company logo geospatial database security nguyễn minh nhật nguyễn ngọc hương thảo lê...

112
Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu

Upload: calvin-todd

Post on 03-Jan-2016

221 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Company

LOGO

Geospatial Database Security

Nguyễn Minh Nhật

Nguyễn Ngọc Hương Thảo

Lê Trần Hoài Thu

Nguyễn Minh Nhật

Nguyễn Ngọc Hương Thảo

Lê Trần Hoài Thu

Page 2: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

ContentContent

PartPart0101

Basic Knowledge about GIS Is some basic information to know about GIS

Authorization in GIS DatabaseIs one of regular way to authorization about users and their privileges.

Some GIS Security ModelIs some of Security model common used.

PartPart0202

PartPart0303

2

Page 3: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

GIS database structure

Introduction of GIS & Geospatial database

Contents of Contents of Basic GIS

3

Page 4: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

What is GIS?

Application?

GISGeographical

Information Systems USER REAL WORLD

4

Page 5: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

GIS: history background

This technology has developed from: Digital cartography and CAD Data Base Management Systems

1

2

3

CAD SystemCAD System DataBase Management SystemDataBase Management System

ID X,Y

123

ID ATTRIB

123

5

Page 6: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Geospatial Database

Database mapAttribute valuesDatabase map

Attribute values

6

Page 7: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

GIS database structure

Introduction of GIS & Geospatial database

Contents of Contents of Basic GIS

7

Page 8: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Representation of Geographical Information

Many spatial databases are partitioned internally: Partitions defined spatially Partitions defined thematically Both

Tile: a geographical partition of a database

Layer: a thematic partition

8

Page 9: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

LAYER

!(

!(!(

!(!(

!(

!(

!(

!(

!(

!(

!( !(!( !(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(Thematic Map of the Continental United States

A layer: logical grouping of geographic feature, that can also be referred to as a coverage.

9

Page 10: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Maps are composed of

Layers

!(

!(!(

!(!(

!(

!(

!(

!(

!(

!(

!( !(!( !(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

States

Rivers

Lakes

Roads

!(

!(!(

!(!(

!(

!(

!(

!(

!(

!(

!( !(!( !(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

!(

Capitals

LAYER

10

Page 11: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

GIS database structure

Layers contain features or surfaces Layers are represented by:

Vector model Raster model TIN model

GIS database structure: Database map: spatial data Attribute map: non-spatial data

features

surfaces

11

Page 12: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Vector model: geometric objects: Points Lines Polygons

Spaghetti model and Topology model

Representing data with vector

Type Position

Point 3,2

Line 1,5; 3,5; 5,7; 8,8; 11,7

Polygon 5,3; 6,5; 7,4; 9,5; 11,3; 8,2; 5,3

12

Page 13: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Stores by x, y co-ordinate Represents relational

spatial data for each object Represents attribute data

Spaghetti model

13

Page 14: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Advantages: Simple , easy to represent

Disadvantages: Unable to represent relational spatial data

among these objects Polygons: boundary is stored twice

Spaghetti model

14

Page 15: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Topology model Spatial data Relational spatial data topology

Arc-Node topology Polygon-Arc topology

15

Page 16: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Representing data with vector

Advantage: Allowing precise representation of points,

boundaries, and linear features.

Disadvantage: The boundaries of the resultant map polygons

discrete, whereas in reality the map polygons may represent continuous gradation or gradual change

16

Page 17: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Representing data with raster

Raster model as image files: Composed of grid-cells (pixels)

A value attribute table (VAT) keeps track of your value classification. Add custom attributes by adding more

columns. Disadvantage?

Raster data has one or more bands. Each band has an identical grid layout

representing a different attribute.

17

Page 18: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Representing data with raster

Representing well indistinct boundaries Thematic information on soil types, soil moisture,

vegetation, ground temperatures

Being used as reconnaissance satellites and aerial surveys use raster-based scanners, the information (scanned images) can be directly incorporated into GIS

The higher the grid resolution, the larger the data file is going to be.

18

Page 19: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

TIN: Triangulated Irregular Networks Representing continuous surfaces

Representing data with TIN

19

Page 20: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Network structure

Representing data with TIN

20

Page 21: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Attribute data

Features are stored in a database along with information describing them. Attributes of a street: name,

street type, length, street code, number of lanes, pavement type.

