Achieving database accountability and traceability using the bitemporal relation

Huifen. Chen, K. Farn, Dwen-Ren Tsai
{"title":"Achieving database accountability and traceability using the bitemporal relation","authors":"Huifen. Chen, K. Farn, Dwen-Ren Tsai","doi":"10.1109/CCST.2003.1297552","DOIUrl":null,"url":null,"abstract":"Database systems have become the most crucial constructing components of data stores underlying modern application systems. Popular role-based access control model by Sandhu R.S. and E.J. Coyne proposed a way to manage users' access rights. However, employees playing several roles sometimes acquire access rights above their duties. These employees, for their own benefits, are capable of accessing data illegally, modifying or inserting data temporary then illegally outputting data, and finally changing data back to their original status that satisfy integrity of database contents. Usually databases are updated through record overwriting or deleting and are difficult to trace each user transaction. Hence, owners of these database systems, potentially, might become victims of data temporary misuse by criminals. Ooi, Goh, and Tan proposed a dimension space transformation concept based on indexing bitemporal databases1998, which states the concept of transforming one-dimensional time domain to two-dimensional x-y coordinates. We first study state-of-the-art of access control methods, then address role conflicts in access rights, and finally discuss the Bitemporal relation with valid and process time attributes. We further propose an approach, recording database usage trails and transparent to general users, to accomplish all record queries and changes, including insertion, deletion, modification, and retrieving, referenced Ooi, Goh, and Tan's work. Hopefully, this approach might facilitate achieving forensic objects of database traceability and accountability.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2003.1297552","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Database systems have become the most crucial constructing components of data stores underlying modern application systems. Popular role-based access control model by Sandhu R.S. and E.J. Coyne proposed a way to manage users' access rights. However, employees playing several roles sometimes acquire access rights above their duties. These employees, for their own benefits, are capable of accessing data illegally, modifying or inserting data temporary then illegally outputting data, and finally changing data back to their original status that satisfy integrity of database contents. Usually databases are updated through record overwriting or deleting and are difficult to trace each user transaction. Hence, owners of these database systems, potentially, might become victims of data temporary misuse by criminals. Ooi, Goh, and Tan proposed a dimension space transformation concept based on indexing bitemporal databases1998, which states the concept of transforming one-dimensional time domain to two-dimensional x-y coordinates. We first study state-of-the-art of access control methods, then address role conflicts in access rights, and finally discuss the Bitemporal relation with valid and process time attributes. We further propose an approach, recording database usage trails and transparent to general users, to accomplish all record queries and changes, including insertion, deletion, modification, and retrieving, referenced Ooi, Goh, and Tan's work. Hopefully, this approach might facilitate achieving forensic objects of database traceability and accountability.
使用双时态关系实现数据库问责制和可追溯性
数据库系统已成为现代应用系统中最重要的数据存储构件。流行的基于角色的访问控制模型Sandhu R.S.和E.J. Coyne提出了一种管理用户访问权限的方法。然而,扮演多个角色的员工有时会获得超出其职责的访问权。这些员工为了自己的利益,可以非法访问数据,临时修改或插入数据,然后非法输出数据,最后将数据更改回满足数据库内容完整性的原始状态。通常数据库是通过覆盖或删除记录来更新的,很难跟踪每个用户事务。因此,这些数据库系统的所有者可能会成为犯罪分子临时滥用数据的受害者。Ooi, Goh, and Tan提出了一种基于索引双时数据库的维度空间转换概念(1998),该概念陈述了将一维时域转换为二维x-y坐标的概念。本文首先研究了访问控制方法的最新进展,然后讨论了访问权限中的角色冲突,最后讨论了有效时间属性和进程时间属性之间的双时间关系。我们进一步提出了一种方法,记录数据库使用轨迹并对一般用户透明,以完成所有记录的查询和更改,包括插入,删除,修改和检索,参考了Ooi, Goh和Tan的工作。希望这种方法能够促进实现数据库可跟踪性和问责制的取证对象。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信