Is16 Iordache Dorin 1 [620938]

DATABASE SECURITY MECHANISM
Dorin Iordache
Lecturer eng., Romanian Naval Academy “Mircea cel B ătrân”
Fulgerului nr.1, Constanta, 8700, Romania
email: [anonimizat]
Abstract
Database security was and still is an important objective
for information security. The potential security threats
posed by databases and computers networks is
significant and ever increasi ng. Threats for operational
safety can be caused by both unauthorized and
authorized activities of some database users.
Institutions have to implement some securitymechanisms in their environment. Nowadays, database
file ought to be protected. For this reason, it is
important to track access to all data that is processed via
database management systems and to classify and code
that such information. Also, it is necessary toimplement a security mechan ism at the database files
level. The recent expansion in communication and data
distribution networks has resulted in a range of newsecurity threats.
Key words : database security, authentication, security,
information security.
INTRODUCTION
Database security is a branch of information
security management, but has it’s own specificproblems. Now, more than ever before, information is
flowing in all directions, with varying degrees of
importance and in a number of different forms. Theseinclude public information and news as well as
economic, military and financial information.
Information can be transmitted in several different
ways, from magnetic strips to smart cards. As a result,
it is important to adopt basic security measures in orderto protect computer oper ating systems and the data
stored within them.
Databases introduce a number of unique
security requirements for their users and
administrators. On one hand, databases are designed to
promote open and flexible acce ss to data. On the other
hand, it’s this same open access that makes databases
vulnerable to many kinds of malicious activity.The security of data collections, which are
contained and manipulated us ing a specialized system,
otherwise known as “databases” (name given by
H.Ullman), has become increasingly complicated.
[ULLMAN1976]
Security information in database environment
contents the following issues[TIPT1997]:
– database files security;
– information secrecy;
– users authentication;
– audit users database actions;
The complexity of the design and
implementation of a database security system dependson several factors, including[SANHU, WOOD1976]:
– System users;
– Data structure; – How widely the database will be circulated, in
the case of distributed databases;
– What the consequences would be of loosinginformation;
– Specification, modelling and verification of data
security level; – Level of integration with computer systems, etc
The problematic of user’s access control it is
demonstrate in figure 1[CAST1994].
Security
policiesAccess
rulesControl
proceduresAccess
request
Access deniedAccess grantedModify
request
Fig. 1. User’s access control
The most commonly used database systems
are Microsoft Access, FoxPro and Visual Basic
database. These systems are not as secure asprogrammes such as SQL Se rver, Oracle, Sybase do.
However, Microsoft Access and other similar database
system are cheap and theref ore affordable and popular.

It is known that the Micros oft Access database files are
protected with primitive procedures. The procedure is
based on user name and password. This authenticationmechanism was hacked. That is the reason to
implement own security mechanism.[IORD2001]
In such systems, the security problems are:
– There is no control mechanism
to ensure the quality of theinformation generated by users
other than DBMS
– There is no powerful mechanism
to protect database file
– Data is not protected against
inside or outside DBMS or the
application
– It is impossible to control user
access to the database
– There has been no complete
audit of database functions
– There is no control mechanism
to ensure the quality of the
information generated by usersother than DBMS
– Data is permanently available,
other than being controlled byOS;
– There is no automatic backup
mechanism
Therefore, it is necessary to develop a security
mechanism for the access database in order to improve
its security level.
DATABASE SECURITY OBJECTIVES
Therefore, it is compulsory to implement
some security mechanism fo r database system that I
previously mentioned. The mechanism has to solve the
lack of security partia l or complete.[SCOTT2003,
DENN1982]
I suggest making the following design
changes to improve database security and address theproblems I have previously outlined:
a.The user authentication mechanism should
include the following aspects:
– The user authentication is based on
user name and password;
– The password is coded with a
specific procedure;
– Users ought to have a specific level
of security;
– The users should be grouped together
to share system tasks
Every group has specific options that are
selected through the application menu. Thesystem’s users and their jobs are shown in
figure 2.Every time the users account is accessed,
details should be automatically stored on file. The
possible users are:
– User – common users;
– Auditor – audit administrator, responsible
with audit and log files;
– DBA – database administrator;
– SA – security administrator;
– Programmer – applications programmer;
– Application manager – with full rights on
application program.
DatabaseOperating systemFile systemProgrammsAuthorization system
Transactions
managerData managerDB schemas: Views Logical and Internal
schemeDBA
SAD.B.M.S.
Programmer
Application
managerUser Access request Authentication
Auditor
User
profileAudit files
Authorization
rulesSecurity
axiomes
Fig. 2. Database security mechanism and their users
b.Coded procedures at the file or tuple level
– Data should be given a security level.
For example: Top Secret, Secret,Classified, Unclassified;
– The following information should be
coded: information about the user:username, password, security level;
details of database use activity by user;
details about the level of security ie.high etc; users login and logout
activity.
c.The most important database files should be
code protected. If it is possible the entire
database file will be coded.

