Effectively and Efficiently Selecting Access Control Rules on Materialized Views over Relational Databases

被引:6
|
作者
Cuzzocrea, Alfredo [1 ,2 ]
Hacid, Mohand-Said [3 ,4 ]
Grillo, Nicola [5 ]
机构
[1] ICAR CNR, Arcavacata Di Rende, Italy
[2] Univ Calabria, Arcavacata Di Rende, Italy
[3] Univ C Bernard Lyon 1, Lyon, France
[4] LIRIS, Ecully, France
[5] Univ Calabria, DEIS Dept, Arcavacata Di Rende, Italy
关键词
Access Control Rules over Relational Databases; Security Policies over Relational Databases; Query Rewriting Techniques for Relational Database Security;
D O I
10.1145/1866480.1866512
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A novel framework for effectively and efficiently selecting fine-grained access control rules from a target relational database to the set of materialized views defined on such a database is presented and experimentally assessed in this paper, along with the main algorithm implementing the focal selection task, called VSP-Bucket. The proposed security framework introduces a number of research innovations, ranging from a novel Datalog-based syntax, and related semantics, aimed at modeling and expressing access control rules over relational databases to algorithm VSP-Bucket itself, which is a meaningful adaptation of a well-know view-based query re-writing algorithm for query optimization purposes. Our framework exposes a high flexibility, due to the fact it allows several classes of access control rules to be expressed and handled on top of large relational databases, and, at the same, it introduces high effectiveness and efficiency, as demonstrated by our comprehensive experimental evaluation and analysis of performance and scalability of algorithm VSP-Bucket.
引用
收藏
页码:225 / 235
页数:11
相关论文
共 28 条
  • [1] Inheriting Access Control Rules from Large Relational Databases to Materialized Views Automatically
    Cuzzocrea, Alfredo
    Hacid, Mohand-Said
    Grillo, Nicola
    [J]. KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT III, 2010, 6278 : 426 - +
  • [2] Efficiently Supporting Attribute-Based Access Control in Relational Databases
    Meena, Gaurav
    Paul, Proteet
    Sural, Shamik
    [J]. 2023 5TH IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS, TPS-ISA, 2023, : 230 - 239
  • [3] Enforcing Agile Access Control Policies in Relational Databases using Views
    Papernot, Nicolas
    McDaniel, Patrick
    Walls, Robert J.
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 7 - 12
  • [4] A Model-Driven Approach for Materialized Views Definition over heterogeneous databases
    Bachtarzi, Chahinez
    Bachtarzi, Faycal
    Benchikha, Fouzia
    [J]. 2015 FIRST INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES OF INFORMATION AND COMMUNICATION (NTIC), 2015,
  • [5] A Comparative Analysis of Materialized Views Selection and Concurrency Control Mechanisms in NoSQL Databases
    Tapdiya, Ashish
    Xue, Yuan
    Fabbri, Daniel
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER), 2017, : 384 - 388
  • [6] DYNAMIC ACCESS-CONTROL FOR RELATIONAL VIEWS
    ROUSSOPOULOS, N
    BADER, C
    [J]. INFORMATION SYSTEMS, 1985, 10 (03) : 361 - 369
  • [7] Optimizing DOM programs on XML views over existing relational databases
    Morishima, A
    Kojima, A
    [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS, 2004, 3084 : 248 - 262
  • [8] Enforcing confidentiality in relational databases by reducing inference control to, access control
    Biskup, Joachim
    Lochner, Jan-Hendrik
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 407 - +
  • [9] Access Control Policies for Relational Databases in Data Exchange Process
    Jbali, Adel
    Sassi, Salma
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2017, PT I, 2017, 10438 : 264 - 271
  • [10] On the Temporal Access Control Implementation at the Logical Level of Relational Databases
    Zhezhnych, Pavlo
    Burak, Teodor
    Chyrka, Oleg
    [J]. 2016 XITH INTERNATIONAL SCIENTIFIC AND TECHNICAL CONFERENCE COMPUTER SCIENCES AND INFORMATION TECHNOLOGIES (CSIT), 2016, : 84 - 87