Skip to main content

Detecting, Monitoring and Preventing Database Security Breaches in a Housing-Based Outsourcing Model

  • Conference paper
  • First Online:
Modeling, Simulation and Optimization of Complex Processes

Abstract

In a housing-based outsourcing model, the database server is the client’s property and the outsourcing service provider only provides physical security of machines and data, and monitors (and if necessary restores) the operating condition of the server. Soft security-related aspects (e.g., DBMS security breaches) are the client’s responsibility. This is a non-trivial task for most of the clients.In this paper, we propose an extensible architecture for detecting, monitoring and preventing database security breaches in a housing-based outsourcing model. The architecture can help in dealing with both outsider and insider threats. It is well suited for the detection of both predefined and potential security breaches. Our solution to the database security breach detection is based on the well-known pentesting- and version checking-based techniques in network and operation systems security. The architecture features visual monitoring and secure auditing w.r.t. all database user activities in real time. Moreover, it also supports automatic prevention techniques if security risks are established w.r.t. the found security breaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Ashish, K., Evimaria, K., Elisa, B.: Detecting Anomalous Access Patterns in Relational Databases. VLDB Journal, 17(5), 1063–1077 (2008)

    Article  Google Scholar 

  2. The Bundesamt für Sicherheit in der Informationstechnik: Study: A Penetration Testing Model, URL: (2003)

    Google Scholar 

  3. Dang, T.K., Nguyen, T.S.: Providing Query Assurance for Outsourced Tree-Indexed Data. HPSC2006, Hanoi, Vietnam, pp. 207–224 (2008)

    Google Scholar 

  4. Dang, T.K.: Ensuring Correctness, Completeness and Freshness for Outsourced Tree-Indexed Data. IRMJ, Idea Group, 21(1), 59–76 (2008)

    MathSciNet  Google Scholar 

  5. Dang, T.K., Truong, Q.C., Cu-Nguyen, P.H., Tran, T.Q.N.: An Extensible Framework for Detecting Database Security Flaws. ACOMP2008, Vietnam, pp. 68–77 (2008)

    Google Scholar 

  6. Dang, T.K., Tran, T.Q.N., Truong, Q.C.: Security Issues in Housing Service Outsourcing Model with Database Systems. ASIS LAB, ASIS-TR-0017/2009, URL: (2009)

    Google Scholar 

  7. Geer, D., Harthorne, J.: Penetration testing: a duet. Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, USA, pp. 185–198 (2002)

    Google Scholar 

  8. Handscombe, K.: Continuous Auditing From A Practical Perspective. Information Systems Control Journal, 2 (2007)

    Google Scholar 

  9. Huynh, V.Q.P, Dang, T.K: eM2: An Efficient Member Migration Algorithm for Ensuring k-Anonymity and Mitigating Information Loss. VLDB Workshop on Secure Data Management, LNCS, Springer Verlag, Singapore, pp. 26–40 (2010)

    Google Scholar 

  10. Natan, R.B.: Implementing Database Security and Auditing. Elsevier Digital Press (2005)

    Google Scholar 

  11. Qiang, L.: Defense In-Depth to Achieve Unbreakable Database Security. ICITA2004, China, pp. 386–390 (2004)

    Google Scholar 

  12. Raffael, M.: Applied Security Visualization. Addison-Wesley (2008)

    Google Scholar 

  13. Rich, M.: Understanding and Selecting a Database Activity Monitoring Solution. URL: (2008)

    Google Scholar 

  14. Surajit, C., Arnd, C., Koenig, V.N.: SQLCM: A Continuous Monitoring Framework for Relational Database Engines. ICDE2004, USA, pp. 473–485 (2004)

    Google Scholar 

  15. Tran, T.Q.N., Dang, T.K.: Towards Side-Effects-free Database Penetration Testing. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 1(1), 72–85 (2010)

    Google Scholar 

  16. Varun, C., Arindam B., Vipin K.: Anomaly Detection: A Survey. ACM Computing Surveys (CSUR), 41(3), article 15 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tran Khanh Dang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dang, T.K., Nguyet, T.T.Q., Chi, T.Q. (2012). Detecting, Monitoring and Preventing Database Security Breaches in a Housing-Based Outsourcing Model. In: Bock, H., Hoang, X., Rannacher, R., Schlöder, J. (eds) Modeling, Simulation and Optimization of Complex Processes. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25707-0_7

Download citation

Publish with us

Policies and ethics