E-Book, Englisch, 304 Seiten
Faragallah / El-Rabaie / El-Samie Multilevel Security for Relational Databases
Erscheinungsjahr 2014
ISBN: 978-1-4822-0540-4
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
E-Book, Englisch, 304 Seiten
ISBN: 978-1-4822-0540-4
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Since databases are the primary repositories of information for today’s organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support multilevel security policies in the relational database—illustrating the strengths and weaknesses of each model.
Multilevel Security for Relational Databases covers multilevel database security concepts along with many other multilevel database security models and techniques. It presents a prototype that readers can implement as a tool for conducting performance evaluations to compare multilevel secure database models.
The book supplies a complete view of an encryption-based multilevel security database model that integrates multilevel security for the relational database with a system that encrypts each record with an encryption key according to its security class level. This model will help you utilize an encryption system as a second security layer over the multilevel security layer for the database, reduce the multilevel database size, and improve the response time of data retrieval from the multilevel database.
Considering instance-based multilevel database security, the book covers relational database access controls and examines concurrency control in multilevel database security systems. It includes database encryption algorithms, simulation programs, and Visual studio and Microsoft SQL Server code.
Zielgruppe
Software engineers and researchers working on database security and development.
Autoren/Hrsg.
Weitere Infos & Material
Concepts of Database Security
Database Concepts
Relational Database Security Concepts
Access Control in Relational Databases Discretionary Access Control Mandatory Access Control Role-Based Access Control
Work Objectives
Book Organization
Basic Concept of Multilevel Database Security
Introduction
Multilevel Database Relations
Polyinstantiation Invisible Polyinstantiation Visible Polyinstantiation Types of Polyinstantiation Architectural Considerations in Supporting Polyinstantiation
Multilevel Database Security Models SeaView Model Jajodia–Sandhu Model Smith–Winslett Model MLR Model Belief-Consistent Multilevel Secure Data Model
Performance Study Experimental Database Structure Impact of Varying the Number of Tuples Impact of Varying the Number of Attributes Impact of Varying the Number of Security Levels Analysis of Experimental Results
Summary
Implementation of MLS /DBMS Models
Introduction
SeaView Model Selected Operation Procedure Insert Operation Procedure Update Operation Procedure Delete Operation Procedure
Jajodia–Sandhu Model Select Operation Procedure Insert Operation Procedure Update Operation Procedure Delete Operation Procedure
Smith–Winslett Model Select Operation Procedure Insert Operation Procedure Update Operation Procedure Delete Operation Procedure
Multilevel Relational (MLR) Model Select Operation Procedure Insert Operation Procedure Update Operation Procedure Delete Operation Procedure Uplevel Operation Procedure
Belief-Consistent Multilevel Secure Relational Data Model Basic Procedures for Operations Xview (Label) Procedure Pl (Label) Procedure Sl (Label) Procedure Ib (Label) Procedure Select Operation Procedure Insert Operation Procedure Verify Operation Procedure Update Operation Procedure Delete Operation Procedure
Comparative Study for Multilevel Database Models
Summary
Fundamentals of Information Encryption
Introduction
Basic Concepts of Cryptography Goals of Cryptography Principles of Encryption
Classification of Encryption Algorithms Classification according to Encryption Structure Classification according to Keys Classification according to Percentage of Encrypted Data
Cryptanalysis
Conventional Symmetric Block Ciphers Data Encryption Standard (DES) Double DES Triple DES International Data Encryption Algorithm (IDEA) Blowfish RC5 Algorithm RC5 Encryption Algorithm RC5 Decryption Algorithm RC5 Key Expansion RC6 Algorithm RC6 Encryption Algorithm RC6 Decryption Algorithm The Advanced Encryption Standard (AES)
Modes of Operation The ECB Mode The CBC Mode The CFB Mode The OFB Mode
Encryption-Based Multilevel Model for DBMS
Introduction
The Encryption-Based Multilevel Database Model
Manipulation The INSERT Statement The DELETE Statement The SELECT Statement The UPDATE Statement The UPLEVEL Statement
Performance Study Experimental Database Structure SELECT Query Impact of Varying the Number of Tuples Impact of Varying the Number of Attributes Impact of Varying the Number of Security Levels JOIN Query Impact of Varying the Number of Tuples Impact of Varying the Number of Attributes Impact of Varying the Number of Security Levels UPDATE Query
Analysis of Experimental Results
Summary
Formal Analysis for Encryption-Based Multilevel Model for DBMS
Introduction
The Encryption-Based Multilevel Model for DBMS Definition MLR Model Definition Encryption-Based Multilevel Model for DBMS Definition
Integrity Properties Entity Integrity Polyinstantiation Integrity Data-Borrow Integrity Foreign Key Integrity Referential Integrity
Manipulation The INSERT Statement The DELETE Statement The SELECT Statement The UPDATE Statement The UPLEVEL Statement
Soundness Case 1: In the INSERT Operation Case 2: In the DELETE Operation Case 3: In the UPDATE Operation Case 4: In the UPLEVEL Operation
Completeness
Security
Summary
Concurrency Control in Multilevel Relational Databases
Introduction
Related Work
Enhanced Secure Multiversion Concurrency Control Model
Performance Evaluation Workload Model System Model Experiments and Results
Correctness of the Enhanced Secure Multiversion Concurrency Control Model Proof of Correctness
Summary
The Instance-Based Multilevel Security Model
Introduction
The Instance-Based Multilevel Security Model (IBMSM) Definition 1: The Property View Definition 2: The Class View Definition 3: The Instance View at Classification Level Lj
The Advant address of IBMSM
The Select Operation Procedure of the IBMSM
Insert Operation Procedure of the IBMSM
The Update Operation Procedure of the IBMSM
The Delete Operation Procedure of the IBMSM
Comparative Study for Polyinstantiation Models
Summary
The Source Code
Introduction
Screen Shots of the Prototype
Source Code of the Microsoft SQL Server Source Code of the Data Security Classification Level Tables Source Code of the User Security Classification Levels Source Code of the Modifications to the Base Table Source Code of the View for Each Model of the Multilevel Relational Database Models
Source Code of the Microsoft Visual Studio C# Source Code of the Classes Source Code of the Login Form Source Code of the Queries Form Source Code of the Query Form Source Code of the Concurrency
Control Form
References
Index