Attributes of a park: name, area, hours of operation, maintenance schedule.

21

Page 22: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Attribute data

ID Att1 Att2 Att3

1 X X X

2 X X X

3 X X X

….

3 4

2

1

Attribute values in a GIS are stored as relational database table. Each feature within in

GIS layer will be represented as a record in a table

22

Page 23: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

ContentContent

PartPart0101

Basic Knowledge about GIS Is some basic information to know about GIS

Authorization in GIS DatabaseIs one of regular way to authorization about users and their privileges.

Some GIS Security ModelIs some of Security model common used.

PartPart0202

PartPart0303

23

Page 24: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Authorization control mechanism

The geographic access control model

Basic components of the model

Topological spatial data model (TSDM)

Why is authorization in GIS important?

Contents of Contents of Authorization in GIS

24

Page 25: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Why is authorization in GIS important?

Geographical data have a strategic relevance in a large variety of contexts Gathering and analyzing intelligence Protecting critical infrastructure Responding to complex emergencies Preparing for disease outbreaks and

bioterrorism Securing complex events

25

Page 26: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Geometric layer: Shape and location on the earth surface of

features Geometric value: set of points, set of simple

connected (or not) polylines, set of simple polygons

Topological layer: Describing the topological relations of the

feature with others features of the map Relation: {Disjoint, Touch, In, Contains, Equal,

Cross, Overlap}

Topological spatial data model (TSDM)

26

Page 27: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Example of a geographical database the railway network

Topological spatial data model (TSDM)

27

Page 28: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Topological relations among the features of the Region and the County feature types

Topological spatial data model (TSDM)

28

Page 29: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Geometric layerTopological layerOperators:

Feature-based operators Map-based operators Mixed operators

Topological spatial data model (TSDM)

29

Page 30: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Basic components of the model

Subject and object Subject: All users that interact with the system Object:

• Schema objects• Instance objects• Group objects

privileges Instances privileges Insertion privileges Schema privileges

30

Page 31: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Authorization sign and type Sign

• (+) A subject is authorized for a given privilege• (-) A subject is denied access to a given object under

a given privilege

Type: specifies whether an authorization can be overridden or not

• Weak authorizations• Strong authorizations

Queries and windowsGrant option: Only (+) authorizations can be delegated

Basic components of the model

31

Page 32: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

AuthorizationAuthorization extensionCorrect authorization

The geographic access control model

32

Page 33: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Authorization

A tuple containing all the basic components of the model

The form: (u, p, pt, g, go, o ,t, w, q)Example:

Set A = {a8 = (Ted, selM(2,geo),+,Bob,false,M_rail,st,Milan, ┴),

a9 = (Ted, updF(0,space,+, Bod, false,Accident,wk, Milan, N=‘wrong manouevre’Name=‘X’(Accident))

}

33

Page 34: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Derivation over object relationshipsDerivation over privilege relationships

An authorization granting a privilege to objects with a certain dimension has to be propagated to objects with lower dimension

An authorization denying a privilege to objects with a certain dimension has to be propagated to objects with higher dimension

Derivation rule

34

Page 35: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Derivation rule

35

Page 36: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Derivation rule

36

Page 37: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Given an access request r = (u,p,o)An authorization: a = (u,p,pt,g,go,o,t,w,q)The access request can be satisfied if:

R depends on a strong positive authorization and on no strong negative authorization

R depends on a weak positive authorization, on no weak negative authorization and on no strong authorization.

Algorithms for access control

37

Page 38: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

ContentContent

PartPart0101

Basic Knowledge about GIS Is some basic information to know about GIS

Authorization in GIS DatabaseIs one of regular way to authorization about users and their privileges.

Some GIS Security ModelIs some of Security model common used.

PartPart0202

PartPart0303

38

Page 39: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Q&A

Access control model for spatial data on web

Secure Access Control in a Multi-User Geodatabase

Analysis of Access Control Mechanisms for Spatial DB

Aspects in Security of Database System

Contents of Contents of GIS Security Model

39

Page 40: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Aspects in Security of Database System

Privacy

Confidential

Secrecy

Integrity

Accuracy

Granularity

Availability

Privacy

Confidential

Secrecy

Integrity

Accuracy

Granularity

Availability

40

Page 41: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Privacy & Secrecy

Access limit control User private access right. GIS User-level based. Problems: Non module GIS database. Module GIS database.

