Enforcement of Purpose Based Access Control within Relational Database Management Systems

被引:15
作者
Colombo, Pietro [1 ]
Ferrari, Elena [1 ]
机构
[1] Univ Insubria, Dipartimento Sci Teor & Appl, Varese, Italy
关键词
Privacy policies; enforcement; monitor; relational database management systems; aspect oriented programming; model driven engineering; SECURITY;
D O I
10.1109/TKDE.2014.2312112
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy is becoming a key requirement for ICT applications that handle personal data. However, Database Management Systems (DBMSs), which are devoted to data collection and processing by definition, still do not provide the proper support for privacy policies. Policies are enforced by ad-hoc programmed software modules that complement DBMS access control services. This practice is time consuming, error prone, and neither general nor scalable. This work does a first step to overcome these limits. We propose a systematic approach to the automatic development of a monitor that regulates the execution of SQL queries based on purpose based privacy policies. The proposed solution does not require programming, it is general, platform independent and usable with most of the existing relational DBMSs.
引用
收藏
页码:2703 / 2716
页数:14
相关论文
共 24 条
[1]  
Agrawal R., 2002, Proceedings of the Twenty-eighth International Conference on Very Large Data Bases, P143
[2]   Model Driven Security: From UML models to access control infrastructures [J].
Basin, D ;
Doser, J ;
Lodderstedt, T .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2006, 15 (01) :39-91
[3]  
Bonchi F., 2013, EUROPEAN DATA PROTEC
[4]  
Bonchi F., 2009, PRIVACY AWARE KNOWLE
[5]   Purpose based access control for privacy protection in relational database systems [J].
Byun, Ji-Won ;
Li, Ninghui .
VLDB JOURNAL, 2008, 17 (04) :603-619
[6]  
Colombo P., 2012, P IEEE 6 INT C DIG E, P1
[7]   Towards a Modeling and Analysis Framework for Privacy-aware Systems [J].
Colombo, Pietro ;
Ferrari, Elena .
PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012), 2012, :81-90
[8]   A Systematic Survey of Program Comprehension through Dynamic Analysis [J].
Cornelissen, Bas ;
Zaidman, Andy ;
van Deursen, Arie ;
Moonen, Leon ;
Koschke, Rainer .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2009, 35 (05) :684-702
[9]   Feature-based survey of model transformation approaches [J].
Czarnecki, K. ;
Helsen, S. .
IBM SYSTEMS JOURNAL, 2006, 45 (03) :621-645
[10]   Noninterference Through Secure Multi-Execution [J].
Devriese, Dominique ;
Piessens, Frank .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :109-124