Font Size: a A A

Research On Models And Application Of Database Rights Management

Posted on:2012-08-26Degree:DoctorType:Dissertation
Country:ChinaCandidate:Y S LuoFull Text:PDF
GTID:1228330368497262Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the information technology and network technology, the new business of electronic commerce and the electronic government are constantly emerging, and high-speed internet, wireless mobile communication network and cloud computing are gradually applied in people’s work and life domain. The digital resources can be accessed conveniently through various methods whenever and wherever. As the carrier of digital resources, database is to become the information infrastructure of economic, government, national defense and other areas. Through long-term accumulation and integration, the rich value is contained in databases and the analysis of the data in the database are useful for the development of new products, extending the customer chain, decision making for the industry organization. It is significant for the country’s political and economic construction.Nowadays, database application fields have been promoted to expand by the diversity of database products, which become boosters of the database industry. However, in an Open Network Environment, the valuable resources in databases are often duplicated and pasted, and then are spread at tremendous speed by the authorized users accidentally or intentionally whose behaviors cause huge economic losses. At the same time, the unauthorized users steal or deleted customer information and business intelligence maliciously, which results in the cheap use and copy of the database. The interests of the right holders and customers are infringed, and the enthusiasms of originators are dampened. In LAN, a large number of confidential database resources are transferred and stored in the form of electronic documents, which provide the chances for the information leak. During the process of the database development, more database services of organizations and individuals on software and hardware are outsourced to the database service provider to meet consumers’ growing demand, which lead to new problems of security, rights and interests. Facing the application environment of diversified database resources, the subjects, objects and rights of intellectual property rights protection become more various and complex, and conflicts between the form of intellectual property rights protection and the usage and spread of the database resources become more violent. It is important to conduct research on database rights management.In view of existing research field, the law of database copyright, digital rights management and the database security are related to the database rights management. In the legal category, original database is protected by the common law and non-original database is sheltered by "special rights". Both support the interests of investors and ignore the social the public’s rights and interests. The free flow of information is limited, and to some degree, the digital-resource markets even be monopolized. Digital rights management provides the digital rights expression and enforcement for certain digital resources. However, during the process of usage and management, the database resources with different sources and different format will be used frequently in different situations following different rules. The existing rights expression model is lack of interoperability, which hinders the communication development of rights management system. The database security focuses on data integrity, confidentiality and usability in a closed system. Once the digital resources have been downloaded to the client, its protection is lost. Furthermore, the permission is authorized before the user acts on the resources. It is hard to monitor the user’ behavior and decrease the persistent protection for the database resources. Thus, the urgent need is put forward to construct good development environment for database industry with the comprehensive consideration of the law field, management as well as information technology.This paper is directed by the theories of management and computer science. Database rights expression, usage control on digital resources in database, delegation authorization management and layered architecture for database rights management are emphasized. Some new ideas are put forward base on the thorough analysis of existing technology, standard and rights management system as solutions to the application of the database rights management. Main work in this paper is divided into five parts where the points 2 to 5 are the contribution of this research, shown as following:1) Definitions to the research objects on database rights management in detail are given, and the theoretic base to database rights management is formed by the analysis of this study in China and abroad the requiremcnt of database rights management. First, the definitions of subject, object, rights and rights management of database are provided, and the purpose of this paper and the technology route are established. Then, based on the related literature reviewing and data collection, the research progress of the law for intellectual property protection, digital rights management and the database security are discussed. The achievements and problems of them have been put forward. the theoretic base to database rights management is provided.2) A database rights expression model (DBRE) are proposed, and an idea to solve the interoperability between database rights management is presented. First, the requirements of database rights expression are fixed. Second, both the object size of database rights expression and the database object identification are defined. Third, the entities of database rights expression are abstracted and the relationships between them are described. At the same time, the constraint entity is Isolated from condition entity and a set of reasonable expression rules and methods are established. Forth, digital license as a carrier of rights expression is built which gives the description of the rights and its grant for particular subject to use particular object according to the subject’s identity and database objects. The legal right of certain moment can be interpreted. At last, for the mapping between different language licenses, an idea is put forward to solve interoperability and guarantee satisfaction to the decomposition and combination requirements of independent licenses.3) A role based usage control model (RBUC) is proposed to realize decision continuity and Attribute mutability. First, the requirements of usage control on database resources are fixed. Second, the core model is extended according to the entities in database rights expression model, based on which the user action attribute is added, to ensure that only authorized users can use the corresponding database resources during the usage. Third, the authorization and the revocation are separated from each other in this model. According to the usage decision, the rights can be revoked before usage, during usage or after usage which settle the problem of decision continuity. The attributes of subjects and objects are allowed to vary before usage, during usage or after usage. These changes affect usage decision in turn to avoid the infinite usage on the objects. Besides above, the idea of role management enhances the flexibility of user management and right distribution.4) An idea of authorization delegation is employed and time limit is added in RBUC model to solve the problem of the multi-step delegation. The role tree and the corresponding right spread chain are designed to realize authorization delegation function. Then, to consider dynamic changes caused by the time changes, the time limit as one of constraints is added. At the same time, the exclusive role constraints, the partial delegation constraints and delegation dependencies constraints are used to support the constrained delegation. Database users can use database resources through the delegated role and can be granted or revoked the delegated role dynamically which solve the weakness of a large number of users with a small number of roles. Furthermore, delegation certification is defined to express the requirement of delegation, based on which, a set of complete executive rules are proposed to realize the flexibility of authorization management system for database.5) A layered architecture for database rights management system is proposed and a prototype database rights management system is designed facing cloud computing. The requirements of database rights management system are confirmed. With the limitation shared by all current digital rights management systems being pointed out, a four-layer architecture is proposed and layers are defined, which support the reasonable usage of database resources during its whole life cycle such as production, distribution and sales. Facing the cloud computing environment, a prototype database rights management system is built based on private cloud to solve the problems of interoperability, flexibility and persistence between systems and meet the needs of users across the cross-platform and customer satisfaction.Research on rights expression, usage control and authorization management for database are studied in this paper to realize the interoperability across systems, decision continuity, attributes variation and the flexibility of authorization management. The legitimate use during the database lifecycle is ensured and the various interests of right holders in industry chain are balanced. The theoretical value and actual value of this paper is expected to bring benefit for future research on database rights management.
Keywords/Search Tags:database, rights management, right expression, usage control, delegation authority, layered architecture
PDF Full Text Request
Related items