Secure databases: Constraints, inference channels, and monitoring disclosures

被引:74
作者
Brodsky, A [1 ]
Farkas, C
Jajodia, S
机构
[1] Univ S Carolina, Dept Comp Engn & Sci, Columbia, SC 29212 USA
[2] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
[3] George Mason Univ, Dept Informat & Software Engn, Fairfax, VA 22030 USA
关键词
multilevel security; data confidentiality; inference problem; constraints; data-dependent disclosure; data-independent disclosure; inference algorithms; soundness; completeness; decidability;
D O I
10.1109/69.895801
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper investigates the problem of inference channels that occur when database constraints are combined with nonsensitive data to obtain sensitive information. We present an integrated security mechanism, called the Disclosure Monitor, which guarantees data confidentiality by extending the standard mandatory access control mechanism with a Disclosure Inference Engine. The Disclosure Inference Engine generated all the information that can be disclosed to a user based on the user's past and present queries and the database and metadata constraints. The Disclosure Inference Engine operates in two modes:data-dependent mode, when disclosure is established based on the actual data items, and data-independent mode, when only queries are utilized to generate the disclosed information. The disclosure inference algorithms for both modes are characterized by the properties of soundness (i.e., everything that is generated by the algorithm is disclosed) and completeness (i.e,, everything that can be disclosed is produced by the algorithm). The technical core of this paper concentrates on the development of sound and complete algorithms for both data-dependent and data-independent disclosures.
引用
收藏
页码:900 / 919
页数:20
相关论文
共 20 条
[1]  
BRODSKY A, 2000, DATA DISCLOSURE INFE
[2]  
Buczkowski L. J., 1990, DATABASE SECURITY, VIII, P311
[3]  
DAWSON S, 1999, P IEEE S SEC PRIV
[4]  
DAWSONS, 1999, P 18 ACM SIGMOD SIGA, P114
[5]  
Denning D. E., 1985, Proceedings of the 1985 Symposium on Security and Privacy (Cat. No. 85CH2150-1), P134
[6]  
Goguen J. A., 1984, Proceedings of the 1984 Symposium on Security and Privacy, P75
[7]  
Hinke T. H., 1988, Proceedings of the 1988 IEEE Symposium on Security and Privacy (Cat. No.88CH2558-5), P96, DOI 10.1109/SECPRI.1988.8101
[8]  
Hinke T.H., 1995, J COMPUTER SECURITY, V3, P147
[9]   Inference in MLS database systems [J].
Marks, DG .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 1996, 8 (01) :46-55
[10]  
MARKS DG, 1996, P EUR S RES COMP SEC, P290