期刊文献+

安全数据库隐私保护和访问控制集成研究 被引量:7

Integrating secure database access control and privacy protection
下载PDF
导出
摘要 数据库数据的合法使用和隐私保护是现代安全数据库系统面临的新挑战。针对目前单方面考虑隐私保护或访问控制技术难以同时满足数据库信息安全和处理性能需求的不足,提出一种集成访问控制和隐私保护技术的安全数据库模型,通过建立查询审计隐私保护模型中的查询可疑性与授权视图访问控制模型中查询有效性之间的关系,形成统一的查询判断方法,并给出多项式时间复杂度的审计算法和集成的安全检查框架,以同时实现数据库系统隐私保护和访问控制的安全功能。 The development of modern information technology and digitalization of the daily lives brings security database new challenges. It is necessary for a security database to provide access control and privacy protection mechanism to ensure the legal use of data and to prevent privacy breach. This paper introduced an integrated security model which could provide the functions of privacy protection and access control simultaneously by building the connection between the validity of query in parameterized authorization view model and the suspiciousness of a conjunctive select-project-join query in online query audit model, it also designed a polynomial time detecting algorithm and two incorporating frameworks for the integrated model to provide higher performance and fine-grained access control in modern database systems.
出处 《计算机应用研究》 CSCD 北大核心 2010年第10期3876-3879,共4页 Application Research of Computers
基金 国家"863"计划资助项目(2007AA01Z448) 安徽省省级高校自然科学研究重(KJ2010A003)
关键词 安全数据库 隐私保护 访问控制 集成 secure database privacy protection access control integration
  • 相关文献

参考文献12

  • 1ARRAWAL R, BAYARDO R, FALOUTSOS C, et al. Auditing compliance with a Hippocratic database[ C ]//Proc of International Conference on Very Large Data Bases. San Fransisco:Morgan Kaufmann, 2004:516- 527.
  • 2LEFEVRE K, AGRAWAL R. Limiting disclosure in Hippocratic databases [ C ]//Proc of International Conference on Very Large Data Bases. San Fransisco : Morgan Kaufmann, 2004 : 108- 119.
  • 3MACHANAVAJJHALA A, GEHRKE J. On the efficiency of checking perfect privacy[ C ]//Proc of ACM Symposium on Principles Database Systems. New York : ACM Press, 2006 : 163- 172.
  • 4MOTWANI R, NABHA S, THOMAS D. Auditing batches of SQL queries[ C ]//Proc of PDM Workshop with ICDE. Washington DC : IEEE Computer Society, 2007 : 186- 191.
  • 5NABAR S, MARTHI B, KENTHAPADI K, et al. Towards robustness in query auditing[C]//Proc of VLDB. New York: ACM Press, 2006:151- 126.
  • 6THOMAS D. Algorithms and architectures for data privacy [ D ]. Standford : Department of Computer Science, Stanford University, 2007.
  • 7严和平,王正飞,汪卫,施伯乐.基于推理的安全数据库审计框架[J].计算机研究与发展,2006,43(9):1630-1638. 被引量:2
  • 8CHAWLA S, DWORK C, MCSHERRY F, et al. Toward privacy in public databases [ C ]//Proc of the 2nd Theory of Cryptography Conference. Berlin : Springer, 2005:363- 385.
  • 9MOTRO A. An access authorization model for relational database based on algebraic manipulation of view definitions[ C ]//Proc of ICDE. Washington DC : IEEE Computer Society, 1989 : 339- 347.
  • 10RIZVI S, MENDELZON A, SUDARHAN S, et al. Extending query rewriting techniques for fine-grained access control[ C ]//Proc of SIGMOD. New York:ACM Press, 2004:551-562.

二级参考文献6

  • 1R Agrawal, J Kieman, R Srikant, et al. Hippocratic databases[C]. The 28th Int'l Conf on Very Large Databases, Hong Kong, 2002
  • 2S Rizvi, A Mendelzon, S Sudarshan, et al. Extending query rewriting techniques for fine-grained access control [C]. ACM SIGMOD 2004, Paris, France, 2004
  • 3R Agrawal, R Bayardo, C Faloutsos, et al. Auditing compliance with a Hippocratic database [C]. The 30th VLDB Conference, Toronto, Canada, 2004
  • 4Y E Lien. On the equivalence of database models [J]. Journal of ACM, 1982, 29(2): 333-362
  • 5J D Ullman, J Widom. A First Course in Database Systems[M]. Englewood Cliffs, NJ: Prentice Hall, 1997
  • 6Tzong-An Su. Gultekin Ozsoyoglu: Controlling FD and MVD inferences in multilevel relational database systems [J]. IEEE Trans on Knowledge and Data Engineering, 1991, 3(4) : 474-485

共引文献1

同被引文献53

引证文献7

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部