SECURITY MECHANISM
In order to meet the objective outlined above,
the database should have the following structure:
– Specific mechanism to code the database
files;
– Security mechanism to solve users
request;
– Tables for: users, groups and their
security level;
– A ‘code and decode’ procedure for each
field;
– Specific menus which are generated
according to users or user group security
levels;
– An audit mechanism
Example: Security mechanism database
structure is:
Users : UserID, Username, Password, User’sgroup and user’s security level;
Group: GroupID, GroupName and
GroupDescription;SecurityLevel: Sec_LevelID, Sec_LevelName
and Sec_leveldescription.
In that situation the security database
mechanism contains:
a.User authentication mechanism
with the following data:
Users, Groups, Security level. Level
of information secrecy. Users should be given
a secrecy level, like I previously mentioned.
The secrecy levels should be defined in
relation to the content of the information thatcan be accessed
b. The menu components
Each user should have specific group
and security level and is similar with the
figure 2 users.
c. Audit mechanismEvery database access request should
be recorded in a single table. For security
reasons, I suggest this file is coded with
another algorithm. It’s important to record the
login and logout date and time and whether
access was granted or rejected.
d. Implementation of a database
security models
Many security models have been
proposed in the literature. Some of them
operate for the protection of information in
operating systems and in database systems,
such as: Access matrix, Take-Grant, Action-
Entity, Wood et.al., Sea View, Jajodia-Sandhu, Smith-Winslett, etc.
e. Security files mechanism
Implementation of a security files
mechanism in accordance with user’s function
shown in figure 2.
The security mechanism structure and
functions are described in figure 3.Workstation WorkstationDatabase
file serverServer
component
Client
componentClient
componentUser’s
requestServer’s
answer
Figure 3. Security mechanism structure and
functionality
The mechanism shown in figure 3 solve the
has the following important jobs:
– user authentication;
– code and decode the database files.We can use visual cryptography mechanism,
in order to improve the user’s authentication
mechanism.
After the mechanism decides if the user
requests are the valid one, it starts the decode process
for database files in accordance with the schemedescribe in figure 3.
Coded
Database’s filesAPPLICATION
MANAGER
(code and decode procedures)User Access request Authentication
Auditor
Audit filesUser
profile
Decoded
Database’s filesUser interface
application
Figure 4. Code and decode database files mechanism
After the user gain the right to access the
database, the application manager decodes the database
files. The decoded database files are stored in other
place than the coded files, because of security reasons.
The security of database will be increase in
that way. But, in the same time, the mechanism has one
major disadvantage: to decode and code the database
files the user will wait a period of time. During thatprocess, coding and decoding the files, the database
system is not available.
The decode operation will take place once the
first user want to access the database file. The
mechanism will keep the database file uncoded during
user working time. If other user requests to work on thesame database, the application manager gives the

access after user authentication without decode
operation. The database files are already decoded.
But, the security administrator have to specify
the period of working time in order to eliminate the
possibility the database file to stay in system uncoded.
When the period of working time is off the
user’s access is blocked and the database files are
going to be coded.
I tested and I measured the time for code and
decode using files with different dimensions.
For testing, I use the following dates:
-hardware: Pentium 600 Mhz, 256 Mo Ram;
-software: C program , with Polling-Hellman
algorithm for coding and decoding files; the gmplibrary, for operating with huge numbers (it was used
in order to implement the Polling-Hellman algorithm).
-operating system: LINUX SuSe 8.0;For test, I use six files with different
dimension.
The used files dimension is shown in Table 1.
Table 1. The used files dimension
File nameDimension
[byte]
File1 1,031,956
File2 3,617,953
File3 5,983,789
File4 57,805,051
File5 1,011,100,114
File6 543,722,827,124
The time obtained for decode operation is
shown in figure 4. I dignify the time wasdetermined in previously conditions.
Figure 4. Experiment results (time in seconds)
1 1.5 32643231
-54595145195
File1 File2 File3 File4 File5 File6
Figure 4. Experiment results
I consider the almost 4 minutes is reasonable
for one user to wait to work with database.CONCLUSIONS
The security of DBMS can be improved by
implementing:
– An application client-server to code and
decode database files;
– A user authentication mechanism;- An application menu for user options,
according to their functions;
– The coding of key internal and external
procedures for secure information;
– Tracking user access through an auditmechanism;
– A non-referential database structure;
Securing an information system can be a
costly process as it involves investing both time and
money in research and training. However, by adopting
these procedures, the security of the database can beimproved without incurring any significant expense.
This security mechanism solves the following
problems:
– activate/deactivate databases;
– code/decode database files in accordance
with users’ rights;
– grant/revoke users login;
– collect data about users’ activity;
– restrict time period when the databases are
available;
– possibility to manage more than one
database.
The problems that I previously mentioned are
advantages but, there is also disadvantages, at the same
time. The most important disadvantages consist of long
time action for coding and decoding database files.Therefore, the proposal database security mechanism it
is very useful in case of small databases. The database
security increases in these systems.
It is compulsory to program the application
with other software than database software. For
example, you it can be use C++, JAVA or something
like that. Hereby, the users can’t access the database
through Access DBMS, VBA or other software
because the database files w ill be coded. This solution
has great results with small database files. If the
dimension of database file is huge time for code and
decode is great. This is a disadvantage. But, thedatabase security is improved and the database
management is secure.
REFERENCES
AMO1994 Amoroso E. 1994, Fundamentals of
Computer Security Technology ,
Prentice Hall International Editions
DENN1982 Denning D.E. 1982, Cryptography
and Data security , Addison-Wesley,

DION1981 Dion L.C. 1981, A Complete
Protection Model , in proceedings
IEEE Symp. on Security and Privacy,Oakland, CA
HRU1976 Harrsion M., Ruzzo W.L., Ullman
J.D. 1976, Protection in Operating
System , Communications of the
ACM, vol 19
IORD2001 Iordache D. 2001, Amenințări asupra
securității sistemelor de calcul ,
Buletinul științific al ANMB nr. 3-4
IORD2001 Iordache D. 2001, Detecția intrușilor
într-o re țea UNIX ( LINUX ) ,
Buletinul Științific al ANMB, nr. 1
IORD2001 Iordache D. 2001, Modele de
securitate pentru bazele de date ,
Buletinul științific al ANMB nr. 2
TIPT1997 Krause M., Tipton H. 1997,
Handbook of Information Security
Management, CRC Press LLC
CAST1994 Castano S., Fugini M.G., Martella G.,
Samarati P., 1994, Database
Security , Addison-Wesley Publishing
CompanySANDHU S. Oh, R.Sandhu, A Model for Role
Administration Using Organization
Structure,http://www.list.gmu.edu/confrnc/sac
mat/sacmat02-oh.pdf
SCOT2003 Scott N. 2003, Database security:
protecting sensitive and critical
information,
http://www.infosyssec.org
TSICH1977 Tsichritzis D., Klug A. 1977, DBMS
framework report of the study group
on database management
systems, AFIPS Press
ULLM1980 Ullman J.D. 1980, Principles of
Database Systems , Computer Science
Press
WOOD1979 Wood C., Summers R.C., Fernandez
E.D. 1979, Authorization in
Multilevel Database Models ,
Information Systems PergamonPress, vol. 4

