Abstract
With the increased need of data sharing among multiple organizations, such as government organizations, financial corporations, medical hospitals and academic institutions, it is critical to ensure data integrity so that effective decisions can be made based on these data. In this paper, we first present an architecture for a comprehensive integrity control system based on data validation and metadata management. We then discuss an important issue in the data validation, that is, the evaluation of data provenance and propose a trust model for estimating the trustworthiness of data and data providers. By taking into account confidence about data provenance, we introduce an approach for policy observing query evaluation as a complement to the integrity control system.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abiteboul, S., Kanellakis, P., Grahne, G.: On the representation and querying of sets of possible words. Theoretical Computer Science 78(1) (1991)
Barbará, D., Garcia-Molina, H., Porter, D.: The management of probabilistic data. IEEE Transactions on Knowledge and Data Engineering 4(5), 487–502 (1992)
Batini, C., Scannapieco, M.: Data quality: Concepts, methodologies and techniques. Springer, Heidelberg (2006)
Bertino, E., Sandhu, R.: Database security - concepts, approaches, and challenges. IEEE Transaction on dependable and secure computing 2(1), 2–19 (2005)
Biba, K.: Integrity considerations for secure computer systems. Technical Report TR-3153, Mitre (1977)
Byun, J.-B., Sohn, Y., Bertino, E.: Systematic control and management of data integrity. In: Proceedings of the 11th ACM symposium on Access control models and technologies, pp. 101–110 (2006)
Clark, D., Wilson, D.: A comparison of commercial and military computer security policies. In: Proceedings of IEEE Symposium on Security and Privacy (1987)
Dai, C., Lin, D., Bertino, E., Kantarcioglu, M.: Trust evaluation of data provenance. In: CERIAS Technical Report (2008)
Dai, C., Lin, D., Kantarcioglu, M., Bertino, E., Celikel, E., Thuraisingham, B.: Policy observing query evaluation based on provenance confidence and lineage propagation (under preparation, 2008)
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224–274 (2001)
Fuhr, N.: A probabilistic framework for vague queries and imprecise information in databases. In: Proc. VLDB, pp. 696–707 (1990)
Fuhr, N., Rölleke, T.: A probabilistic relational algebra for the integration of information retrieval and database systems. ACM Transactions on Information Systems 15(1), 32–66 (1997)
Green, T.J., Tannen, V.: Models for incomplete and probabilistic information. In: Proc. IIDB Workshop (2006)
Ni, Q., Trombetta, A., Bertino, E., Lobo, J.: Privcy aware role based access control. In: Proceedings of the 12th ACM symposium on Access control models and technologies (2007)
Sandhu, R.: On five definitions of data integrity. In: Proceedings of the IFIP WG11.3 Workshop on Database Security (1993)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38–47 (1996)
Sarma, A.D., Benjelloun, O., Halevy, A., Widom, J.: Working models for uncertain data. In: Proc. ICDE, page 7
Sarma, A.D., Theobal, M., Widom, J.: Exploiting lineage for confidence computation in uncertain and probabilistic databases. Technical Report, Stanford InfoLab (2007)
Simmhan, Y.L., Plale, B., Gannon, D.: A survey of data provenance in e-science. SIGMOD Record 34(3), 31–36 (2005)
Widom, J.: Trio: A system for integrated management of data, accuracy, and lineage. In: Proc. CIDR, pp. 262–276 (2005)
Yin, X., Han, J., Yu, P.S.: Truth discovery with multiple conflicting information providers on the web. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2007), pp. 1048–1052 (2007)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bertino, E., Dai, C., Lim, HS., Lin, D. (2008). High-Assurance Integrity Techniques for Databases. In: Gray, A., Jeffery, K., Shao, J. (eds) Sharing Data, Information and Knowledge. BNCOD 2008. Lecture Notes in Computer Science, vol 5071. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70504-8_26
Download citation
DOI: https://doi.org/10.1007/978-3-540-70504-8_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-70503-1
Online ISBN: 978-3-540-70504-8
eBook Packages: Computer ScienceComputer Science (R0)