Access limit control User private access right. GIS User-level based. Problems: Non module GIS database. Module GIS database.

GIS Database

Aspects in Security of Database System 41

Page 42: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Privacy & Secrecy (cont)

GIS Database

Change 01

Change 02

Change 03

Change 04

Change 05

Change 06

Change 07

Change ….

User 01

User 02

User 03

User 04

User 05

User 06

User 07

User ….

Aspects in Security of Database System 42

Page 43: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Availability

Storage Structure

Data

DataImage

ApplicationWeb ServiceWeb Users Operating System

Database Management

Database Management

Aspects in Security of Database System 43

Page 44: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Availability (cont)

Database Restore Loss of power Disconnect. Hardware or Software errors.

Database Restore Loss of power Disconnect. Hardware or Software errors.

Packet

Aspects in Security of Database System 44

Page 45: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Granularity

Metadata

Aspects in Security of Database System 45

Page 46: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Integrity & Accuracy

Aspects in Security of Database System

Integrity & Accuracy = Can’t be tampered (added, deleted, or altered) by illegal users.

46

Page 47: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Confidentialy

Data Network

Data

Data

Poison Data

Data Poison Data

Data

Aspects in Security of Database System

Confidentialy = only user knows data

47

Page 48: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Access control model for spatial data on web

Secure Access Control in a Multi-User Geodatabase

Analysis of Access Control Mechanisms for Spatial DB

Aspects in Security of Database System

Contents of Contents of GIS Security Model

Efficient Techniques for Realizing Geo-Spatial Access Control

48

Page 49: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Introduction

Two possible solution to restricting access to database: SDE-based access control mechanism. View-based access control mechanism.

Analysis of Access Control Mechanisms for Spatial DB

SDE-based access control

mechanism

View-based access control

mechanism.

49

Page 50: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

SDE-based access control mechanism

SDE (Spatial Data Engine). Function: manage unstructured spatial

data in structure RDBMS (Relational database management system)

Analysis of Access Control Mechanisms for Spatial DB

http://en.wikipedia.org/wiki/Relational_database_management_system50

Page 51: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Analysis of Access Control Mechanisms for Spatial DB

SDE-based access control mechanism

MAPProperty

Record

51

Page 52: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

All geospatial objects in the same map layer are stored in a table.

Each geospatial object is represented by a record of the table.

The geometric property of a geospatial object is stored as a field of the record.

Analysis of Access Control Mechanisms for Spatial DB

SDE-based access control mechanism

52

Page 53: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Analysis of Access Control Mechanisms for Spatial DB

SDE-based access control mechanism

53

Page 54: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Analysis of Access Control Mechanisms for Spatial DB

SDE-based access control mechanism

54

Page 55: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Analysis of Access Control Mechanisms for Spatial DB

SDE-based access control mechanism

55

Page 56: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Analysis of Access Control Mechanisms for Spatial DB

SDE-based access control mechanism

56

Page 57: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Authentication: System firstly ensure log-in users are legal

Authorize: Legal users are executting permit operations on spatial objects of interest.

Analysis of Access Control Mechanisms for Spatial DB

SDE-based access control mechanism

57

Page 58: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Analysis of Access Control Mechanisms for Spatial DB

SDE-based access control mechanism

58

Page 59: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

SDE uses layers to store features (spatial objects)

Each layer contains one of: point, line or polygon.

Each layer is composed of business table, feature table, spatial index table, and point table

Analysis of Access Control Mechanisms for Spatial DB

SDE – Spatial data organization

59

Page 60: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Analysis of Access Control Mechanisms for Spatial DB

SDE – Spatial data LAYERs

60

Page 61: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Analysis of Access Control Mechanisms for Spatial DB

SDE – Spatial data LAYERs

61

Page 62: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Analysis of Access Control Mechanisms for Spatial DB

SDE – Spatial data LAYERs

62

Page 63: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Business table represents a feature and stores attribute properties of the feature

Analysis of Access Control Mechanisms for Spatial DB

SDE – Spatial data – Business table

63

Page 64: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Feature table stores shape types and boundary boxes of features in feature tables.

Analysis of Access Control Mechanisms for Spatial DB

SDE – Spatial data – Features table

64

Page 65: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Spatial index table contains information of the grid unit and boundary boxes of features.

Analysis of Access Control Mechanisms for Spatial DB

SDE – Spatial data – Spatial index table

65

Page 66: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Point table stores coordinate values of each shape in a binary type of BLOB, which is translated into spatial meanings by SDE.

Analysis of Access Control Mechanisms for Spatial DB

SDE – Spatial data – Point table

66

Page 67: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

SDE-based access controlSDE-based access control

Authorization Map Layers FeaturesSpatial Context

SDE-based access control

67

Page 68: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Namely user information is stored in database and RDBMS is in charge of authenticating users

Spatial authorization must alter schemas of related tables to store authorization information (legal users and corresponding privileges) according to granularities of control

Analysis of Access Control Mechanisms for Spatial DB

SDE-based access control FOR AUTHORIZATION

68

Page 69: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

The schema of layer tables is added fields: user and privilege

According to User’ specific authorization requirements, the fields: user and privilege will be filled.

Analysis of Access Control Mechanisms for Spatial DB

SDE-based access control FOR MAP LAYERS

69

Page 70: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

The similar modification will be made to the schema of business tables, as each record of business tables stores properties of a single feature

Analysis of Access Control Mechanisms for Spatial DB

SDE-based access control FOR FEATURES

70

Page 71: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

As for spatial context, for example eatures in a rectangular window of certain privilege, the authorization information is filled in feature tables on the fly. Those features falling in the window are alculated with the window rectangle and the boundary boxes stored in the feature table.

Analysis of Access Control Mechanisms for Spatial DB

SDE-based access control FOR SPATIAL CONTEXT

71

Page 72: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

1. Certificated IDs

2. Read authorization information or intentd map layer

3. Compared legal users and privileges from layer table and intended operations

4. Decide authorizing access to the map layer or just rejecting

5. Make similar procedure to achieve permistion to specific features.

Analysis of Access Control Mechanisms for Spatial DB

SDE-based access control

72

Page 73: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Introduction

Analysis of Access Control Mechanisms for Spatial DB

SDE-based access control

mechanism

View-based access control

mechanism.

73

Page 74: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

View-based access control mechanism.

Analysis of Access Control Mechanisms for Spatial DB

GIS Database

View 01

View 02

View 03

View 04

View 05

View 06

View 07

View ….

User 01

User 02

User 03

User 04

User 05

User 06

User 07

User ….

74

Page 75: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

4 component: Database acounts Database login (authentication) Privileges View

View-based access control mechanism.

Analysis of Access Control Mechanisms for Spatial DB 75

Page 76: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

View-based access control mechanism.

Analysis of Access Control Mechanisms for Spatial DB 76

Page 77: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Alternative method to grant Carol access to name and email columns:create view employee_public as select name,email from employee;

grant select on employee_public to carol;

View-based access control mechanism.

Analysis of Access Control Mechanisms for Spatial DB 77

Page 78: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Access control model for spatial data on web

Secure Access Control in a Multi-User GeodatabaseSecure Access Control in a Multi-User Geodatabase

Analysis of Access Control Mechanisms for Spatial DB

Aspects in Security of Database System

Contents of Contents of GIS Security Model

Efficient Techniques for Realizing Geo-Spatial Access Control

78

Page 79: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Problem in multi-user access:Some information need to be secret.Some Users can view, Others can’t.Other:

• Fake Users.

• Virtual Users.

Secure Access Control in a Multi-user Geodatabase

79

Page 80: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Aspect to security of GeoDatabase:Privacy.Confidentialy.Secrecy.Integrity.AccuracyGranularity.Availability.

Secure Access Control in a Multi-user Geodatabase

80

Page 81: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Three main Access Control Models:Mandatory (label-based).Discretionary (User-based)Role-Based.

Secure Access Control in a Multi-user Geodatabase

81

Page 82: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Mandatory (label-based).Different security levels -> users of

database have security clearances assigned.

Discretionary (User-based)Permission Access. Users can protect or

grant access rights.Role-BasedAccess control is enforced in terms of

roles.

Secure Access Control in a Multi-user Geodatabase

82

Page 83: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Access Control Models for Geodatabase Allow view-based access control.Access predefined sets of views, based on

authorizations.Views are built from a multi-level

database, may be updated, according to users privileges.

Secure Access Control in a Multi-user Geodatabase

83

Page 84: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Three new different security architectures:Single Multi-Level Database ( Multi-level

Relations).Replicated Multi-Level Database.Single Multi-level Database (Uni-level

Relations).

