Font Size: a A A

Domestic Security Database Secure-oscar Security Architecture And Implementation Analysis

Posted on:2006-01-28Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y TuFull Text:PDF
GTID:2208360152466447Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the core of information systems, database management systems is the key to ensure the security of information. Currently most of the information systems in our country are built on foreign untrusty DBMSs, which makes us in danger in commercial competition and electronic warfare in such a complex international situation. Hence, it is urgent to develop such products of ourselves. In such background, we developed large scale database management system OSCAR. In order to improve its security, we developed its secure version Secure-OSCAR further, which makes it is suitable for security critical domains such as aerospace, military, etc. In this paper we discuss the efforts made in Secure-OSCAR to ensure security, describe its security architecture in detail and analyse the realization of some essential parts.We first analyse the security threats that DBMS must face and introduce a security threat model. According to various technologies to ensure database security, we introduce an ideal anti-threat model. This model will be the reference model of Secure-OSCAR's security architecture.Later, we discuss the lE3P(Independent and Exclusive 3-Privilege) security architecture of Secure-OSCAR and every parts of this architecture detailedly, including various authentication mechanism, role-based extended discretionary access control(DAC), label-based extended mandatory access control(MAC), column level encryption mechanism based on security catalog, audit and intrusion detection. These mechanisms use technologies such as "prevention", "detection" together to ensure system's security.The following three chapters discuss the detailed realization of label-based extended mandatory access control, column level encryption mechanism based on security catalog and audit mechanism separately. The MAC mechanism in Secure-OSCAR is based on the classical Bell-LaPadula model. We extend this model to make our system more usable without losing its security. We also analyze the shortcoming of MAC, its countermeasure and possible performance decrease. The realization of MAC makes Secure-OSCAR measure up to Bl level of TCSEC/TD1 and the 3rd level of "Classified Security Protection of Computer Information System ?Technique Requirements of Database Management System" of Industry Standard of Public Security of China. When realizing database encryption, we introduce the concept of Security Catalog and introduce an efficient multilevel key management mechanism, which makes the system support access to encryption columns from many users. At last, we discuss the limitation of database encryption and field level encryption technology. Encryption makes the system more secure.We sum up the paper in the end. According to the ideal anti-threat model and the unresolved security problems, we propose the future research and improvement direction of Secure-OSCAR's security architecture.
Keywords/Search Tags:Database Security, Secure-OSCAR, Security Architecture, Discretionary Access Control, DAC, Mandatory Access Control, MAC, Role-based Access Control, RBAC, Database Encryption, Multilevel Key Management, Audit
PDF Full Text Request
Related items