![Page 1: Distributed database security with discretionary access control](https://reader035.vdocuments.net/reader035/viewer/2022081716/5476e5d9b4af9fdf448b469c/html5/thumbnails/1.jpg)
Database Security using Discretionary Access Control
BySumitro Bhaumik – 000911001011Jyotishkar Dey – 000911001036
![Page 2: Distributed database security with discretionary access control](https://reader035.vdocuments.net/reader035/viewer/2022081716/5476e5d9b4af9fdf448b469c/html5/thumbnails/2.jpg)
What is Discretionary Access Control in a database?
A new paradigm of database
security which assigns different
security levels to users and as well
as attributes depending upon some
security policies as per requirement
![Page 3: Distributed database security with discretionary access control](https://reader035.vdocuments.net/reader035/viewer/2022081716/5476e5d9b4af9fdf448b469c/html5/thumbnails/3.jpg)
A Traditional Database
![Page 4: Distributed database security with discretionary access control](https://reader035.vdocuments.net/reader035/viewer/2022081716/5476e5d9b4af9fdf448b469c/html5/thumbnails/4.jpg)
Why do we need it?•Conventional database security does not provide
“granular security”
•You either have access or have no access to a database
•But items in a database are of different types, need
different security
•One “easy” solution; keep items of same security levels
in different tables
Problems
•Conflict with relational dependencies
•Increased complexity in order to preserve both
relational dependencies and security dependencies
![Page 5: Distributed database security with discretionary access control](https://reader035.vdocuments.net/reader035/viewer/2022081716/5476e5d9b4af9fdf448b469c/html5/thumbnails/5.jpg)
Solution!
“Multi-level Security System”Users of a particular security level can only access
elements in a database which correspond to his/her
security level
This way, sensitive data in the same database will be
hidden, while still allowing the public to access the central
database
![Page 6: Distributed database security with discretionary access control](https://reader035.vdocuments.net/reader035/viewer/2022081716/5476e5d9b4af9fdf448b469c/html5/thumbnails/6.jpg)
![Page 7: Distributed database security with discretionary access control](https://reader035.vdocuments.net/reader035/viewer/2022081716/5476e5d9b4af9fdf448b469c/html5/thumbnails/7.jpg)
Working PrincipleThe Bell-LaPadula Model
This model focuses on data confidentiality and
controlled access to classified information. In this
formal model, the entities in an information system are
divided into subjects and objects. The Bell–LaPadula is
built on the concept of a state machine with a set of
allowable “secure states”. The notion of a "secure state"
is defined, and it is proven that each state transition
preserves security by moving from secure state to
secure state. This inductively proves that the system
satisfies the security objectives of the model
![Page 8: Distributed database security with discretionary access control](https://reader035.vdocuments.net/reader035/viewer/2022081716/5476e5d9b4af9fdf448b469c/html5/thumbnails/8.jpg)
The Bell-LaPadula ModelThe Bell–LaPadula model defines a “secure state”
through three multilevel properties
• The Simple Security Property (ss Property)
• The * (star) Security Property
• The Discretionary Security Property
Working Principle
![Page 9: Distributed database security with discretionary access control](https://reader035.vdocuments.net/reader035/viewer/2022081716/5476e5d9b4af9fdf448b469c/html5/thumbnails/9.jpg)
Working Principle
The Simple Security Property
This policy requires a subject of lower security level
cannot read from an object of higher security level, that
is, no “read-up”
![Page 10: Distributed database security with discretionary access control](https://reader035.vdocuments.net/reader035/viewer/2022081716/5476e5d9b4af9fdf448b469c/html5/thumbnails/10.jpg)
Working Principle
The * (Star) Security Property
This policy requires a subject of higher security level
not to write on an object of lower security level, that is,
no “write down”
![Page 11: Distributed database security with discretionary access control](https://reader035.vdocuments.net/reader035/viewer/2022081716/5476e5d9b4af9fdf448b469c/html5/thumbnails/11.jpg)
Working Principle
The Discretionary Security
Property
This policy does not require any hard and fast rule.
A security mapping is created between subjects and
objects which indicates which subject can read and
write into which object.
![Page 12: Distributed database security with discretionary access control](https://reader035.vdocuments.net/reader035/viewer/2022081716/5476e5d9b4af9fdf448b469c/html5/thumbnails/12.jpg)
A sample FSA of the Bell-LaPadula Model
![Page 13: Distributed database security with discretionary access control](https://reader035.vdocuments.net/reader035/viewer/2022081716/5476e5d9b4af9fdf448b469c/html5/thumbnails/13.jpg)
Steps Followed To Design a Secure Database
1. Identification of subjects, objects and permitted
actions (identification process)
1. Identification of the subjects
2. Identification of the objects
2. Assignment of security labels (labeling process)
1. Assignment of security labels to the subjects
2. Assignment of security labels to the objects
![Page 14: Distributed database security with discretionary access control](https://reader035.vdocuments.net/reader035/viewer/2022081716/5476e5d9b4af9fdf448b469c/html5/thumbnails/14.jpg)
Identification of subjects Identification of objects
Labeling of subjects
Labeling of objects
![Page 15: Distributed database security with discretionary access control](https://reader035.vdocuments.net/reader035/viewer/2022081716/5476e5d9b4af9fdf448b469c/html5/thumbnails/15.jpg)
Pros & ConsPros• Gives finer control over the security of the database
• Attributes do not loose their functional dependency
• No need to change original database to implement this
feature; transparent. Hence, very easy to mobilize the
technology
• There needs to be only one global database which
users can use, without any fear of leakage of sensitive
data. No need to create a separate database for
different security levels
![Page 16: Distributed database security with discretionary access control](https://reader035.vdocuments.net/reader035/viewer/2022081716/5476e5d9b4af9fdf448b469c/html5/thumbnails/16.jpg)
Cons• For every query, the security level of every element
needs to be checked with the security level of the user.
Hence, the process is a bit slow
• Care has to be taken for some special conditions which
might arise during “write up” operations
Pros & Cons
![Page 17: Distributed database security with discretionary access control](https://reader035.vdocuments.net/reader035/viewer/2022081716/5476e5d9b4af9fdf448b469c/html5/thumbnails/17.jpg)
Area of Use• Banking• Defense• Office• Public/Private database
![Page 18: Distributed database security with discretionary access control](https://reader035.vdocuments.net/reader035/viewer/2022081716/5476e5d9b4af9fdf448b469c/html5/thumbnails/18.jpg)
Thank You!