ABSTRACT:
Among
the variety of access control models proposed for database management systems
(DBMSs) a key role is covered by the purpose-based access control model, which,
while enforcing access control, also achieves basic privacy preservation. We
believe that DBMSs could greatly take benefit from the integration of an
enhanced purposed based model supporting highly customized and efficient access
control. Therefore, in this paper we propose a purpose-based model that
supports action-aware policy specification and a related efficient enforcement
framework to be integrated into relational DBMSs. The experimental evaluations
we have performed show the feasibility and efficiency of the proposed
framework.
AIM
The
aim of this paper this paper propose a purpose-based model that supports
action-aware policy specification and a related efficient enforcement framework
to be integrated into relational DBMSs
SCOPE
The Scope of this project shows the
feasibility and efficiency of the efficient enforcement framework.
EXISTING SYSTEM
Some
of these proposals enhanced the core purpose-based model with additional
features to increase the efficacy of the control. For instance, in purpose based access control is combined with
role based mechanisms. We believe that the support for more expressive policies
could potentially lead to define highly customized forms of access control, and
relational DBMSs could greatly take benefit from the integration of models with
these capabilities. However, in order to make achievable the integration,
efficient enforcement techniques are needed.
DISADVANTAGES:
- The enforcing access control, also achieves basic privacy preservation
- A privacy oriented perspective, purposes represent the essence of privacy policies, whereas from a security perspective, a new complementary dimension of access control
PROPOSED SYSTEM
In
this paper propose an action-aware purpose-based access control model for
relational DBMSs, namely, a purpose-based model which enforces fine grained
access control on the basis of 1) the purposes of the access, 2) the actions
executed by SQL queries on the accessed data, and 3) the categories of the
accessed data. For instance, given a table Employees (name, role, salary), let
us consider the queries qa: select name, salary from Employees and qb: select
count(name), avg(salary) from Employees. These two queries disclose different
information related to the stored data. Indeed, the actual content of the
fields name and salary of Employees’ tuples, is only shown by the result set of
qa. As such, qa shows an higher threatening level than qb. Proper policies
should therefore be defined to regulate the execution of queries based on the
actions (i.e., combinations, aggregations, filtering) that are executed on
data. Moreover, data stored into different table columns can belong to data
categories characterized by different sensitivity levels.
ADVANTAGES
- To minimize policy enforcement overhead
- The enforcement is achieved through query rewriting
SYSTEM ARCHITECTURE:
HARDWARE REQUIREMENTS:-
· Processor - Pentium –III
· Speed - 1.1 Ghz
· RAM - 256 MB(min)
· Hard Disk - 20 GB
· Floppy Drive - 1.44 MB
· Key Board - Standard
Windows Keyboard
· Mouse - Two or Three Button Mouse
· Monitor - SVGA
SOFTWARE REQUIREMENTS:-
·
Operating
System : Windows 7
·
Front
End :
JSP AND SERVLET
·
Database :
MYSQL
REFERENCE:
Ferrari,
E., Colombo,
P. “Efficient
Enforcement of Action-Aware Purpose-Based Access Control within Relational
Database Management Systems”, IEEE Transactions on Parallel
and Distributed Systems, Volume 27 Issue 8, MARCH 2015.
No comments:
Post a Comment