Abstract
Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data.
We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges.
Anand Kumar—This work was done at University of South Florida.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Comput. Surv. 21(4), 515–556 (1989)
Agrawal, R., Srikant, R., Thomas, D.: Privacy preserving OLAP. In: Proceedings of the International Conference on Management of Data, SIGMOD, pp. 251–262 (2005)
Denning, D.E., Schlörer, J.: A fast procedure for finding a tracker in a statistical database. ACM Trans. Database Syst. 5(1), 88–102 (1980)
Dobkin, D., Jones, A.K., Lipton, R.J.: Secure databases: protection against user influence. ACM Trans. Database Syst. 4(1), 97–106 (1979)
Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008)
Fabbri, D., LeFevre, K.: Explanation-based auditing. Proc. VLDB Endow. 5(1), 1–12 (2011)
Fellegi, I.P., Phillips, J.J.: Statistical confidentiality: some theory and application to data dissemination. Am. Econ. Soc. Measures 3(2), 101–112 (1974)
Hasan, R., Winslett, M.: Efficient audit-based compliance for relational data retention. In: Symposium on Information, Computer and Communications Security, pp. 238–248 (2011)
Kushida, C., Nichols, D., Jadrnicek, R., Miller, R., Walsh, J., Griffin, K.: Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies. Med. Care 50, S82–S101 (2012)
Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Trans. Inf. Syst. Secur. 12(3), 1–41 (2009)
Ligatti, J., Reddy, S.: A theory of runtime enforcement, with results. In: Proceedings of the 15th European Conference on Research in Computer Security, pp. 87–100 (2010)
McSherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of the International Conference on Management of Data, SIGMOD, pp. 19–30 (2009)
Mohan, P., Thakurta, A., Shi, E., Song, D., Culler, D.: Gupt: privacy preserving data analysis made easy. In: Proceedings of the International Conference on Management of Data, SIGMOD, pp. 349–360 (2012)
Muralidhar, K., Batra, D., Kirs, P.J.: Accessibility, security, and accuracy in statistical databases: the case for the multiplicative fixed data perturbation approach. Manage. Sci. 41(9), 1549–1564 (1995)
Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proceedings of the Symposium on Security and Privacy, S&P, pp. 111–125 (2008)
Roy, I., Setty, S.T.V., Kilzer, A., Shmatikov, V., Witchel, E.: Airavat: security and privacy for mapreduce. In: Proceedings of the Conference on Networked Systems Design and Implementation, NSDI, p. 20 (2010)
Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30–50 (2000)
Upadhyaya, P., Anderson, N.R., Balazinska, M., Howe, B., Kaushik, R., Ramamurthy, R., Suciu, D.: Stop that query! the need for managing data use. In: Conference on Innovative Data Systems Research (2013)
Acknowledgements
This project is supported by a grant (No. R01GM086707) from the National Institutes of Health (NIH), USA.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Kumar, A., Ligatti, J., Tu, YC. (2015). Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach. In: Wang, J., et al. Web Information Systems Engineering – WISE 2015. WISE 2015. Lecture Notes in Computer Science(), vol 9419. Springer, Cham. https://doi.org/10.1007/978-3-319-26187-4_42
Download citation
DOI: https://doi.org/10.1007/978-3-319-26187-4_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26186-7
Online ISBN: 978-3-319-26187-4
eBook Packages: Computer ScienceComputer Science (R0)