Similar Posts

  • CUNOȘTINȚE ȘI ATITUDINI ALE STUDENȚILOR FAȚĂ DE PERSOANELE CU AUTISM [606735]

    UNIVERSITATEA BABEȘ -BOLYAI CLUJ -NAPOCA FACULTATEA DE SOCIOLOGIE ȘI ASISTENȚĂ SOCIALĂ SPECIALIZAREA ASISTENȚĂ SOCIALĂ CUNOȘTINȚE ȘI ATITUDINI ALE STUDENȚILOR FAȚĂ DE PERSOANELE CU AUTISM LUCRARE DE DIPLOMĂ Coordonator științific : Student: [anonimizat]. univ.dr. Florina Pop Duca Diana Andreea Conf. univ.dr. Iovu B ogdan Cluj-Napoca 2017 1 CUPRINS 1. INTRODUCERE ………………………….. ………………………….. ………………………….. ………………………….. …… 3…

  • G42G36G37G53G44G40G47G36G3G48G56G49G55G40G36G49G56G3 [606840]

    /G3 /G42/G36/G37/G53/G44/G40/G47/G36/G3/G48/G56/G49/G55/G40/G36/G49/G56/G3 /G3 /G54/G44/G54/G55/G40/G48/G40/G3/G39/G40/G3/G40/G39/G56/G38/G36 /G44/G40/G3/G48/G56/G61/G44/G38/G36/G47 /G3 /G40/G71/G76 /G76/G68/G3/G68/G3/G44/G44/G16/G68/G3 /G3/G139/G3/G40/G71/G76/G87/G88/G85/G68/G3/G41/G88/G81/G71/G68 /G76/G72/G76/G3/G53/G82/G80/G107/G81/G76/G68/G3/G71/G72/G3/G48/G107/G76/G81/G72 /G15/G3/G21/G19/G19/G28 /G3 /G3 /G40/G71/G76/G87/G88/G85 /G3/G68/G70/G85/G72/G71/G76/G87/G68/G87 /G3/G71/G72/G3/G48/G76/G81/G76/G86/G87/G72/G85/G88/G79/G3/G40/G71/G88/G70/G68 /G76/G72/G76/G15/G3/G38/G72/G85/G70/G72/G87 /G85/G76/G76/G3/G250/G76/G3/G44/G81/G82/G89 /G85/G76/G76/G15/G3 /G83/G85/G76/G81/G3/G38/G82/G81/G86/G76/G79/G76/G88/G79/G3/G49/G68 /G76/G82/G81/G68/G79/G3/G68/G79/G3/G38/G72/G85/G70/G72/G87 /G85/G76/G76/G3/G249/G87/G76/G76/G81 /G76/G73/G76/G70/G72/G3/G3 /G71/G76/G81/G3/G204/G81/G89 /G80/G107/G81/G87/G88/G79/G3/G54/G88/G83/G72/G85/G76/G82/G85/G3 /G3 /G3 /G3 /G3/G3 /G3 /G3/G3 /G3 /G3 /G3 /G53/G72/G83/G85/G82/G71/G88/G70/G72/G85/G72/G68/G3/G76/G81/G87/G72/G74/G85/G68/G79 /G3/G86/G68/G88/G3/G73/G85/G68/G74/G80/G72/G81/G87/G68/G85 /G15/G3/G83/G85/G76/G81/G3/G82/G85/G76/G70/G72/G3/G73/G82/G85/G80 /G3/G3 /G250/G76/G3/G83/G85/G76/G81/G3/G82/G85/G76/G70/G72/G3/G80/G76/G77/G79/G82/G68/G70/G72/G3/G87/G72/G75/G81/G76/G70/G72/G15/G3/G72/G86/G87/G72/G3/G86/G87/G85/G76/G70/G87/G3/G76/G81/G87/G72/G85/G93/G76/G86 /G3/G250/G76/G3/G86/G72/G3/G83/G72/G71/G72/G83/G86/G72/G250/G87/G72/G3/G70/G82/G81/G73/G82/G85/G80/G3/G79/G72/G74/G76/G76/G17/G3 /G3 /G3 /G53 /G86/G83/G88/G81/G71/G72/G85/G72/G68/G3/G83/G72/G81/G87/G85/G88/G3/G70/G82/G81 /G76/G81/G88/G87/G88/G79/G3/G250/G76/G3/G82/G85/G76/G74/G76/G81/G68/G79/G76/G87/G68/G87/G72/G68/G3/G87/G72/G91/G87/G88/G79/G88/G76/G3 /G85/G72/G89/G76/G81/G72/G3/G72/G91/G70/G79/G88/G86/G76/G89/G3/G68/G88/G87/G82/G85/G88/G79/G88/G76/G18/G68/G88/G87/G82/G85/G76/G79/G82/G85/G17 /G3 /G3 /G3 /G3 /G3 /G3/G3/G3 /G3 /G3 /G53/G72/G71/G68/G70/G87/G82/G85/G29/G3/G48/G76/G75/G68/G72/G79/G68/G3/G49/G17/G3/G249/G55/G40/G41/G36/G49/G3…

