330 likes | 352 Views
CSCE 824. Secure (and Distributed) Database Management Systems. Course Aim. Advanced understanding of DBMS concepts From relation to un- and semi-structured data models New type of applications Security needs. Reference Materials. Recommended :
E N D
CSCE 824 Secure (and Distributed) Database Management Systems CSCE 824
Course Aim • Advanced understanding of DBMS concepts • From relation to un- and semi-structured data models • New type of applications • Security needs CSCE 824
Reference Materials • Recommended: • T. Ozsu and P. Valduriez, Principles of Distributed Database Systems, Springer; 3rd Edition. edition (March 2, 2011), ISBN-10: 1441988335 • M. Gertz, S. Jajodia, Handbook of database security: applications and trend, Springer 2008 • Online materials CSCE 824
Conference Proceedings and Journals • Proceedings of Secure Data Management Workshop, links: 2012 http://www.hitech-projects.com/sdm-workshop/sdm12.html , 2011 http://www.hitech-projects.com/sdm-workshop/sdm11.html • Proceedings of IFIP WG 11.3 Data and Application Security and Privacy, links: 2012 http://conferences.telecom-bretagne.eu/dbsec2012/ , 2011 http://www.egr.vcu.edu/dbsec2011/ • Proceedings of International Conference of Very Large Databases (VLDB), links: 2012 http://www.vldb2012.org/ , 2011 http://www.vldb.org/2011/ CSCE 824
Journals and Books • IEEE Transactions on Knowledge and Data Engineering (TKDE) • ACM Transactions on Information and System Security (TISSEC) • M. Gertz, S. Jajodia, Handbook of database security: applications and trend, Springer 2008 CSCE 824
Challenge • Research project: there will be one group research project. Students must present the related work and their results to the class in the last lectures of the semester. • Homework assignments. There will be several homework exercises and reading for the lectures. • Tests: there will be two tests covering the course materials. Both tests are open book, in-class tests. CSCE 824
Grading • Research project: 35%, Test 1 : 20%, Test 2: 25%, Homework assignment: 20% • 90 < A; 87 < B+ <= 90; 80 < B <= 87; 76 < C+ <=80; 65 < C <= 76; 60 < D+ <= 65; 50 <D <= 60 CSCE 824
Topics Covered • Weeks 1-5: Distributed and Non-traditional Databases • Weeks 6-11: Database Security • Weeks 12-15: Student Presentations CSCE 824
IA Specialization • Graduate level • Core Requirement (3 Hours) • CSCE 522: Information Security Principles (3 credits) – meets CNSS 4011 standard • Additional Requirements: • Elective IA course (3 credit) • 2nd elective course (3 credits) or 500-level or above CSCE course with IA project component
CNSS Certifications • Old criteria: • National Training Standard for Information Systems Security Professionals, CNSSI No. 4011 • National Training Standard for System Administrators in Information Systems Security, CNSSI No. 4013 • National Training Standard for Information Systems Security Officers, CNSSI No. 4014 • New criteria: Knowledge Units
IA&S Courses • Offered since 2000 • 12 new courses • 4 undergraduate and graduate • 8 graduate students only • Approved by USC • Accredited by the Committee on National Security Systems (CNSS)
IA&S Certificate Programhttp://www.cse.sc.edu/isl/education/iaands (modifications are approved, starting Fall 2016)
Graduation requirements 12 hours of graduate study with B average • 6 hours core courses • 6 hours of elective courses
Core Courses • CSCE 522 – Information Systems Security Principles • offered every Fall semester -- APOGEE • CSCE 715– Network Security • offered every Fall semester
Elective Courses • CSCE 517 – Computer Crime and Forensics • CSCE 557 – Introduction to Cryptography • CSCE 548 – Secure Software Construction • CSCE 716 – Design for Reliability • CSCE 717 – Comp. Systems Performance • CSCE 727 – Information Warfare • CSCE 813 – Internet Security • CSCE 814 – Distributed Systems Security • CSCE 824 – Secure Databases
Center for Information Assurance Engineering (CIAE) • http://www.cse.sc.edu/isl • Information about: • Research • Education • Publications • People • Useful links
Questions? CSCE 824
Database Management System (DBMS) • Collection of • interrelated data and • set of programs to access the data • Convenient and efficient processing of data • Database Application Software CSCE 824
Evolution of Database Systems • Early days: customized applications built on top of file systems • Drawbacks of using file systems to store data: • Data redundancy and inconsistency • Difficulty in accessing data • Atomicity of updates • Concurrency control • Security • Data isolation — multiple files and formats • Integrity problems CSCE 824
Abstraction • View level: different perspectives • Application programs hide irrelevant data • Logical level: data models • Logical representation of data • Different approaches: hierarchical, network, object oriented, semi-structured, etc. • Data independence principle • Physical level: how data is stored CSCE 824
Data Models • A collection of tools for describing • Data • Relationships among data items • Semantics of stored data • Database constraints CSCE 824
Database Management Systems • Smaller and smaller systems • Past: large and expensive DBMS • Present: DBMS in most personal computers • More and more data stored – BIG DATA • Past: few MB • Present: terabyte (1012 bytes), petabyte (1015 bytes) • Functionality: from physical to view level • Optimization CSCE 824
Data Definition Language (DDL) • Defines the database schema and constraints • DDL compiler data dictionary • Metadata – data about data CSCE 824
Data Manipulation Language (DML) • Accessing and manipulating the data • Query Languages • Procedural – user specifies what data is required and how to get those data • Nonprocedural – user specifies what data is required without specifying how to get those data CSCE 824
Current Demands • Efficient data processing of large data sets • Long running transactions • Real-time demand • Usability for specific applications • … CSCE 824
Security Objectives • Confidentiality: prevent/detect/deter improper disclosure of information • Integrity: prevent/detect/deter improper modification of information • Availability: prevent/detect/deter improper denial of access to services CSCE 824
Security Threats • Poor design • Insufficient quality control • Accidents • Attacks CSCE 824
Achieving Security • Policy • What to protect? • Mechanism • How to protect? • Assurance • How good is the protection? CSCE 824
Database Security • Security Policy • Access control models • Inference control • Integrity protection • Privacy problems • Fault tolerance and recovery • Auditing and intrusion detection • TOOLS CSCE 824
Next Class Relational data model CSCE 824