230 likes | 376 Vues
Insider Threats in Database Security. Ram Gopal (with Robert Garfinkel, Daniel Rice) University of Connecticut. Security Mechanism. Database Security Objectives. Maximize the utility of information provided to users while maintaining the security of confidential information. Original
E N D
Insider Threats in Database Security Ram Gopal (with Robert Garfinkel, Daniel Rice) University of Connecticut
Security Mechanism Database Security Objectives Maximize the utility of information provided to users while maintaining the security of confidential information. Original Database Secure Database User Query Query Answer
Security Mechanism Insider Threats Original Database Secure Database User Query Query Answer Insider Process Knowledge Insider Data Knowledge
Confidentiality-Related Identity-Related Confidential • Security Considerations • Disclosure of Confidential Information • Identity Disclosure
Protection of Confidential Information • Perturbation • Camouflage
87.89 52.07 134.60 101.95 71.15 24.76 46.81 94.79 74.24 49.57 Perturbation 82.32 -19.68 • Data Swapping/Shuffling • Binning
Camouflage • Interval Answers • Answer Guarantee • Interval Protection • Storage Efficiency • Computational Efficiency • “Good” Query Answers Record 2 Record 1
u2 Record 2 l2 Record 1 l1 u1 Camouflage: Polytope Query: q = f(a) Query Answer: interval[q-, q +] Answer Computation
Insider Threats - Data Camouflage - Polytope u2 Record 2 l2 Record 1 l1 u1
Insider Threats - Data u2 Record 2 l2 Record 1 l1 u1
Perturbation Insider Threats - Data
Threat Analysis • Perturbation • Camouflage Insider Information Process Information (knows the technique) Data Information (has some data) Safe Safe
Perturbation Camouflage Threat Analysis Insider Information Process Information (knows the technique) Data Information (has some data) NA STAR Approach
Actual Value of Record 2 Actual value of record 1 Camouflage - STAR u2 Record 2 l2 Record 1 l1 u1
Threat Analysis • Perturbation • Camouflage Insider Information Process Information (knows the technique) Data Information (has partial information) Unsafe Modified STAR U Polytope
Protection Against Process/Partial Data Threats Camouflage - Modified STAR U Polytope u2 Record 2 l2 Record 1 l1 u1
Protection Against Process/Partial Data Threats u2 Record 2 l2 Record 1 l1 u1
Threat Analysis- Extreme Case • Perturbation • Camouflage Insider Information Process Information (knows the technique) Data Information (has all but 1 piece of data) Unsafe Hyper-rectangle
Camouflage: Hyper-rectangle Query: q = f(a) u2 Query Answer: interval[q-, q +] Answer Computation Record 2 l2 Record 1 l1 u1
Computational Results & Concluding Remarks • STAR performs extremely well • Useful answers can be provided even in the presence of insider information • Current techniques fail against insider threats • Response must depend upon nature and level of threat