Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2020

01.12.2020

Inference Attacks and Information Security in Databases

verfasst von: A. A. Poltavtsev, A. R. Khabarov, A. O. Selyankin

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2020

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract—

Security of modern data architectures implemented in relational DBMS’s is analyzed. The emphasis is placed on inference attacks, which are not prevented by traditional access control methods. Examples of such attacks are given and fundamental approaches to protecting against them are analyzed. The development of special software built and operating on the principles of intellectual data analysis is proposed as a security measure.
Literatur
1.
Zurück zum Zitat Baraani-Dastjerdi, A., Pieprzyk, J., Pieprzyk, B.-D.J., and Safavi-Naini, R., Security in Databases: A Survey Study, 1996, pp. 1–39. Baraani-Dastjerdi, A., Pieprzyk, J., Pieprzyk, B.-D.J., and Safavi-Naini, R., Security in Databases: A Survey Study, 1996, pp. 1–39.
2.
Zurück zum Zitat Shenets, N.N., Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 936–946.CrossRef Shenets, N.N., Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 936–946.CrossRef
5.
Zurück zum Zitat Konoplev, A.S. and Kalinin, M.O., Access control system for distributed computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 664–668.CrossRef Konoplev, A.S. and Kalinin, M.O., Access control system for distributed computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 664–668.CrossRef
6.
Zurück zum Zitat Konoplev, A.S. and Kalinin, M.O., Tasks of providing information security in distributed computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 669–672.CrossRef Konoplev, A.S. and Kalinin, M.O., Tasks of providing information security in distributed computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 669–672.CrossRef
7.
Zurück zum Zitat Busygin, A.G., Konoplev, A.S., and Kalinin, M.O., Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 743–748.CrossRef Busygin, A.G., Konoplev, A.S., and Kalinin, M.O., Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 743–748.CrossRef
8.
Zurück zum Zitat Aleksandrova, E.B., Zegzhda, D.P., and Konoplev, A.S., Applying the group signature for entity authentication in distributed grid computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 739–742.CrossRef Aleksandrova, E.B., Zegzhda, D.P., and Konoplev, A.S., Applying the group signature for entity authentication in distributed grid computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 739–742.CrossRef
9.
Zurück zum Zitat Keke, G., Longfei, Q., Min, C., Hui, Zh., and Meikang, Q., SA-EAST: Security-aware efficient data transmission for its in mobile heterogeneous cloud computing, ACM Trans. Embed. Comput. Syst., 2017, vol. 16, no. 2. Keke, G., Longfei, Q., Min, C., Hui, Zh., and Meikang, Q., SA-EAST: Security-aware efficient data transmission for its in mobile heterogeneous cloud computing, ACM Trans. Embed. Comput. Syst., 2017, vol. 16, no. 2.
10.
Zurück zum Zitat Volkov, S.D., Tsaregorodtsev, A.V., and Tsatskina, E.P., Features of building systems for detecting computer attacks for information and telecommunication systems operating on the basis of cloud computing technology, Ogarev-Online, 2017, no. 13. Volkov, S.D., Tsaregorodtsev, A.V., and Tsatskina, E.P., Features of building systems for detecting computer attacks for information and telecommunication systems operating on the basis of cloud computing technology, Ogarev-Online, 2017, no. 13.
13.
Zurück zum Zitat Ovasapyan, T.D., Moskvin, D.A., and Kalinin, M.O., Using neural networks to detect internal intruders in vanets, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954–958.CrossRef Ovasapyan, T.D., Moskvin, D.A., and Kalinin, M.O., Using neural networks to detect internal intruders in vanets, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954–958.CrossRef
15.
Zurück zum Zitat Zegzhda, P.D. and Kalinin, M.O., Technology of security services virtualization for high-speed computer networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 734–738.CrossRef Zegzhda, P.D. and Kalinin, M.O., Technology of security services virtualization for high-speed computer networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 734–738.CrossRef
16.
