AnalyzingandSecuringSocialNetworksDr.BhavaniThuraisinghamTheUniversityofTexasatDallasLecture#1IntroductiontoDataandApplicationsSecurityJanuary18,2013OutlineDataandApplicationsSecurity-DevelopmentsandDirectionsSecureSemanticWeb-XMLSecurity;OtherdirectionsSomeEmergingSecureDASTechnologies-SecureSensorInformationManagement;SecureDependableInformationManagementSomeDirectionsforPrivacyResearch-DataMiningforhandlingsecurityproblems;Privacyvs.NationalSecurity;PrivacyConstraintProcessing;FoundationsofthePrivacyProblemWhataretheChallenges?DevelopmentsinDataandApplicationsSecurity:1975-PresentAccessControlforSystemsRandIngres(mid1970s)Multilevelsecuredatabasesystems(1980–present)-Relationaldatabasesystems:researchprototypesandproducts;Distributeddatabasesystems:researchprototypesandsomeoperationalsystems;Objectdatasystems;Inferenceproblemanddeductivedatabasesystem;TransactionsRecentdevelopmentsinSecureDataManagement(1996–Present)-Securedatawarehousing,Role-basedaccesscontrol(RBAC);E-commerce;XMLsecurityandSecureSemanticWeb;Dataminingforintrusiondetectionandnationalsecurity;Privacy;Dependabledatamanagement;SecureknowledgemanagementandcollaborationDevelopmentsinDataandApplicationsSecurity:MultilevelSecureDatabases-IAirForceSummerStudyin1982EarlysystemsbasedonIntegrityLockapproachSystemsinthemidtolate1980s,early90s-E.g.,SeaviewbySRI,LockDataViewsbyHoneywell,ASDandASDViewsbyTRW-Prototypesandcommercialproducts-TrustedDatabaseInterpretationandEvaluationofCommercialProductsSecureDistributedDatabases(late80stomid90s)-Architectures;AlgorithmsandPrototypefordistributedqueryprocessing;Simulationofdistributedtransactionmanagementandconcurrencycontrolalgorithms;SecurefederateddatamanagementDevelopmentsinDataandApplicationsSecurity:MultilevelSecureDatabases-IIInferenceProblem(mid80stomid90s)-Unsolvabilityoftheinferenceproblem;Securityconstraintprocessingduringquery,updateanddatabasedesignoperations;SemanticmodelsandconceptualstructuresSecureObjectDatabasesandSystems(late80stomid90s)-Secureobjectmodels;Distributedobjectsystemssecurity;Objectmodelingfordesigningsecureapplications;SecuremultimediadatamanagementSecureTransactions(1990s)-SingleLevel/MultilevelTransactions;SecurerecoveryandcommitprotocolsSomeDirectionsandChallengesforDataandApplicationsSecurity-ISecuresemanticwebandSocialNetworks-SecuritymodelsSecureInformationIntegration-HowdoyousecurelyintegratenumerousandheterogeneousdatasourcesonthewebandotherwiseSecureSensorInformationManagement-Fusingandmanagingdata/informationfromdistributedandautonomoussensorsSecureDependableInformationManagement-IntegratingSecurity,Real-timeProcessingandFaultToleranceDataSharingvs.Privacy-Federateddatabasearchitectures?SomeDirectionsandChallengesforDataandApplicationsSecurity-IIDataminingandknowledgediscoveryforintrusiondetection-Needrealisticmodels;real-timedataminingSecureknowledgemanagement-ProtecttheassetsandintellectualrightsofanorganizationInformationassurance,Infrastructureprotection,AccessControl-Insidercyber-threatanalysis,Protectingnationaldatabases,Role-basedaccesscontrolforemergingapplicationsSecurityforemergingapplications-Geospatial,Biomedical,E-Commerce,etc.OtherDirections-TrustandEconomics,TrustManagement/Negotiation,SecurePeer-to-peercomputing,CoalitionDataandPolicySharingExportData/PolicyComponentData/PolicyforAgencyAData/PolicyforFederationExportData/PolicyComponentData/PolicyforAgencyCComponentData/PolicyforAgencyBExportData/PolicyOthertopicsofInterestSecureCloudComputingMobilecodesecurityVulnerabilityAnalysisInfrastructuresecurity-PowergridHealthcareSecurityFinancialSecurityAccessControlDiscretionaryAccessControlinRelationalDatabasesMandatoryAccessControlinRelationalDatabases-SecurityConstraintsTypesofAccessControl-Inferenceproblem,Role-based,Temporal,UsageAccessControlinOtherDatabases-Objects,FederatedCurrentTrendsinAccessControl-DateWarehousing,SemanticWeb,PrivacyControlNextStepsinAccessControlAccessControlinRelationalDatabases:1975-PresentAccessControlpoliciesweredevelopedinitiallyforfilesystems-E.g.,Read/writepoliciesforfilesAccesscontrolindatabasesstartedwiththeworkinSystemRandIngresProjects-AccessControlrulesweredefinedfordatabases,relations,tuples,attributesandelements-SQLandQUELlanguageswereextendedGRANTandREVOKEStatementsReadaccessonEMPtoUsergroupAWhereEMP.Salary30KandEMP.DeptSecurity-QueryModification:ModifythequeryaccordingtotheaccesscontrolrulesRetrieveallemployeeinformationwheresalary30KandDeptisnotSecurityQueryModificationAlgorithmInputs:Query,AccessControlRulesOutput:ModifiedQueryAlgorithm:-GivenaqueryQ,examinealltheaccesscontrolrulesrelevanttothequery-IntroduceaWhereClausetothequerythatnegatesaccesstotherelevantattributesintheaccesscontrolrulesExample:rulesareJohndoesnothaveaccesstoSalaryinEMPandBudgetinDEPTEMP(E#,Ename,Salary,D#),DEPT(D#,Dname,Budg,Mgr)QueryistojointheEMPandDEPTrelationsonDept#ModifythequerytoJoinEMPandDEPTonDept#andprojectonallattributesexceptSalaryandBudget-OutputistheresultingqueryMand