Advanced Database Chapter 6 and 7
Advanced Database Chapter 6 and 7
Sites may not be aware of each other and may provide only limited facilities for
cooperation in transaction processing.
May need gateways to interface one another.
Why DDBMS ?/Advantages of DDBMS
If all statements of a transaction reference only a single remote node, the transaction is
remote, not distributed.
Database Security and Authorization
Privacy – Ethical and legal rights that individuals have with regard to control over the
dissemination and user of their personal information.
Database security – Protection of information contained in the database against
unauthorized access, modification or destruction.
Database integrity – Mechanism that is applied to ensure that the data in the database is
correct and consistent.
A good database security management system has the following characteristics:
Privacy signifies that an unauthorized user cannot disclose data
Integrity ensures that an unauthorized user cannot modify data
Availability ensures that data be made available to the authorized user unfailingly
Copyright ensures the native rights of individuals as a creator of information.
Validity ensures activities to be accountable by law.
Database Security and Authorization
Database Security - the mechanisms that protect the database against intentional or
accidental threats. Database security encompasses hardware, software, people and data.
Database security and integrity is about protecting the database from being inconsistent
and being disrupted. We can also call it database misuse.
Database misuse could be Intentional or Accidental, where accidental misuse is easier to
cope with than intentional misuse.
Accidental inconsistency could occur due to:
System crash during transaction processing
Anomalies due to concurrent access
Anomalies due to redundancy
Logical errors
Intentional misuse could be:
Unauthorized reading of data
Unauthorized modification of data or
Unauthorized destruction of data
Levels of Security Measures
Security measures can be implemented at several levels and for different components of the
system. These levels are:
Physical Level: concerned with securing the site containing the computer system. The
site or sites containing the computer systems must be physically secured against armed or
sneaky entry by intruders.
Human Level: concerned with authorization of database users for access the content at
different levels and privileges.
Operating System: concerned with the weakness and strength of the operating system
security on data files.
Database System: concerned with data access limit enforced by the database system.
software-level security: with the network software is as important as physical security,
both on the Internet and networks private to an enterprise.
Authentication
All users of the database will have different access levels and permission for different
data objects, and authentication is the process of checking whether the user is the one
with the privilege for the access level.
Is the process of checking the users are who they say they are.
Each user is given a unique identifier, which is used by the operating system to determine
who they are.
Thus the system will check whether the user with a specific username and password is
trying to use the resource.
Associated with each identifier is a password, chosen by the user and known to the
operation system, which must be supplied to enable the operating system to authenticate
who the user claims to be.
Authorization/Privilege
Authorization refers to the process that determines the mode in which a particular
(previously authenticated) client is allowed to access a specific resource controlled by a
server.
Forms of user authorization on the data
Read Authorization: the user with this privilege is allowed only to read the content of
the data object.
Insert Authorization: the user with this privilege is allowed only to insert new records
or items to the data object.
Update Authorization: users with this privilege are allowed to modify content of
attributes but are not authorized to delete the records.
Delete Authorization: users with this privilege are only allowed to delete a record and
not anything else.
Authorization/Privilege
Authorization refers to the process that determines the mode in which a particular
(previously authenticated) client is allowed to access a specific resource controlled by a
server.
Forms of user authorization on the database schema
Index Authorization: deals with permission to create as well as delete an index table for
relation.
Resource Authorization: deals with permission to add/create a new relation in the
database.
Alteration Authorization: deals with permission to add as well as delete attribute.
Drop Authorization: deals with permission to delete and existing relation.
Reading Assignments