Skip to main content

Multilevel Policy Based Security in Distributed Database

  • Conference paper
Advances in Computing and Communications (ACC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 190))

Included in the following conference series:

  • 1854 Accesses

Abstract

Addressing security demands under fixed budgets and tight time constraints are becoming extremely challenging, time consuming and resource intensive. Moreover, securing the distributed database in compliance with several security guidelines makes the system more complex. Mission critical systems, military, government and financial institutions have been under tremendous pressure to secure their databases. Such requirements mandate that each system passes a strict security scan before it is deemed suitable to go into operational mode. This paper presents a framework that embeds security capabilities into distributed database by replicating different predefined security policies at different sites using multilevel secure database management system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bonatti, P.A., Kraus, S., Subrahmanian, V.S.: Foundations of Secure Deductive Databases. IEEE Transactions on Knowledge and Data Engineering 7(3), 406–422 (1995)

    Article  Google Scholar 

  2. Zubi, Z.S.: On Distributed Database Security Aspect. In: International Conference on Multimedia Computing and Systems, pp. 231–235. IEEE, Los Alamitos (2009)

    Google Scholar 

  3. Kaur, N., Singh, R., Sarje, A.K., Misra, M.: Performance Evaluation of Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database systems. In: ITCC 2005, vol. 01, pp. 249–254. IEEE, Los Alamitos (2005)

    Google Scholar 

  4. Wang, H., Dang, D., Min, S.: The Analysis of the Security Strategy of Embedded Mobile Database, pp. 476–478. IEEE, Los Alamitos (2010)

    Google Scholar 

  5. Lin, M.: Static Security Optimization for Real-Time Systems. IEEE Transactions on Industrial Informatics 5(1), 22–37 (2009)

    Article  Google Scholar 

  6. Veluchandhar, J.: A backup mechanism with concurrency control for multilevel secure distributed database systems, pp. 57–62. IEEE, Los Alamitos (2008)

    Google Scholar 

  7. Pan, L.: A unified network security and fine-grained database access control model, pp. 265–269. IEEE, Los Alamitos (2009)

    Google Scholar 

  8. Son, S.H., Chaney, C., Thomlinson, N.P.: Partial security policies to support timeliness in secure real-time databases. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 136–147 (1998)

    Google Scholar 

  9. Thuraisingham, B.: Multilevel Security Issues in Distributed Database Management Systems II. Journal of Computers and Security 10(9), 727–747 (1991)

    Article  Google Scholar 

  10. Ghorbanzadeh, P., Shaddeli, A., Malekzadeh, R., Jahanbakhsh, Z.: A Survey of Mobile Database Security Threats and Solutions for It. In: ICIS 2010, pp. 676–682 (2010)

    Google Scholar 

  11. Bertino, E., Sandhu, R.: Database Security—Concepts, Approaches, and Challenges. IEEE Transactions on Dependable and Secure Computing 2(1), 2–18 (2005)

    Article  Google Scholar 

  12. Cirio, L., Cruz, I.F., Tamassia, R.: A role and attribute based access control system using semantic web technologies. In: Chung, S., Herrero, P. (eds.) OTM-WS 2007, Part II. LNCS, vol. 4806, pp. 1256–1266. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  13. Jorns, O., Quirchmayr, G., Jung, O.: A Privacy Enhancing mechanism based on Pseudonyms for Identity Protection in Location-Based Services. In: Brankovic, L., Steketee, C. (eds.) Proc. Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), Ballarat, Australia. CRPIT, vol. 68, pp. 133–142 (2007)

    Google Scholar 

  14. Thuraisingham, B., Ford, W.: Security Constraint Processing in a multilevel Secure Distributed Database Management System. IEEE Transactions on Knowledge and Data Engineering 1(2), 274–293 (1995)

    Article  Google Scholar 

  15. Tadano, K., Kawato, M., Machida, F., Maeno, Y.: Resource Information Cache Update Control for Scalable Access Control Management Systems. In: IEEE 3rd International Conference on Cloud Computing, pp. 538–539 (2010)

    Google Scholar 

  16. Ray, I., Mancini, L.V., Jajodia, S., Bertino, E.: ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. IEEE Transactions on Knowledge and Data Engineering 12(6), 880–899 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Batra, N., Singh, M. (2011). Multilevel Policy Based Security in Distributed Database. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 190. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22709-7_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22709-7_56

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22708-0

  • Online ISBN: 978-3-642-22709-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics