فصلنامه تخصصی فناوری اطلاعات و ارتباطات

دیدگاه متدولوژیک کنترل دسترسی موثر برای پایگاه داده های توزیعی

نوع مقاله : مقاله پژوهشی

نویسندگان

دانشکده مهندسی کامپیوتر، دانشگاه آزاد اسلامی، واحد خدابنده، زنجان، ایران

چکیده
پایگاه‌های داده توزیعی از زمان پیدایش‌ در اوایل دهه هفتاد میلادی به طور چشمگیری تکامل یافته‌اند. این پایگاهها در مکان‌های مختلف‌ جغرافیایی توسعه می یابند و توسط سیستم مدیریت پایگاه داده نامتمرکز سازماندهی می گردند که این امر باعث افزایش سرعت دسترسی به داده‌ها می‌شود. این پایگاه داده‌ها عموما اطلاعات حیاتی را برای کاربراشان مهیا می‌کنند. لذا امنیت و حفاظت از آنها از اهمیت بسیار زیادی برخوردار است. امنیت این پایگاه داده‌ها عمدتا به حفاظت اطلاعات و بویژه کنترل دسترسی کاربران توجه دارد. لذا این مقاله به اصول امنیت و سیاستهای مهم در حوزه کنترل دسترسی می پردازد. رویکردهای کنترل دسترسی قبلی عمدتا بصورت محدود و متمرکز ارائه گردیده اند، و معمولا برای کاربردهای توزیع شده در بسترهای فناوری جدید کارا نمی باشند. لذا بنا به ضرورت تحقیق، در این مقاله به ارائه دیدگاه متدولوژیک و جامعی می پردازیم که با یکپارچه سازی روش های کنترل دسترسی موجود، توانمندی موثرسازی استفاده توزیع شده و انعطاف پذیر را در فضاهای توزیع شده فراهم نماید.

کلیدواژه‌ها


عنوان مقاله English

A Methodological Perspective on Effective Access Control for Distributed Databases

نویسندگان English

Maryam Asadi
Zahra Khodadadi
Computer Engineering Department, Islamic Azad University, Khodabandeh Branch, Tehran, Iran
چکیده English

Distributed databases have evolved dramatically since their inception in the early 1970s. These databases are developed in different geographical locations and are organized by a decentralized database management system, which increases the flexibility and speed of data access. These databases generally provide vital information to their users. Therefore, their security and protection is very important. The security of these databases mainly focuses on information protection and especially user access control. Therefore, this article deals with the principles of security and important policies in the field of access control. Previous access control approaches are mainly limited and centralized and are usually not efficient for distributed applications in new technology platforms. Therefore, according to the necessity of the research, in this article, we investigate a methodological and comprehensive perspective that, by integrating existing access control methods, will provide the ability to make distributed and flexible use effective in distributed spaces.

کلیدواژه‌ها English

Distributed Database
Database Management System
Access Control
Methodological Approach
[1] Al-Sayid NA, Aldlaeen D. Database security threats: A survey study. In2013 5th international conference on computer science and information technology 2013 Mar 27 (pp. 60-64). IEEE.
[2] Chica JC, Imbachi JC, Vega JF. Security in SDN: A comprehensive survey. Journal of Network and Computer Applications. 2020 Jun 1;159:102595.
[3] Uzunov AV, Fernandez EB, Falkner K. Securing distributed systems using patterns: A survey. Computers & Security. 2012 Jul 1;31(5):681-703.
[4] Uzunov AV. A survey of security solutions for distributed publish/subscribe systems. Computers & Security. 2016 Aug 1;61:94-129.
[5] Tan YS, Ko RK, Holmes G. Security and data accountability in distributed systems: A provenance survey. In2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing 2013 Nov 13 (pp. 1571-1578). IEEE.
[6] Santos, R.J., Bernardino, J. and Vieira, M., 2011, April. A survey on data security in data warehousing: Issues, challenges and opportunities. In 2011 IEEE EUROCON-International Conference on Computer as a Tool (pp. 1-4). IEEE.
[7] Gupta N, Agrawal R. Challenges and security issues of distributed databases. InNoSQL 2017 May 19 (pp. 251-270). Chapman and Hall/CRC.
[8] Benantar M. Access control systems: security, identity management and trust models. Springer Science & Business Media; 2005 Dec 9.
[9] Colombo P, Ferrari E. Privacy aware access control for big data: A research roadmap. Big Data Research. 2015 Dec 1;2(4):145-54.
[10] Bertino E, Ferrari E. Big data security and privacy. InA comprehensive guide through the Italian database research over the last 25 years 2017 May 31 (pp. 425-439). Cham: Springer International Publishing.
[11] Metoui N, Bezzi M, Armando A. Risk-based privacy-aware access control for threat detection systems. Transactions on Large-Scale Data-and Knowledge-Centered Systems XXXVI: Special Issue on Data and Security Engineering. 2017:1-30.
[12] Abouelmehdi K, Beni-Hssane A, Khaloufi H, Saadi M. Big data security and privacy in healthcare: A Review. Procedia Computer Science. 2017 Jan 1;113:73-80.
[13] Paananen H, Lapke M, Siponen M. State of the art in information security policy development. Computers & Security. 2020 Jan 1;88:101608.
[14] Dekker MA, Etalle S. Audit-based access control for electronic health records. Electronic notes in theoretical computer science. 2007 Feb 8;168:221-36.
[15] Inukollu VN, Arsi S, Ravuri SR. Security issues associated with big data in cloud computing. International Journal of Network Security & Its Applications. 2014 May 3;6(3):45.
[16] McCollum CJ, Messing JR, Notargiacomo L. Beyond the pale of MAC and DAC--Defining new forms of access control. InProceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy 1990 May 1 (pp. 190-190). IEEE Computer Society.
[17] Kulkarni S, Urolagin S. Review of attacks on databases and database security techniques. International Journal of Emerging Technology and Advanced Engineering. 2012 Nov;2(11):253-63.
[18] Curtis LH, Weiner MG, Boudreau DM, Cooper WO, Daniel GW, Nair VP, Raebel MA, Beaulieu NU, Rosofsky R, Woodworth TS, Brown JS. Design considerations, architecture, and use of the Mini‐Sentinel distributed data system. Pharmacoepidemiology and drug safety. 2012 Jan;21:23-31.
[19] Mazurek ML, Arsenault JP, Bresee J, Gupta N, Ion I, Johns C, Lee D, Liang Y, Olsen J, Salmon B, Shay R. Access control for home data sharing: Attitudes, needs and practices. InProceedings of the SIGCHI Conference on Human Factors in Computing Systems 2010 Apr 10 (pp. 645-654).
[20] Ryutov T, Zhou L, Neuman C, Leithead T, Seamons KE. Adaptive trust negotiation and access control. InProceedings of the tenth ACM symposium on Access control models and technologies 2005 Jun 1 (pp. 139-146).
[21] Ullah F, Edwards M, Ramdhany R, Chitchyan R, Babar MA, Rashid A. Data exfiltration: A review of external attack vectors and countermeasures. Journal of Network and Computer Applications. 2018 Jan 1;101:18-54.
[22] Panda BN. Query processing in multilevel secure database systems. North Dakota State University; 1993.
[23] Sharma PK, Singh S, Jeong YS, Park JH. Distblocknet: A distributed blockchains-based secure sdn architecture for iot networks. IEEE Communications Magazine. 2017 Sep 8;55(9):78-85