Friday 23 October 2015

Efficient Enforcement of Action-Aware Purpose-Based Access Control within Relational Database Management Systems


ABSTRACT:
Among the variety of access control models proposed for database management systems (DBMSs) a key role is covered by the purpose-based access control model, which, while enforcing access control, also achieves basic privacy preservation. We believe that DBMSs could greatly take benefit from the integration of an enhanced purposed based model supporting highly customized and efficient access control. Therefore, in this paper we propose a purpose-based model that supports action-aware policy specification and a related efficient enforcement framework to be integrated into relational DBMSs. The experimental evaluations we have performed show the feasibility and efficiency of the proposed framework.
AIM
The aim of this paper this paper propose a purpose-based model that supports action-aware policy specification and a related efficient enforcement framework to be integrated into relational DBMSs

SCOPE
 The Scope of this project shows the feasibility and efficiency of the efficient enforcement framework.
EXISTING SYSTEM
Some of these proposals enhanced the core purpose-based model with additional features to increase the efficacy of the control. For instance, in   purpose based access control is combined with role based mechanisms. We believe that the support for more expressive policies could potentially lead to define highly customized forms of access control, and relational DBMSs could greatly take benefit from the integration of models with these capabilities. However, in order to make achievable the integration, efficient enforcement techniques are needed.  
DISADVANTAGES:
  1. The enforcing access control, also achieves basic privacy preservation
  2.  A  privacy oriented perspective, purposes represent the essence of privacy policies, whereas from a security perspective, a new complementary dimension of access control

PROPOSED SYSTEM
In this paper propose an action-aware purpose-based access control model for relational DBMSs, namely, a purpose-based model which enforces fine grained access control on the basis of 1) the purposes of the access, 2) the actions executed by SQL queries on the accessed data, and 3) the categories of the accessed data. For instance, given a table Employees (name, role, salary), let us consider the queries qa: select name, salary from Employees and qb: select count(name), avg(salary) from Employees. These two queries disclose different information related to the stored data. Indeed, the actual content of the fields name and salary of Employees’ tuples, is only shown by the result set of qa. As such, qa shows an higher threatening level than qb. Proper policies should therefore be defined to regulate the execution of queries based on the actions (i.e., combinations, aggregations, filtering) that are executed on data. Moreover, data stored into different table columns can belong to data categories characterized by different sensitivity levels.  
ADVANTAGES
  1. To  minimize policy enforcement overhead
  2. The enforcement is achieved through query rewriting

SYSTEM ARCHITECTURE:



SYSTEM CONFIGURATION

HARDWARE REQUIREMENTS:-

·       Processor                    -   Pentium –III

·      Speed            -    1.1 Ghz
·      RAM             -    256 MB(min)
·      Hard Disk              -   20 GB
·      Floppy Drive         -    1.44 MB
·      Key Board             -    Standard Windows Keyboard
·      Mouse           -    Two or Three Button Mouse
·      Monitor                 -    SVGA

SOFTWARE REQUIREMENTS:-

·      Operating System          : Windows  7                                  
·      Front End                      : JSP AND SERVLET
·      Database                       : MYSQL
REFERENCE:
Ferrari, E., Colombo, P. “Efficient Enforcement of Action-Aware Purpose-Based Access Control within Relational Database Management Systems”, IEEE Transactions on Parallel and Distributed Systems, Volume 27 Issue 8, MARCH 2015.





No comments:

Post a Comment