skip to main content
10.1145/1007568.1007631acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
Article

Extending query rewriting techniques for fine-grained access control

Published:13 June 2004Publication History

ABSTRACT

Current day database applications, with large numbers of users, require fine-grained access control mechanisms, at the level of individual tuples, not just entire relations/views, to control which parts of the data can be accessed by each user. Fine-grained access control is often enforced in the application code, which has numerous drawbacks; these can be avoided by specifying/enforcing access control at the database level. We present a novel fine-grained access control model based on authorization views that allows "authorization-transparent" querying; that is, user queries can be phrased in terms of the database relations, and are valid if they can be answered using only the information contained in these authorization views. We extend earlier work on authorization-transparent querying by introducing a new notion of validity, conditional validity. We give a powerful set of inference rules to check for query validity. We demonstrate the practicality of our techniques by describing how an existing query optimizer can be extended to perform access control checks by incorporating these inference rules.

References

  1. The Virtual Private Database in Oracle9ir2: An Oracle Technical White Paper http://otn.oracle.com/deploy/security/oracle9ir2/pdf/vpd9ir2twp.pdf.Google ScholarGoogle Scholar
  2. G.-J. Ahn and R. Sandhu. Role-based authorization constraints specification. ACM Trans. on Information and System Security, 3(4), November 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Bello, K. Dias, A. Downing. J. Feenan, J. Finnerty, W. Norcott, H. Sun, A. Witkowski, and M. Ziauddin. Materialized views in ORACLE. In VLDB Conf., pages 659--664, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Brodsky, C. Farkas, and S. Jajodia. Secure databases: Constraints, inference channels, and monitoring disclosures. IEEE Trans. on Knowl. and Data Engg., 12(96):900--919, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Castano, M. Fugini, G. Martella, and P. Samarati. Database Security. Addison-Wesley, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Chaudhuri, R. Krishnamurthy, S. Potamianos, and K. Shim. Optimizing queries with materialized views. In ICDE, pages 190--200, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Chaudhuri and M. Vardi. Optimizing real conjuctive queries. In PODS, pages 59--70, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. V. Cohen, W. Nutt, and A. Serebrenik. Rewriting aggregate queries using views. In PODS, pages 155--166, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Denning. Commutative filters for reducing inference threats in multilevel database systems. In IEEE Symp. on Security and Privacy, pages 134--146, 1985.Google ScholarGoogle ScholarCross RefCross Ref
  10. C. Farkas and S. Jajodia. The inference problem: A survey. SIGKDD Explorations, 4(2), Mar. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. V. Gligor. Characteristics of role-based access control. In ACM Symp. on Access Control Models and Technologies, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Goldstein and P. Larson. Optimizing queries using materialized views: a practical, scalable solution. In SIGMOD Conf., pages 331--342, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. Graefe and W. J. McKenna. The Volcano optimizer generator: Extensibility and efficient search. In ICDE, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Gupta, V. Harinarayan, and D. Quass. Aggregate-query processing in data warehousing environments. In VLDB Conf., pages 358--369, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Halevy. Answering queries using views: A survey. The VLDB Journal, 10(4):270--294, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. A. Harrison, M. L. Ruzzo, and J. D. Ullman. Protection in operating systems. Communication of the ACM, 19(8) (Pages 461--471), August 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Jajodia, P. Samarati, M. Sapino, and V. Subrahmaniam. Flexible support for multiple access control policies. ACM Trans. on Database Systems, 26(4), June 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Jajodia and R. Sandhu. Towards a multilevel secure relational data model. In SIGMOD Conf., pages 50--59, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Jajodia and D. Wijesekera. Recent advances in access control models. In IFIP Working Conference on Database and Application Security (DBSec), 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Motro. An access authorization model for relational databases based on algebraic manipulation of view definitions. In ICDE, pages 339--347, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Motro. Panorama: A database system that annotates its answers to queries with their properties. Journal of Intelligent Information Systems, 7(1):51--73, Sept. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Rosenthal and E. Sciore. View security as the basis for data warehouse security. In Intl. Workshop on Design and Management of Data Warehouses (DMDW), 2000.Google ScholarGoogle Scholar
  23. A. Rosenthal and E. Sciore. Administering permissions for distributed data: Factoring and automated inference. In IFIP 11.3 Working Conf. in Database Security, 2001.Google ScholarGoogle Scholar
  24. A. Rosenthal, E. Sciore, and V. Doshi. Security administration for federations, warehouses, and other derived data. In IFIP WG11.3 Conf. on Database Security, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. P. Roy, S. Seshadri, S. Sudarshan, and S. Bhobe. Efficient and extensible algorithms for multi query optimization. In SIGMOD Conf., pages 249--260, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. D. Srivastava, S. Dar, H. V. Jagadish, and A. Y. Levy. Answering queries with aggregation using views. In VLDB Conf., pages 318--329, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. R. Yerneni, C. Li, H. Garcia-Molina, and J. D. Ullman. Computing capabilities of mediators. In SIGMOD Conf., pages 443--454, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. M. Zaharioudakis, R. Cochrane, G. Lapis, H. Pirahesh, and M. Urata. Answering complex sql queries using automatic summary tables. In SIGMOD Conf., pages 105--116, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Extending query rewriting techniques for fine-grained access control

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference on Management of data
          June 2004
          988 pages
          ISBN:1581138598
          DOI:10.1145/1007568

          Copyright © 2004 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 13 June 2004

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate785of4,003submissions,20%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader