Data Security
This paper is a general introduction to data security and the four
types of internal security controls: access, flow, inference, and
cryptographic. External security controls, which affect
operations outside the main computing system, are not discussed.
- Access controls
- Regulate the reading, changing, and deletion of data and
programs. Three assumptions:
- Proper user identification
- Unanticipated observers do not gain access
- Privilege-information is heavily protected
- Controls for transaction-processing systems:
data-dependent restrictions, history-dependent restrictions.
- Controls for general purpose systems: object-dependent
controls regulate access to an object irrespective of the
values stored in that object. Capability addressing:
capability, capability list. Revocation of privileges is
hard if capabilities are scattered throughout lists.
- Some limitations:
- High overhead in managing small memory segments.
- Excessive privilege vested in the operating system.
- Flow controls
- Flow policy specifies the channels along which
information is allowed to move.
- Some limitations:
- Flow controls based on security classes tend to
overclassify information.
- Covert channels.
- Inference controls
- Deduction of confidential information by inference.
- Defenses include
- Controls that withhold response for improper query
set sizes and overlaps.
- Controls that distort the responses by rounding or
falsifying data.
- Controls that apply queries to random samples of the
database.
- Cryptographic controls
- Symmetric encryption
- One-time pad, DES (Data Encryption Standard).
- Key management is important.
- Asymmetric encryption
Elaine Cheong
Last modified: Wed Aug 8 15:40:39 PDT 2001