Data-Centric Refinement of Information Flow Analysis of Database Applications

被引:0
|
作者
Alam, Md. Imran [1 ]
Halder, Raju [1 ]
机构
[1] Indian Inst Technol, Patna, Bihar, India
关键词
Information flow analysis; Dependence graph; Database application;
D O I
10.1007/978-3-319-22915-7_46
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the recent age of information, most of the applications are associated with external database states. The confidentiality of sensitive database information may be compromised due to the influence of sensitive attributes on insensitive ones during the computation by database statements. Existing language-based approaches to capture possible leakage of sensitive database information are coarse-grained and are based on the assumption that attackers are able to view all values of insensitive attributes in the database. In this paper, we propose a data-centric approach which covers more generic scenarios where attackers are able to view only a part of the attribute-values according to the policy. This leads to more precise semantic-based analysis which reduces false positives with respect to the literature.
引用
收藏
页码:506 / 518
页数:13
相关论文
共 50 条
  • [1] Data-centric Refinement of Database-Database Dependency Analysis of Database Program
    Jana, Angshuman
    [J]. ICSOFT: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES, 2020, : 234 - 241
  • [2] Data-centric information dissemination in opportunistic environments
    Carreras, Iacopo
    Tacconi, David
    Miorandi, Daniele
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1-3, 2007, : 780 - 782
  • [3] Data-centric information dissemination in opportunistic environments
    CREATE-NET, Via Solteri 38, 38100 - Trento, Italy
    [J]. IEEE Int. Conf. Mob. Adhoc Sensor Syst., MASS, 2007,
  • [4] Compositional modeling for data-centric business applications
    Jackson, Ethan K.
    Schulte, Wolfram
    [J]. SOFTWARE COMPOSITION, 2008, 4954 : 190 - 205
  • [5] Toward a Data-Centric Profiler for PGAS Applications
    Zhang, Hui
    Hollingsworth, Jeffrey K.
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON PARTITIONED GLOBAL ADDRESS SPACE PROGRAMMING MODELS (PGAS), 2015, : 93 - 95
  • [6] A data-centric security analysis of ICGrid
    Luna, Jesus
    Flouris, Michail
    Marazakis, Manolis
    Bilas, Angelos
    [J]. GRID COMPUTING: ACHIEVEMENTS AND PROSPECTS, 2008, : 197 - 208
  • [7] Information-centric vs. storage/data-centric systems
    Milligan, Charles
    Halladay, Steve
    Hansen, Deren
    [J]. ICEIS 2006: PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, 2006, : 501 - +
  • [8] Data-centric machine learning in quantum information science
    Lohani, Sanjaya
    Lukens, Joseph M.
    Glasser, Ryan T.
    Searles, Thomas A.
    Kirby, Brian T.
    [J]. MACHINE LEARNING-SCIENCE AND TECHNOLOGY, 2022, 3 (04):
  • [9] A Data-Centric Approach to Insider Attack Detection in Database Systems
    Mathew, Sunu
    Petropoulos, Michalis
    Ngo, Hung Q.
    Upadhyaya, Shambhu
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, 2010, 6307 : 382 - +
  • [10] Challenges of Information Retrieval and Evaluation in Data-Centric Biology
    Yu, Yi-Kuo
    [J]. OMICS-A JOURNAL OF INTEGRATIVE BIOLOGY, 2011, 15 (04) : 239 - 240