450 likes | 832 Views
DISTRIBUTED DATABASE SECURITY. DISTRIBUTED DATABASE. Scope of data security needs. Fundamental data security requirements. Confidentiality – it allows individual to see only the data that they are supposed to see Privacy communication Secure storage Authenticated user
E N D
DISTRIBUTED DATABASE SECURITY DISTRIBUTED DATABASE
Fundamental data security requirements • Confidentiality – it allows individual to see only the data that they are supposed to see • Privacy communication • Secure storage • Authenticated user • Granular access control (Authorization) • Integrity - ensures that the data it contains is valid, data is protected from deletion and corruption, both while it resides within the database, and while it is being transmitted over the network. • Availability - makes data available to authorized users, without delay
Fundamental data security requirements (cont’d) • System Availability aspect • Resistance • Scalability • Flexibility • Ease of use
Cryptography • Cryptography is the way to make data secure – creating secret called chiper • Specific cryptographics function include the following: • Confidentiality – keep message private between parties • Authentication – allows message receiver to validate the message source and to ensure integrity to message • Nonrepudiation – vaidate message source so strongly
Cryptography (cont’d) • Conventional Cryptography – symetric key • Message digest (MD) and Message authentication code (MAC) • Public key cryptography • Digital signatures • Digital certificates and certificate authorities
Securing communication • Require secure communications • Between users and the DDBE • Among the Sub-DBEs themselves • Secure communication component : privacy, authentication, and integrity • Example protocol: • SSL/ TLS • Virtual Private Network (VPN) – ssh, ipSec
Securing data • Securing data that is stored in database • Authentication and authorization • Data Encryption • Validation SQL input • Data inference • Data auditing
Solving the Security issues • Valid / invalid user • Physical environment security • Source code update • Data backup media protection • Lost password policies • Host operating system maintenance • Firewall and IDS configuration