UNIT 1 - Database Security
UNIT 1 - Database Security
School of Computing
Department of Networking and Communications
Dr. SHANMUGANATHAN V
Assistant Professor / NWC
Course Content
Unit 1
Polyinstantiation, Integrity Lock, Sensitivity Lock, Security Models, Access
Controls (Grant & Revoke), Distributed Database Security, Outsourced Database and
Tree.
2
Polyinstantiation
Definition
instances (rows) of the same primary key to exist in a table, each with different
3
Polyinstantiation
Purpose
military or intelligence systems), polyinstantiation ensures that users can only see
the data they are cleared for, without realizing that higher-classified data even
exists.
4
Polyinstantiation
Example
A user with "Unclassified“clearance will only see the first row. A user with
5
Polyinstantiation
higher-level data.
Data Integrity: Avoids errors that could arise from overwriting or denying
6
Polyinstantiation
Challenges
Data Redundancy: Same keys with different values can confuse application
logic.
controls.
7
Polyinstantiation
Applications
Military databases
8
Polyinstantiation
Summary
For example, two entries may exist for the same user ID one visible to
unclassified users and one to secret-level users without either interfering with
the other. This supports data confidentiality, inference control, and access
restriction based on security clearance.
9
Polyinstantiation
10
Polyinstantiation
11
Polyinstantiation
12
Integrity Lock
Definition
data integrity and access control by binding security labels or control information
directly with each data item. It combines the actual data with a security label or
where data and users operate at different security levels (e.g., Confidential, Secret,
Top Secret).
13
Integrity Lock
Integrity Constraint: A policy or rule defining who can access or modify the
14
Integrity Lock
User Credentials (such as role, clearance level, department) are matched against
If the user's access level satisfies the constraint, the operation is allowed.
15
Integrity Lock
16
Integrity Lock
Advantages
Features Benefit
Enforces access control at the
Fine-Grained Control
individual data item level
Prevents unauthorized reads and
Enhanced Security
writes based on defined policies
Allows custom conditions like role,
Flexible Policies
department, and clearance
Ideal for environments with multiple
Supports MLS Systems
security classifications
17
Integrity Lock
Challenge Description
Extra checks on every access can
Performance Overhead
reduce speed and performance
Each data item must store additional
Storage Overhead
metadata (label + constraint)
Requires support from the DBMS and
Complex Implementation
accurate policy modeling
Managing and updating security rules
Maintenance Difficulty
across records can be cumbersome
18
Integrity Lock
Applications
classification levels.
19
Integrity Lock
Summary
each data item with a security label and access control condition. This ensures that
access or modification occurs only when the user meets the defined security policy.
20
Integrity Lock
21
Integrity Lock
22
Integrity Lock
23
Sensitivity Lock
Definition
sensitive data by controlling access based on data classification and user clearance
levels. It’s primarily used in multilevel security (MLS) environments, like those in
24
Sensitivity Lock
Concept of Sensitivity
information.
databases.
25
Sensitivity Lock
Access Control Enforcement - Users can only view or modify data if their
26
Sensitivity Lock
Example
A user with Secret clearance Can view Confidential and Secret data.
At the same time, it cannot access Top Secret data Sensitivity Lock prevents it.
27
Sensitivity Lock
Benefits
28
Sensitivity Lock
Challenges
29
Sensitivity Lock
Integrity Lock: Combines data with integrity labels for ensuring both data
30
Sensitivity Lock
31
Sensitivity Lock
32
Sensitivity Lock
33
Sensitivity Lock
34
Sensitivity Lock
35
Sensitivity Lock
Aspect Second-Party Data Third-Party Data
36
Security Models
data is accessed and protected within a database. They provide structured methods
37
Security Models
Objectives of Security Models
Access Control Enforcement: Defining who can access what data and under
what conditions.
systematically.
38
Security Models
39
Security Models
Features
40
Security Models
Advantages
Disadvantages
41
Security Models
assigned to both users and data objects. Users can access only data that matches
Features
42
Security Models
Advantages
Disadvantages
Complex to manage.
43
Security Models
Features
Permissions are assigned to roles, and users inherit permissions from their roles.