Secure Access Control in a Multi-user Geodatabase

84

Page 85: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Single Multi-Level Database ( Multi-level Relations).

Secure Access Control in a Multi-user Geodatabase

85

Page 86: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Replicated Multi-Level Database.

Secure Access Control in a Multi-user Geodatabase

86

Page 87: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Single Multi-level Database (Uni-level Relations).

Secure Access Control in a Multi-user Geodatabase

87

Page 88: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Access control model for spatial data on web

Secure Access Control in a Multi-User Geodatabase

Analysis of Access Control Mechanisms for Spatial DB

Aspects in Security of Database System

Contents of Contents of GIS Security Model

Efficient Techniques for Realizing Geo-Spatial Access Control

88

Page 89: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

INTRODUCTION (1)

The use of map is crucial for correctly geo-processing data. Currently, several commercial map management systems support visualization and editing of spatial objects on Web.

Enforcing controlled access to spatial data has not been much investigated to ensure confidentiality and integrity of information.

89

Page 90: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

INTRODUCTION (2)

Ensuring confidentiality means preventing improper disclosure of information to non-authorized users to see it.

Ensuring integrity means protecting data from unofficial modifications and thus preventing non-authorized users from inserting or modifying data in the database.

90

Page 91: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

INTRODUCTION (3)

The model is based on the following assumptions :

Spatial data consist of objects with sharp boundaries located in a geographical space.Data are manipulated by remote users through the operations provided by a Web Map Management Service.

The goal of the system in to control the way data are accessed by users having different profiles.

The model is an extension of the classical access control model based on the notion of authorized rule.

91

Page 92: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

INTRODUCTION (4)

The central idea is to assign an authorization a geographical scope, namely a bounded region in which the authorization is valid.

Therefore, operations that users may execute on spatial data may vary, depending on user identity and object position.

92

Page 93: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

PRELIMINARY NOTIONS (1)

Spatial data model used is the vector model defined by the OpenGIS Consortium (OGC) based on the notion of simple spatial feature.

The architecture of Web map management applications is organized according to 3-tier architecture including Presentation, Application, Data Storage layers.

93

Page 94: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

The Data Storage layer consists of files and database servers.

The Application layer implements the operations requested by the application.

The Presentation layer on the client side includes either HTML pages or specialized programs.

PRELIMINARY NOTIONS (2)

94

Page 95: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

PRELIMINARY NOTIONS (3)

We assumed that features are transferred in a vector format and the geo-processing is distributed on both client and server.

95

Page 96: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

PRELIMINARY NOTIONS (4)

96

Page 97: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

PRELIMINARY NOTIONS (5)

The Application layer consists of 2 main services :

The Access Control Service implements the operations for authorization rules checking and administration.

The Application Service implements the application logic and access the application data.

Besides, it also includes the Authentication Service based on username/password, SSL or some complex services.

97

Page 98: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

PRELIMINARY NOTIONS (6)

98

Page 99: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

THE ACCESS CONTROL SYSTEM (1)

Data access is controlled through a set of authorization rules. Each authorization rule, in basic form, consist of a triple = <subject, object, privilege>.

The subject indicates who can access the data resource.

The object is a spatial feature class. The privilege is the kind of action that can be

performed by the subject on the given object.

99

Page 100: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

THE ACCESS CONTROL SYSTEM (2)

In the model, it is not possible to define authorization rules for objects at a finer level of granularity, on single feature for example, or on feature class attributes.

Privileges used in the model :Notify : controls the execution of the operations for feature insertion and deletion.Analysis : controls the execution of the different querying operation.ViewGeometry : controls the single operation of GetFeature.ViewAttribute : controls the operation of GetFeatureInfo.

100

Page 101: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

DEFINITIONS AND CONSTRAINTS (1)

Definition 1 (Basic authorization)

Let R be a set of roles, FC the set of feature classes, O the set of Web service operations, P the set of privileges defined as a partition over the set O. A basic authorization rule is defined as a triple <r, f, p> where r ∈ R, f ∈ FC, p ∈ P.

Example :

The rule authorizing a surveyor to notify illegal waste deposits can be expressed as follows:

<surveyor, illegal_waste_deposit, Notify>.

101

Page 102: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

DEFINITIONS AND CONSTRAINTS (2)

Constraint 1 (Constraint on privilege dependency)

Let r be a role, fc a feature class, p1, p2…, pn privileges.We say that p1 depends on p2…pn (written as p1 → p2… ˄ pn) iff the existence of the rule: a1 = <r, fc, p1> implies the existence of the rules: a2=<r, fc,p2>,...,an = <r, fc, pn>. The rule a1 is said to be dependent on a2...an (written a1 → a2… ˄ an).

Example :

The dependency discussed above can be expressed in a simple way as follows:

Notify → ViewGeometry ˄ ViewAttributes

102

Page 103: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

DEFINITIONS AND CONSTRAINTS (3)

Definition 2 (Authorization with window)Let Polygon denote the set of polygonal geometries. An authorization rule with window is a tuple <r,fc,p,w> where r ∈ R, fc ∈ FC, p ∈ P, w ∈ Polygon.

Constraint 2 (Constraint on authorization window)Let a1 = <r, fc, p1, w1> and a2 = <r, fc, p2, w2> be two authorizations rules defined for the same role r and feature class fc but on two different privileges p1 and p2. If p1→p2 then w1 ⊆ w2.

103

Page 104: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

DEFINITIONS AND CONSTRAINTS (4)

Definition 3 (Authorization rule with grant option)

Let R be a set of roles, FC the set of feature classes, P the set of privileges, W the set of Polygons. An authorization is defined as a tuple : <r,fc,p,w,gr,gr_op>, where r ∈ R, f ∈ FC, p ∈ P, w ∈ W, gr ∈ R, gr_op ∈{true, false}.

Constraint 3 (Constraint on authorization rule grant)

Let a = <r1, fc, p, w , gr, true> be an authorization granted to role r1. The privilege p on feature class fc can be granted by r1 to r2 through the authorization b = <r2, fc , p, wb , r1, _> iff the window of b is contained in the window of a, that is, wb ⊆ wa.

104

Page 105: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

DEFINITIONS AND CONSTRAINTS (5)

Definition 4 (Authorization rule consistency)

The authorization rule a = <r, fc, p, w, gr, gr_op> is consistent iff the following constraints are satisfied :

a) Constraint 1 and constraint 2 must hold, that is, for each privilege pi such that p → pi, the authorization ai = <r, fc, pi, wi , gr, _> must belong to the rule set and w ⊆ wi.

b) Constraint 3 must hold, that is, let b = <gr, fc, p, wb,_, true> be the corresponding authorization given to the grantor of a; then the relationship w ⊆ wb must hold.

105

Page 106: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

SUMMARY (1)

Strong points :

Protect vector-based spatial data against requests issued through a Web service.

Authorizations on spatial objects can be applied on limited areas within the reference space.

106

Page 107: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

SUMMARY (2)

Weak points :

Do not support topological representation.

Do not support multiple representation of the same feature (such as various object dimension).

Do not support both positive authorizations (giving permissions) and negative ones (specifying denials).

107

Page 108: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Q&A

Access control model for spatial data on web

Analysis of Access Control Mechanisms for Spatial DB

Aspects in Security of Database System

Summary of Summary of GIS Security Model

Secure Access Control in a Multi-User Geodatabase

108

Page 109: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

References[1] Jiayuan LIN, Yu FANG, Bin CHEN, Pengei WU – Analysis of access control mechanisms for spatial database.

[2] Elisa Bertino, Micheal Gertz – Security and Privacy for Geospatial Data: Concepts and Research Directions.

[3] Elisa Bertino, Maria Luisa Damiani - A Controlled Access to Spatial Data on Web

[4] MikhailJ.Atallah, MarinaBlanton, KeithB.Frikken - Efficient Techniques for Realizing Geo-Spatial Access Control

109

Page 110: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

[5] Sahadeb De, Caroline M. Eastman, Csilla Farkas - Secure Access Control in a Multi-user Geodatabase.

[6] Zhu Tang, Shiguang Ju, Weihe Chen - Active Authorization Rules for Enforcing RBAC with Spatial Characteristics.

[7] A.Belussi, E.Bertino, B.Catania – An Authorization Model for Geographical Maps.

[8] www.gis.com

[9] www.esri.com/casestudies

References (cont.)

110

Page 111: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

Question?

111

Page 112: Company LOGO Geospatial Database Security Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài Thu Nguyễn Minh Nhật Nguyễn Ngọc Hương Thảo Lê Trần Hoài

112