Security Model for Federated Database Systems

Kavitha Juliet, RYMEC,Bellary

Federated,access control,authirization

One of the new emerging technologies for data management today is represented by federate systems. Security enforcement at the federation level must take into consideration the protection requirements and protection policies of each participating site. This task can be further complicated by the heterogeneity of the constituent systems, which may enforce protection policies either difficult to combine or inconsistent with each other. The need to share data in the federation on one side and to maintain site autonomy on the other side raises several protection requirements which traditional security models do not address. So this paper proposes the security model for federated database systems.
    [1] A. Sheth and J. Larson. Federated database systems for managing distributed, heterogeneous, and autonomous databases. ACM Computing Surveys, 1990. [2] Net market makers inc. http://www.netmarketmakers.com, 1999 [3] L. Knight. “the e-market maker revolution”, dataquest inc. http://www.netmarketmakers.com/documents/perspective1.pdf, 1999. [4] C. Batini, M. Lenzerini, and S. B. Navathe. A comparative analysis of methodologies for database schema integration. ACM Computing Surveys, 1986. [5] R. J. Miller, L. M. Haas, and M. A. Hern´andez. Schema mapping as query discovery. In VLDB, 2000. [6] S. Abiteboul, S. Cluet, T. Milo, P. Mogilevsky, J. Sim´eon, and S. Zohar. Tools for data translation and integration. IEEE Data Engineering Bulletin, 1999. [7] Amol Deshpande Joseph M. Hellerstein Decoupled Query Optimization for Federated Database Systems, IEEE Data Engineering Bulletin 2002 [8] Yuri Breitbartt, Hector Garcia-Moli, Avi Silberschatz Overview of Multidatabase Transaction Management The VLDB Journal, 1992 [9] R S Sandhu and P Samarati access control: principles and practice.IEEE communication pages2-10 September 1994. [10] S Castano, M G Fugini, G Martella and P Samarati Database Security-Addison Wesley,1995. [11] P Samarati E bertino and S jajodia An authorization model for a distributed hypertext system. IEEE transaction on knowledge and data engineering, 555-562, August 1996. [12] T Holrigl, F schell, S suelmann, H harten stein, Towards Systematic Engineering of Service –Oriented Access control in Federated Environments [13] Sabrina, P samarati, access control in federated systems,ACM 1997. [14] Matthew Morgenstern, Teresa F. Lunt, Bhavani Thuraisingham, and David L. Spooner. Security Issues in Federated Database Systems: Panel Contributions. In C. E. Landwehr and S. Jajodia, editors, Database Security, V: Status and Prospects, IFIP, pages 131-148, 1992 [15] M. Templeton, E. Lund, and P. Ward. Pragmatics of Access Control in Mermaid. In IEEE-CS TC Data Engineering, pages 33-38, September 1987. [16] Worn Kim, Nat Ballou, Jorge F. Garza, and Darrel Woelk. A Distributed Object-Oriented Database System Supporting Shared and Private Databases. ACM Transactions on Ofice Information Systems, 9(1):31-51, January 1991. [17] D. Heimbigner and D. McJ,eod. A Federated architecture for Information Management. A CM Transactions on. Ofice /71fo7mr~ti071 Systems. 3(3):253-278. 1985 [18] M.L. Goyal and G.V. Singh, ªAccess Control in Heterogeneous Database Management Systems, º Computers and Security, vol. 10, no. 7, pp. 661-669, 1991. [19] D. Jonscher and K.R. Dittrich, ªAn Approach for Building Secure Database Federations, º Proc. Int'l Conf. Very Large Database (VLDB), pp. 24-35, 1994. [20] G. Pernul, ªCanonical Security Modelling for Federated Database, Interoperable Database Systems, D.K. Hsiao, E.J. Neuhold, and R. Sacks-Davis, eds., pp. 207-222, 1993. [21] Sandhu RS, Coyne EJ, Feinstein HL, Youman CE. Role-based access control models. IEEE Computer 1996;29(2):38e47 [22] IIilary H. Hosmcr Mullipolicy Paradigm Il. In Procfrifings oj the Sew Securil,q Paradigm.s Workslrop, Lit,t.le compton, R.I., Sept,enlber 1992. [23] T.F. Lunt, ªAggregation and Inference: Fact and Fallacies, º Proc. IEEE Symp. Research in Security and Privacy, 1989.
Paper ID: GRDJEV01I050113
Published in: Volume : 1, Issue : 5
Publication Date: 2016-05-01
Page(s): 123 - 126