44
Security Models
Advantages
Disadvantages
45
Security Models
Formal Security Models Used in Database Security
46
Security Models
Bell-LaPadula (BLP) Model – Confidentiality Oriented
Key Principles
Simple Security Property (No Read Up) – A subject cannot read data at a higher
classification level.
"Unclassified" data.
47
Security Models
Biba Model – Integrity Oriented
Key Principles:
Simple Integrity Property (No Read Down) – A subject cannot read data at a
integrity level.
Example: A highly trusted process cannot use untrusted (low integrity) data.
48
Security Models
Clark-Wilson Model – Commercial Integrity
Features
49
Security Models
Brewer-Nash (Chinese Wall) Model – Conflict of Interest
Features
A user who accesses one company’s data cannot access competitors’ data.
Example: An analyst who accesses "Company A" financials cannot later access
50
Security Models
Harrison-Ruzzo-Ullman (HRU) Model
Features
51
Security Models
Comparison of Security Models
52
Security Models
Conclusion
enforce policies, restrict unauthorized access, and protect data integrity and
53
Security Models
54
Security Models
55
Security Models
56
Security Models
57
Access Controls (Grant & Revoke)
Access control is a method of regulating who can access what data and
58
Access Controls (Grant & Revoke)
59
Access Controls (Grant & Revoke)
60
Access Controls (Grant & Revoke)
Purpose
61
Access Controls (Grant & Revoke)
Syntax
Sql
GRANT privilege_list
ON object_name
TO user_or_role
62
Access Controls (Grant & Revoke)
Explanation of Terms
WITH GRANT OPTION (optional) - Allows the recipient to further grant the
permission to others.
63
Access Controls (Grant & Revoke)
Example 1
sql
ON Employees
TO user1;
This gives user1 the ability to read and insert records into the Employees table.
64
Access Controls (Grant & Revoke)
Example 2
sql
GRANT SELECT
ON Employees
TO user2
user2 can now read the table and also grant SELECT access to others.
65
Access Controls (Grant & Revoke)
Purpose
Syntax in sql
REVOKE privilege_list
ON object_name
FROM user_or_role;
66
Access Controls (Grant & Revoke)
Example
sql
REVOKE INSERT
ON Employees
FROM user1;
This removes the ability of user1 to insert records into the Employees table.
67
Access Controls (Grant & Revoke)
If a user has been granted a privilege with the GRANT OPTION, and that
user grants it to another, revoking the privilege from the first user may cascade and
68
Access Controls (Grant & Revoke)
Example
If Admin revokes SELECT from Alice, Bob also loses the privilege (depending on
69
Access Controls (Grant & Revoke)
Application-Level Control: Limit app users to only the operations they need.
audits.
70
Access Controls (Grant & Revoke)
Best Practices
Use roles: Assign privileges to roles instead of individual users for easier
management.
71
Access Controls (Grant & Revoke)
Common Privileges in SQL
Privilege Description
72
Access Controls (Grant & Revoke)
Summary
73
Access Controls (Grant & Revoke)
74
Access Controls (Grant & Revoke)
75
Access Controls (Grant & Revoke)
76
Access Controls (Grant & Revoke)
77
Distributed Database Security
A Distributed Database (DDB) is a collection of multiple logically
systems is far more complex than in centralized databases due to the decentralized
stored across multiple locations and accessed over networks. Security must be
maintained both locally at each site and globally across the system.
78
Distributed Database Security
Core Security Challenges in Distributed Databases
Security Concern Description
Verifying identities of users across
Authentication
multiple sites.
Enforcing user permissions across
Authorization
nodes with consistent policies.
Ensuring sensitive data is protected
Confidentiality
during storage and transit.
Preventing unauthorized or accidental
Integrity
data modification.
Guaranteeing data can be accessed even
Availability
during node failure or attack.
Security policies must be uniformly
Consistency of Policies
enforced across all sites.
Protecting inter-node data transfer from
Communication Security
interception and tampering.
79
Distributed Database Security
Components of Distributed DB Security Architecture
80
Distributed Database Security
Global Security Management
81
Distributed Database Security
Security Mechanisms in DDBMS
Access Control
82
Distributed Database Security
Authentication & Authorization
LDAP).
