The University of Texas at Dallas Richardson, TX 75080 • Phone: 972-883-4738 • Fax: 972-883-2399 • Email: bhavani.thuraisingham@utdallas.edu • URL:http://www.utdallas.edu/~bxt043000/

  31. Contacts: Teaching Assistant • Mohammed Iftekhar • mxi110930@utdallas.eduTeaching AssistantComputer SciencePhD, Computer ScienceErik Jonsson Sch of Engr & Com

More Related