Skip to main content

Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach

  • Conference paper
  • First Online:
Web Information Systems Engineering – WISE 2015 (WISE 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9419))

Included in the following conference series:

Abstract

Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data.

We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges.

Anand Kumar—This work was done at University of South Florida.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Technically, these policies are called “properties” in the literature on formal security models [10, 11, 17].

References

  1. Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Comput. Surv. 21(4), 515–556 (1989)

    Article  Google Scholar 

  2. Agrawal, R., Srikant, R., Thomas, D.: Privacy preserving OLAP. In: Proceedings of the International Conference on Management of Data, SIGMOD, pp. 251–262 (2005)

    Google Scholar 

  3. Denning, D.E., Schlörer, J.: A fast procedure for finding a tracker in a statistical database. ACM Trans. Database Syst. 5(1), 88–102 (1980)

    Article  Google Scholar 

  4. Dobkin, D., Jones, A.K., Lipton, R.J.: Secure databases: protection against user influence. ACM Trans. Database Syst. 4(1), 97–106 (1979)

    Article  Google Scholar 

  5. Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  6. Fabbri, D., LeFevre, K.: Explanation-based auditing. Proc. VLDB Endow. 5(1), 1–12 (2011)

    Article  Google Scholar 

  7. Fellegi, I.P., Phillips, J.J.: Statistical confidentiality: some theory and application to data dissemination. Am. Econ. Soc. Measures 3(2), 101–112 (1974)

    Google Scholar 

  8. Hasan, R., Winslett, M.: Efficient audit-based compliance for relational data retention. In: Symposium on Information, Computer and Communications Security, pp. 238–248 (2011)

    Google Scholar 

  9. Kushida, C., Nichols, D., Jadrnicek, R., Miller, R., Walsh, J., Griffin, K.: Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies. Med. Care 50, S82–S101 (2012)

    Article  Google Scholar 

  10. Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Trans. Inf. Syst. Secur. 12(3), 1–41 (2009)

    Article  Google Scholar 

  11. Ligatti, J., Reddy, S.: A theory of runtime enforcement, with results. In: Proceedings of the 15th European Conference on Research in Computer Security, pp. 87–100 (2010)

    Google Scholar 

  12. McSherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of the International Conference on Management of Data, SIGMOD, pp. 19–30 (2009)

    Google Scholar 

  13. Mohan, P., Thakurta, A., Shi, E., Song, D., Culler, D.: Gupt: privacy preserving data analysis made easy. In: Proceedings of the International Conference on Management of Data, SIGMOD, pp. 349–360 (2012)

    Google Scholar 

  14. Muralidhar, K., Batra, D., Kirs, P.J.: Accessibility, security, and accuracy in statistical databases: the case for the multiplicative fixed data perturbation approach. Manage. Sci. 41(9), 1549–1564 (1995)

    Article  MATH  Google Scholar 

  15. Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proceedings of the Symposium on Security and Privacy, S&P, pp. 111–125 (2008)

    Google Scholar 

  16. Roy, I., Setty, S.T.V., Kilzer, A., Shmatikov, V., Witchel, E.: Airavat: security and privacy for mapreduce. In: Proceedings of the Conference on Networked Systems Design and Implementation, NSDI, p. 20 (2010)

    Google Scholar 

  17. Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30–50 (2000)

    Article  Google Scholar 

  18. Upadhyaya, P., Anderson, N.R., Balazinska, M., Howe, B., Kaushik, R., Ramamurthy, R., Suciu, D.: Stop that query! the need for managing data use. In: Conference on Innovative Data Systems Research (2013)

    Google Scholar 

Download references

Acknowledgements

This project is supported by a grant (No. R01GM086707) from the National Institutes of Health (NIH), USA.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anand Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kumar, A., Ligatti, J., Tu, YC. (2015). Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach. In: Wang, J., et al. Web Information Systems Engineering – WISE 2015. WISE 2015. Lecture Notes in Computer Science(), vol 9419. Springer, Cham. https://doi.org/10.1007/978-3-319-26187-4_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26187-4_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26186-7

  • Online ISBN: 978-3-319-26187-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics