Abstract
Addressing security demands under fixed budgets and tight time constraints are becoming extremely challenging, time consuming and resource intensive. Moreover, securing the distributed database in compliance with several security guidelines makes the system more complex. Mission critical systems, military, government and financial institutions have been under tremendous pressure to secure their databases. Such requirements mandate that each system passes a strict security scan before it is deemed suitable to go into operational mode. This paper presents a framework that embeds security capabilities into distributed database by replicating different predefined security policies at different sites using multilevel secure database management system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bonatti, P.A., Kraus, S., Subrahmanian, V.S.: Foundations of Secure Deductive Databases. IEEE Transactions on Knowledge and Data Engineering 7(3), 406–422 (1995)
Zubi, Z.S.: On Distributed Database Security Aspect. In: International Conference on Multimedia Computing and Systems, pp. 231–235. IEEE, Los Alamitos (2009)
Kaur, N., Singh, R., Sarje, A.K., Misra, M.: Performance Evaluation of Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database systems. In: ITCC 2005, vol. 01, pp. 249–254. IEEE, Los Alamitos (2005)
Wang, H., Dang, D., Min, S.: The Analysis of the Security Strategy of Embedded Mobile Database, pp. 476–478. IEEE, Los Alamitos (2010)
Lin, M.: Static Security Optimization for Real-Time Systems. IEEE Transactions on Industrial Informatics 5(1), 22–37 (2009)
Veluchandhar, J.: A backup mechanism with concurrency control for multilevel secure distributed database systems, pp. 57–62. IEEE, Los Alamitos (2008)
Pan, L.: A unified network security and fine-grained database access control model, pp. 265–269. IEEE, Los Alamitos (2009)
Son, S.H., Chaney, C., Thomlinson, N.P.: Partial security policies to support timeliness in secure real-time databases. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 136–147 (1998)
Thuraisingham, B.: Multilevel Security Issues in Distributed Database Management Systems II. Journal of Computers and Security 10(9), 727–747 (1991)
Ghorbanzadeh, P., Shaddeli, A., Malekzadeh, R., Jahanbakhsh, Z.: A Survey of Mobile Database Security Threats and Solutions for It. In: ICIS 2010, pp. 676–682 (2010)
Bertino, E., Sandhu, R.: Database Security—Concepts, Approaches, and Challenges. IEEE Transactions on Dependable and Secure Computing 2(1), 2–18 (2005)
Cirio, L., Cruz, I.F., Tamassia, R.: A role and attribute based access control system using semantic web technologies. In: Chung, S., Herrero, P. (eds.) OTM-WS 2007, Part II. LNCS, vol. 4806, pp. 1256–1266. Springer, Heidelberg (2007)
Jorns, O., Quirchmayr, G., Jung, O.: A Privacy Enhancing mechanism based on Pseudonyms for Identity Protection in Location-Based Services. In: Brankovic, L., Steketee, C. (eds.) Proc. Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), Ballarat, Australia. CRPIT, vol. 68, pp. 133–142 (2007)
Thuraisingham, B., Ford, W.: Security Constraint Processing in a multilevel Secure Distributed Database Management System. IEEE Transactions on Knowledge and Data Engineering 1(2), 274–293 (1995)
Tadano, K., Kawato, M., Machida, F., Maeno, Y.: Resource Information Cache Update Control for Scalable Access Control Management Systems. In: IEEE 3rd International Conference on Cloud Computing, pp. 538–539 (2010)
Ray, I., Mancini, L.V., Jajodia, S., Bertino, E.: ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. IEEE Transactions on Knowledge and Data Engineering 12(6), 880–899 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Batra, N., Singh, M. (2011). Multilevel Policy Based Security in Distributed Database. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 190. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22709-7_56
Download citation
DOI: https://doi.org/10.1007/978-3-642-22709-7_56
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22708-0
Online ISBN: 978-3-642-22709-7
eBook Packages: Computer ScienceComputer Science (R0)