Security Issues in Database
Dr.Nermin Hamza Ewais Assistance Professor IT department Faculty of Computing and information Technology King Abd El-Aziz University
Security Issues in Database Dr.Nermin Hamza Ewais Assistance - - PowerPoint PPT Presentation
Security Issues in Database Dr.Nermin Hamza Ewais Assistance Professor IT department Faculty of Computing and information Technology King Abd El-Aziz University Abstract Many organizations today are implementing cloud-based solutions to
Dr.Nermin Hamza Ewais Assistance Professor IT department Faculty of Computing and information Technology King Abd El-Aziz University
Many organizations today are implementing cloud-based solutions to reduce cost
and improve the efficient . Due to its high demand, cloud providers are now
as Database as a service or DBaaS which is essentially an on-demand database accessible to the consumers from the cloud over the Internet
The new trend is to make the database outsourced, which gained benefits such as
increase data availability, reduce, the cost.
We presented a model based on outsourcing database. The model architecture
performs most of the data processing through the SMP (Secure Middle Part), for reducing computation and communication overhead by partially encrypting the data and information and increasing data confidentiality through using deferent encryption techniques.
2 18/04/2017
3 18/04/2017
4 18/04/2017
5 18/04/2017
The Term Cloud refers to Network or Internet . In Other words , we can say that the cloud is some
thing which can present in remote location.
Cloud computing is a general term for the delivery of
hosted services over the internet.( could be software
6 18/04/2017
Infrastructure as a service (IaaS) Platform as a service (PaaS) Software as a service (SaaS).
7 18/04/2017
Infrastructure as a service (IaaS) Is category of cloud computing services. With IaaS, you rent IT
infrastructure—servers and virtual machines (VMs), storage, networks, operating systems—from a cloud provider on a pay-as- you-go basis..
Characteristics of IaaS Distribution of resources as a service Utility pricing model and variable costs, Allows multiple users to work on a single set of hardware
8 18/04/2017
Platform as a service (PaaS) a cloud provider delivers hardware and software tools -- usually
those needed for application development -- to its users as a service
PaaS Characteristics Develop, test and deploy software and applications Built-in scalability for load balancing and failover Web-based tools for the creation, modification and flawless
deployment of User Interfaces
9 18/04/2017
Software as a service (SaaS). SaaS is the basic and most important form of cloud services that
represents the largest portion of the cloud market. It uses the web to distribute applications that are hosted and run by third- party vendors.
As a client, you can run SaaS applications directly via a web
browser without having to download or install anything.
Characteristics of SaaS
Access to commercial software on the web Centralized software management Managed software upgrades and integration of different software parts
with help of APIs
10 18/04/2017
11 18/04/2017
12 18/04/2017
13 18/04/2017
Database as a Service (DBaaS) is a new service model
Based on SaaS, DBaaS moves database management system (DBMS) from a traditional client-server architecture to a third party architecture – where data management is not handled by the data owner.
The traditional Client-Server : where the data owner
is responsible for managing DBMS and responding to user’s queries
14 18/04/2017
DBaaS eliminates the need for installing,
maintaining and storing data on the local database servers (hard drives or disks).
DBaaS supports structured, unstructured or semi-
structured data
Data owners outsource their data to data service
providers such as Google , Amazon , and Microsoft
15
18/04/2017
16 18/04/2017
17 18/04/2017
The database security services are:
18 18/04/2017
This service ensures that the users and programs
are correctly identified and verified.
This service depends on the operating systems or
database application or both.
The famous mechanisms are DB authentication
with passwords, operating system authentication, Kerberos etc…
19 18/04/2017
20 18/04/2017
Access control service is also called Authorization
security service.
It ensures that the correctly subject, such as users
programs, can only perform operations on the allowed database object, such as tables and views.
Discretionary Access Control (DAC) Mandatory Access Control (MAC) Role-Based Access Control (RBAC)
21 18/04/2017
Discretionary Access Control (DAC) Subject access object according to a list of permissions granted
to the subjects.
In DAC one user could create any object and grant or revoke some
permissions as reading, writing …etc. to another user.
Example :
User may transfer object ownership to another user(s). User may determine the access type of other users. After several attempts, authorization failures restrict user access.
22 18/04/2017
Mandatory Access Control (MAC) Policies regulate access to data by subjects on the basis of the
predefined classifications of the subjects and objects in the system
In mandatory access control (MAC), the system (and not the users)
specifies which subjects can access specific data objects.
For example, if a user has a security clearance of secret, and he
requests a data object with a security classification of top secret, then the user will be denied access because his clearance is lower than the classification of the object.
23 18/04/2017
Role-Based Access Control (RBAC) Permissions are assigned according to the Role and are centrally
administered according to the organization structure
A fundamental difference between DAC and RBAC is that users in
RBAC cannot pass access permissions on to other users DAC.
24 18/04/2017
This service will prevent the improper discovery of information
to unauthorized users.
This service can be achieved by two methods, which are encryption and employee confidentiality training
25 18/04/2017
Database integrity ensures that both the creation and
changing of information are done according to a set of predefined rules and constrains
Many mechanisms Checksum mechanism, this one is done to ensure the integrity of the stored
data by calculate the check sum of this stored data and then store the result.
When the data is accessed the checksum is
recalculated to verify the data.
26 18/04/2017
Database Availability services make sure that data is
accessible to the right person when it is needed.
Availability implies the system fault tolerance and
redundancy in the data.
The main mechanisms used to reach database availability
is hardware redundancy, database backup, recover log
27 18/04/2017
This service is often disregarded. physical security asset is the first
step in database security.
Several methods can be done in
as:
walls can be built, security
doors, alarms, locks, spring- loaded floors and so on.
28 18/04/2017
18/04/2017 29
30 18/04/2017
31 18/04/2017
32 18/04/2017
We presente a database security model which
is based on semi-trusted database server model and partial database encryption;
33 18/04/2017
Trusted model : the trusted database server where the creator,
server
Un-trusted (Database as service) , outsource : server where the owner’s database is stored
at the service provide model … vulnerable
Semi – Trusted
34 18/04/2017
35
Database encryption refers to the use of encryption techniques to transform a plain text database into a encrypted database, thus making it unreadable to anyone except those who possess the knowledge of the encryption key(s). Partial database encryption: is encryption for the
them
18/04/2017
36 18/04/2017
There are some important questions to address in planning
which include the followings:
How many encryption keys will you need? How will you manage keys? Where will the keys be stored? How will you protect access to the encryption keys? How often should keys change?
37 18/04/2017
The process of encryption can be performed either 1) Encrypt whole database, if the DBMS supports
the encryption features, or
2) Outside the DBMS, where encryption processing
and key storage is offloaded to a centralized Encryption Servers.
38 18/04/2017
STRENGTHS/BENEFITS
Applications are unaffected
Encryption may already be provided in database product
WEAKNESSES
Extra processing = performance degradation
Data at risk outside the database
Encryption keys are stored in a database table with encrypted text, no separation of keys from the text
In order to separate the keys, additional hardware is required — like HSMs
protection of keys which is based on passwords, are difficult to manage and insecure
Limited choice in algorithms supported
39 18/04/2017
STRENGTHS/BENEFITS
Off-load crypto processing from database server Separates the encrypted data from the encryption keys in order to achieve secure
storage
Easy to apply strong authentication solutions that work with encryption server Can separate administrator roles More control over who can accesses the data Scalable – can scale to handle encryption from many applications and many
databases
If database incapable of handling the encryption functionality, no need to buy a
new database and migrate data
Provides end-to-end encryption from the client to encryption server
40 18/04/2017
WEAKNESSES
Communication overhead Must administer more servers Must change or modify applications Must harden the encryption server with an authentication policy and a way to
monitor and log events
41 18/04/2017
In our system How to protect Data?
Encryption (Partial-Encryption) Management of access Cryptography keys.
42 18/04/2017
43 18/04/2017
44 18/04/2017
clients or owners secure Meta Part (SMP), and outsourcing database.
45 18/04/2017
Client Database Server Our Security system SMP Secure Middle Part
Client Authentication Module SMM Secure Meta Mediator Server Authentication Module
46 18/04/2017
The Client side could be database owners or customers
The database owner: The database owner is the actual database
creator.
Database Clients or Customers: Database clients are the actual data users,
who read, write and modify the database records according to their privileges.
47 18/04/2017
Client
Secure Meta Part SMP : Is the middle server that contains (Client authentication, SMM, and Server Authentication)
48
SMP Secure Middle Part
Client Authentication Module SMM Secure Meta Mediator Server Authentication Module
18/04/2017
The Database Server: Contains:
The Encrypted Database The Database Service Provider (DSP)
49
D B
DSP
DB server
18/04/2017
Client Database Server Our Security system SMP Secure Middle Part
Client Authentication Module SMM Secure Meta Mediator Server Authentication Module
50 18/04/2017
Authentication protocol
The SMM: is the middle server that
contains the keys which will be available to the clients according to their authorization level.
This server performs the
authorization process. -- Note that the authentication process has been done by the authentication module as mentioned previously and a key session was established to communicate -- Also this server performs the query processing work
Client Query Interfac e Server Query Interfac e
Query Processing
Query Preparation Result Set Preparation
Secure Meta Mediator
51 18/04/2017
Client query module: This module performs authorization process (according
to the client’s assigned privileges such as Database Access Control Lists (ACL)).
Query Processing module: the query processing consists of two components
(query Preparation and result set Preparation) the first component will start to prepare the query. The second module prepares the result set of the data and information to be transmitted to the client/owner.
The server query module: this module sends execution query to the DSP for
retrieving desired record and receives the result set.
Client Query module Server Query module
Query Processing
Query Preparation
Result Set Preparation
Secure Meta Mediator
52 18/04/2017
The outsourced database: contains the encrypted data
base and the database server provider (DSP).
The benefits of database outsourcing are to verify high
availability, cost reduction.
The outsourcing database also does not enable the data to
be decrypted, to be analyzed or either to be tempered by making the main work be performed on SMM.
53 18/04/2017
54 18/04/2017
Query Processing
Un-encrypted data. Owner data. Client private data.
55 18/04/2017
56
Field1 Field2 Field3 Field4 Client data
Client data
Field1 Field2 Field3 Field4 EClient key (Client data) EOwner key(owner data) EClient key(Client data) Owner data Not encrypted as
Relation Name Relation Name
18/04/2017
57
Key name Storage place
Owner key SMM Encrypted with the public key of the authorized user Client key SMM and/or smart token
18/04/2017
58
2- The Owners design and create the DB 1- The organization decides to outsource its DB
18/04/2017
Database
Encrypt with creation Key SMM Secure Meta Mediator Database Server DB
Creation Key Meta Data
59 18/04/2017
Client SMM
Secure Meta Mediator 1- The client connects to the application through secure authentication using our authentication protocol.
Client Query Client Query Interface Server Query Interface
Session Key
Query Processing
Query Preparation Result Set Preparation
Query Processing
60 18/04/2017
SMM
Secure Meta Mediator
Client Query Query Processing Server Query Database Server
Database
DSP The Prepared Query The Result Set
61 18/04/2017
Client SMM
Secure Meta Mediator
Result Set Client Query Query Processing Server Query
Session Key
62 18/04/2017
63
Storage Comparison
18/04/2017
64 18/04/2017
65 18/04/2017
66 18/04/2017
Used Key Types:
key for the authorized person)
18/04/2017 67
Key backup and recovery Session key needs no recovery Secrete keys: SMM can take backup Smart Token… according to organization
policies
68 18/04/2017
Key storage
The key (private key of the client) …At the
smart token .
The session keys… At the memory The store secret keys … the SMM or smart
token.
69 18/04/2017
Key Length
Key- pair 2048 bits Session key 256 Secrete keys 256
Can be upgraded to 512
70 18/04/2017
71 18/04/2017
72 18/04/2017
UPDATE table_name SET field_name = new_value WHERE condition
73 18/04/2017
74 18/04/2017
Encryption = Extra Disk +Extra CPU cycle Many factors can be affected:
Encryption algorithm. Key place Key length Data base encryption layer
75 18/04/2017
Performance Comparison
76
500 1000 1500 2000 2500 3000 1 116 230 600 1300 7500 11345 13577 Time in milleseconds number of returned records
Query on one table and decrypt for one field
plain column
18/04/2017
Performance Comparison
77
500 1000 1500 2000 1 150 550 820 2550 3800 5000 Time in milleseconds Number of returned records
Query on one table and decrypt two fields
plain columns encrypted columns
18/04/2017
Performance Comparison
78
3000 6000 9000 12000 15000 18000 1 150 550 820 2550 3800 5000 Time in milleseconds Number of returned record
Query on two tables and encryption for two fields
Plain columns Encrypted columns
18/04/2017
Performance Comparison
79
0.00% 200.00% 400.00% 600.00% 800.00% 1 150 550 820 2550 3800 5000
percentage of increasing
percentage of increasing
18/04/2017
Performance Performance
80
10000 20000 30000 40000 50000 60000 100 200 400 500 600 800 1000 execution time in millseconds number of inserted rows
insertion at one table with an encrypted column
plain encrypted 0.00% 2.00% 4.00% 6.00% 8.00% 10.00% 12.00% 14.00% 16.00% 100 200 400 600 800 1000 percentage of increasing in time number of inserted rows
increasing in time in insearion process for one-field Encryption
percentage of increasing
18/04/2017
We present a D.B. security Model based on mixed-encryption
with semi- trusted data base server.
Our DB security model based on partial-encrypted database .
18/04/2017 81
Hamza. N. and Hassan.B, "A Dynamic ID-based authentication
scheme with smart token ", International Conference
Computer Engineering & Systems, 2009. ICCES 2009. Page(s): 294 – 299
Hamza.
N. and Hassan.B, “A proposal for an ID-Based authentication scheme using smart token.”, scientific conference on cyber crime&information security, ACU, 2009
Al thneibat. Ahmed, Hasan.Bahaa Eldin M.,
Fatah .A., Hamza. Nermine, “Secure Outsourced Database Architecture”, IJCSNS International Journal
Computer Science and Network Security, VOL.10 No.5, May 2010.
82 18/04/2017
83 18/04/2017
84 18/04/2017