Zurück zum Zitat Poltavtseva, M.A., A consistent approach to building secure big data processing and storage systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 914–921.CrossRef Poltavtseva, M.A., A consistent approach to building secure big data processing and storage systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 914–921.CrossRef
18.
Zurück zum Zitat Gorton, I. and Gracio, D.K., Data-Intensive Computing Architectures, Algorithms, and Applications, Cambridge Press, 2012.CrossRef Gorton, I. and Gracio, D.K., Data-Intensive Computing Architectures, Algorithms, and Applications, Cambridge Press, 2012.CrossRef
19.
Zurück zum Zitat Elvis, D. and Foster, C., Database Systems: A Pragmatic Approach, Apress, 2016. Elvis, D. and Foster, C., Database Systems: A Pragmatic Approach, Apress, 2016.
20.
Zurück zum Zitat Poltavtseva, M.A., Zegzhda, D.P., and Kalinin, M.O., Big data management system security threat model, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 903–913.CrossRef Poltavtseva, M.A., Zegzhda, D.P., and Kalinin, M.O., Big data management system security threat model, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 903–913.CrossRef
21.
Zurück zum Zitat Yip, R.W. and Levitt, K.N., Data level inference detection in database systems, Proceedings of 11th IEEE Computer Security Foundations Workshop, Rockport, MA, 1988, pp. 179–189. Yip, R.W. and Levitt, K.N., Data level inference detection in database systems, Proceedings of 11th IEEE Computer Security Foundations Workshop, Rockport, MA, 1988, pp. 179–189.
22.
Zurück zum Zitat Hinke, T.H., Delugach, H.S., and Wolf, R.P., Protecting databases from inference attacks, Comput. Secur., 1997, vol. 16, no. 8, pp. 687–708.CrossRef Hinke, T.H., Delugach, H.S., and Wolf, R.P., Protecting databases from inference attacks, Comput. Secur., 1997, vol. 16, no. 8, pp. 687–708.CrossRef
23.
Zurück zum Zitat Yang, Y.J., Li, Y.J., and Deng, R.H., New paradigm of inference control with trusted computing, IFIP Annual Conference on Data and Applications Security and Privacy, Redondo Beach, CA, 2007, pp. 243–258. Yang, Y.J., Li, Y.J., and Deng, R.H., New paradigm of inference control with trusted computing, IFIP Annual Conference on Data and Applications Security and Privacy, Redondo Beach, CA, 2007, pp. 243–258.
24.
Zurück zum Zitat Ozsoyoglu, G., On inference control in semantic data models for statistical databases, J. Comput. Syst. Sci., 1990, vol. 40, no. 3, pp. 405–443.MathSciNetCrossRef Ozsoyoglu, G., On inference control in semantic data models for statistical databases, J. Comput. Syst. Sci., 1990, vol. 40, no. 3, pp. 405–443.MathSciNetCrossRef
25.
Zurück zum Zitat Hylkema, M., A Survey of Database Inference Attack Prevention Methods, Educ. Technol. Res., 2009. Hylkema, M., A Survey of Database Inference Attack Prevention Methods, Educ. Technol. Res., 2009.
26.
Zurück zum Zitat Biskup, J., Embley, D.W., and Lochner, J.H., Reducing inference control to access control for normalized database schemas, Inf. Process. Lett., 2008, vol. 106, no. 1, pp. 8–12.MathSciNetCrossRef Biskup, J., Embley, D.W., and Lochner, J.H., Reducing inference control to access control for normalized database schemas, Inf. Process. Lett., 2008, vol. 106, no. 1, pp. 8–12.MathSciNetCrossRef
27.
Zurück zum Zitat Chen, Y. and Chu, W., Database security protection via inference detection, Intelligence and Security Informatics, San Diego, CA, 2006, pp. 452–458.CrossRef Chen, Y. and Chu, W., Database security protection via inference detection, Intelligence and Security Informatics, San Diego, CA, 2006, pp. 452–458.CrossRef
28.
Zurück zum Zitat Goyal, V., Gupta, S.K., Singh, M., and Gupta, A., Auditing inference based disclosures in dynamic databases, Workshop on Secure Data Management, Auckland, 2008, pp. 67–81. Goyal, V., Gupta, S.K., Singh, M., and Gupta, A., Auditing inference based disclosures in dynamic databases, Workshop on Secure Data Management, Auckland, 2008, pp. 67–81.
Metadaten
Titel
Inference Attacks and Information Security in Databases
verfasst von
A. A. Poltavtsev
A. R. Khabarov
A. O. Selyankin
Publikationsdatum
01.12.2020
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2020
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411620080271

Weitere Artikel der Ausgabe 8/2020

Automatic Control and Computer Sciences 8/2020 Zur Ausgabe

Neuer Inhalt