Authorization enforcement in distributed query evaluation

被引:15
|
作者
di Vimercati, Sabrina [1 ]
Foresti, Sara [1 ]
Jajodia, Sushil [2 ]
Paraboschi, Stefano [3 ]
Samarati, Pierangela [1 ]
机构
[1] Univ Milan, DTI, Via Bramante 65, I-26013 Crema, Italy
[2] George Mason Univ, CSIS, Fairfax, VA 22030 USA
[3] Univ Bergamo, DIIMM, Dalmine, Italy
基金
美国国家科学基金会;
关键词
Distributed query evaluation; authorized views; safe query planning;
D O I
10.3233/JCS-2010-0413
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a simple, yet powerful, approach for the specification and enforcement of authorizations regulating data release among data holders collaborating in a distributed computation, to ensure that query processing discloses only data whose release has been explicitly authorized. Data disclosure is captured by means of profiles, associated with each data computation, that describe the information carried by a base or a derived (i.e., computed by a query) relation. We present an algorithm that, given a query plan, determines whether it can be safely executed and produces a safe execution strategy for it. For each operation in a safe query plan, the algorithm determines the server(s) responsible for the execution, based on the entailed information flows, considering different strategies for the execution of joins. Finally, we discuss the architecture of a distributed database system based on the proposed model, illustrating possible design choices and their impact.
引用
收藏
页码:751 / 794
页数:44
相关论文
共 50 条
  • [1] Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation
    Zeng, Qiang
    Zhao, Mingyi
    Liu, Peng
    Yadav, Poonam
    Calo, Seraphin
    Lobo, Jorge
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015, 27 (04) : 979 - 992
  • [2] Confidentiality policies and their enforcement for controlled query evaluation
    Biskup, J
    Bonatti, P
    [J]. COMPUTER SECURITY - ESORICS 2002, PROCEEDINGS, 2002, 2502 : 39 - 54
  • [3] Authorization Enforcement Detection
    Porat, Ehood
    Tikochinski, Shmuel
    Stulman, Ariel
    [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 179 - 182
  • [4] Authorization Constraints Specification and Enforcement
    Zhou, Wei
    Meinel, Christoph
    Xiang, Yidong
    Shao, Yang
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2008, 3 (01): : 38 - 50
  • [5] ThunQ: A Distributed and Deep Authorization Middleware for Early and Lazy Policy Enforcement in Microservice Applications
    Sauwens, Martijn
    Beni, Emad Heydari
    Jannes, Kristof
    Lagaisse, Bert
    Joosen, Wouter
    [J]. SERVICE-ORIENTED COMPUTING (ICSOC 2021), 2021, 13121 : 204 - 220
  • [6] Distributed query evaluation on semistructured data
    Suciu, D
    [J]. ACM TRANSACTIONS ON DATABASE SYSTEMS, 2002, 27 (01): : 1 - 62
  • [7] Accelerating Partial Evaluation in Distributed SPARQL Query Evaluation
    Peng, Peng
    Zou, Lei
    Guan, Runyu
    [J]. 2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, : 112 - 123
  • [8] Distributed Authorization with Distributed Grammars
    Abadi, Martin
    Burrows, Mike
    Pucha, Himabindu
    Sadovsky, Adam
    Shankar, Asim
    Taly, Ankur
    [J]. PROGRAMMING LANGUAGES WITH APPLICATIONS TO BIOLOGY AND SECURITY: ESSAYS DEDICATED TO PIERPAOLO DEGANO ON THE OCCASION OF HIS 65TH BIRTHDAY, 2015, 9465 : 10 - 26
  • [9] Distributed Programming with Distributed Authorization
    Avijit, Kumar
    Datta, Anupam
    Harper, Robert
    [J]. TLDI '10: PROCEEDINGS OF THE 2010 ACM SIGPLAN WORKSHOP ON TYPES IN LANGUAGE DESIGN AND IMPLEMENTATION, 2010, : 27 - 38
  • [10] A pipelined architecture for distributed text query evaluation
    Alistair Moffat
    William Webber
    Justin Zobel
    Ricardo Baeza-Yates
    [J]. Information Retrieval, 2007, 10 : 205 - 231