Encryption
83
Distributed Database Security
Audit and Logging
84
Distributed Database Security
Security in Distributed Query Processing
85
Distributed Database Security
Security Models in Distributed Databases
Model Description
86
Distributed Database Security
Best Practices for Distributed DB Security
87
Distributed Database Security
Conclusion
88
Distributed Database Security
89
Distributed Database Security
90
Distributed Database Security
91
Distributed Database Security
92
Outsourced Database & Security Requirements
Azure, Oracle Cloud). While this offers flexibility and cost benefits, it introduces
Since data is stored and processed outside the organization's control, risks
like data breaches, unauthorized access, insider threats, and compliance violations
93
Outsourced Database & Security Requirements
An outsourced database is
centers).
Managed by third-party vendors, not by the organization that owns the data.
94
Outsourced Database & Security Requirements
Data Confidentiality
Data Integrity
Secure Multi-Tenancy
95
Outsourced Database & Security Requirements
96
Outsourced Database & Security Requirements
Data Confidentiality
Encryption at rest (e.g., AES-256) and encryption in transit (e.g., TLS 1.2+).
97
Outsourced Database & Security Requirements
Data Integrity
98
Outsourced Database & Security Requirements
Control (ABAC).
Use identity federation or single sign-on (SSO) for centralized access control.
99
Outsourced Database & Security Requirements
Secure Multi-Tenancy
100
Outsourced Database & Security Requirements
activities.
101
Outsourced Database & Security Requirements
Compliance with Regulations
GDPR (Europe)
audits.
102
Outsourced Database & Security Requirements
103
Outsourced Database & Security Requirements
Ensure data can be exported or migrated easily in case of vendor change (avoid
vendor lock-in).
104
Outsourced Database & Security Requirements
Implement
Separation of duties
105
Outsourced Database & Security Requirements
106
Outsourced Database & Security Requirements
Security Lifecycle in Outsourced DB Management
Termination Securely export and delete data, revoke access, verify wipe logs.
107
Outsourced Database & Security Requirements
Technologies Used
108
Outsourced Database & Security Requirements
Risk Impact
109
Outsourced Database & Security Requirements
Best Practices
Draft a clear SLA and data ownership agreement with security clauses.
110
Outsourced Database & Security Requirements
Conclusion
111
Outsourced Database & Security Requirements
112
Outsourced Database & Security Requirements
113
Outsourced Database & Security Requirements
114
Outsourced Database & Security Requirements
115
Outsourced Database & Security Requirements
116
Outsourced Database & Security Requirements
117
Query Authentication Dimension
Query Authentication is a dimension of database security that ensures
only authorized and authenticated users can issue queries and access data or
perform operations on the database. It focuses on verifying that a query request is:
systems, outsourced databases, and cloud computing, where multiple users and
118
Query Authentication Dimension
Query Authentication Dimension refers to the security checks applied to
119
Query Authentication Dimension
Key Components of Query Authentication Dimension
Component Description
120
Query Authentication Dimension
Techniques Used in Query Authentication
Login-Based Authentication
Token-Based Authentication
Certificate-Based Authentication
121
Query Authentication Dimension
Threats Mitigated by Query Authentication
122
Query Authentication Dimension
Best Practices
functions.
Log and Monitor Queries: Use SIEM tools to detect abnormal patterns.
123
Query Authentication Dimension
Summary about Query Authentication Dimension
Feature Purpose
User Identity Verification Ensures the query comes from a legitimate user.
124
Query Authentication Dimension
Conclusion
that
Helps detect and prevent injection attacks, tampering, and unauthorized access.
database systems.
125
Condensed RSA & Merkle Tree
RSA (Rivest-Shamir-Adleman) – Condensed View
Purpose
Key Concepts
products.
126
Condensed RSA & Merkle Tree
Use Cases
HTTPS / SSL
Digital signatures
127
Condensed RSA & Merkle Tree
Merkle Tree - Condensed View
Purpose
Use Cases
128
Condensed RSA & Merkle Tree
Structure
129
Condensed RSA & Merkle Tree
RSA vs Merkle Tree Comparison
Use Case Secure communication, signatures Fast integrity checks in large datasets
130
Condensed RSA & Merkle Tree
131
Condensed RSA & Merkle Tree
132
Condensed RSA & Merkle Tree
133
Condensed RSA & Merkle Tree
134
Condensed RSA & Merkle Tree
135
Condensed RSA & Merkle Tree
136