  • Lucrare de disertație [628092]

    UNIVERSITATEA BABEȘ -BOLYAI Facultatea de Științe Economice și Gestiunea Afacerilor Fiscalitate Lucrare de disertație Absolvent: [anonimizat], Conf. univ. dr. Adrian GROȘ ANU 2020 UNIVERSITATEA BABEȘ -BOLYAI Facultatea de Științe Economice și Gestiunea Afacerilor Programul de studii: Fiscalitate Lucrare de disertație Procedura priv ind recuperarea TVA plătit ă în alte state membre ale Uniunii Europene Absolvent:…

  • Download File 1 [606605]

    UNIVERSITATEA DIN CRAIOVA FACULTATEA DE AUTOMATIC Ă, CALCULATOARE ȘI ELECTRONIC Ă DEPARTAMENTUL DE MECATRONIC Ă ȘI ROBOTIC Ă PROIECT DE DIPLOM Ă Dorinel-Vasilu ță Zamfirescu COORDONATOR ȘTIIN ȚIFIC PROF. UNIV. DR. ING. Mircea Ni țulescu IULIE 2018 CRAIOVA UNIVERSITATEA DIN CRAIOVA FACULTATEA DE AUTOMATIC Ă, CALCULATOARE ȘI ELECTRONIC Ă DEPARTAMENTUL DE MECATRONIC Ă ȘI ROBOTIC…

  • Secția de Arabă [631849]

    Iunie, 2018 Universitatea din București Facultatea de Limbi și Literaturi Străine Secția de Arabă LUCRARE DE LICENȚĂ Al-fiˁlu bi-lluġati al-ˁarab ῑyati fῑ Ğidda Verbul în araba vorbită la Jedda Coordonator: Absolventă: Prof. dr. George Grigore Maria Mădălina Ciurea 2 Cuprins ARGUMENT…………………………………………………………. …………………. ……… 3 I. ASPECTE GENERALE ALE DIALECTULUI DIN JEDDA……… …………4 1. Geografie și…