Skip to main content
Log in

Inference Attacks and Information Security in Databases

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract—

Security of modern data architectures implemented in relational DBMS’s is analyzed. The emphasis is placed on inference attacks, which are not prevented by traditional access control methods. Examples of such attacks are given and fundamental approaches to protecting against them are analyzed. The development of special software built and operating on the principles of intellectual data analysis is proposed as a security measure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.

Similar content being viewed by others

REFERENCES

  1. Baraani-Dastjerdi, A., Pieprzyk, J., Pieprzyk, B.-D.J., and Safavi-Naini, R., Security in Databases: A Survey Study, 1996, pp. 1–39.

  2. Shenets, N.N., Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 936–946.

    Article  Google Scholar 

  3. Jiang, Q., Ma, J., and Wei, F., On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services, IEEE Syst. J., 2018, vol. 12, no. 2, pp. 2039–2042. https://doi.org/10.1109/JSYST.2016.2574719

    Article  Google Scholar 

  4. Kalinin, M., Krundyshev, V., Rezedinova, E., and Zegzhda, P., Role-based access control for vehicular adhoc networks, 2018 IEEE International Black Sea Conference on Communications and Networking, 2018. https://doi.org/10.1109/BlackSeaCom.2018.8433628

  5. Konoplev, A.S. and Kalinin, M.O., Access control system for distributed computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 664–668.

    Article  Google Scholar 

  6. Konoplev, A.S. and Kalinin, M.O., Tasks of providing information security in distributed computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 669–672.

    Article  Google Scholar 

  7. Busygin, A.G., Konoplev, A.S., and Kalinin, M.O., Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 743–748.

    Article  Google Scholar 

  8. Aleksandrova, E.B., Zegzhda, D.P., and Konoplev, A.S., Applying the group signature for entity authentication in distributed grid computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 739–742.

    Article  Google Scholar 

  9. Keke, G., Longfei, Q., Min, C., Hui, Zh., and Meikang, Q., SA-EAST: Security-aware efficient data transmission for its in mobile heterogeneous cloud computing, ACM Trans. Embed. Comput. Syst., 2017, vol. 16, no. 2.

  10. Volkov, S.D., Tsaregorodtsev, A.V., and Tsatskina, E.P., Features of building systems for detecting computer attacks for information and telecommunication systems operating on the basis of cloud computing technology, Ogarev-Online, 2017, no. 13.

  11. Belenko, V., Chernenko, V., Kalinin, M., and Krundyshev, V., Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems, 2018 International Russian Automation Conference, RusAutoCon, 2018. https://doi.org/10.1109/RUSAUTOCON.2018.8501783

  12. Krundyshev, V. and Kalinin, M., Hybrid neural network frame work for detection of cyber attacks at smart infrastructures, ACM International Conference Proceeding Series, 2019. https://doi.org/10.1145/3357613.3357623

  13. Ovasapyan, T.D., Moskvin, D.A., and Kalinin, M.O., Using neural networks to detect internal intruders in vanets, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954–958.

    Article  Google Scholar 

  14. Poltavtseva, M.A. and Khabarov, A.R., Database security: Problems and prospects, Program. Prod. Sist., 2016, no. 3, pp. 36–41. https://doi.org/10.15827/0236-235X.115.036-041

  15. Zegzhda, P.D. and Kalinin, M.O., Technology of security services virtualization for high-speed computer networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 734–738.

    Article  Google Scholar 

  16. Poltavtseva, M.A., A consistent approach to building secure big data processing and storage systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 914–921.

    Article  Google Scholar 

  17. Tanque, M. and Foxwell, H.J., Big data and cloud computing: A review of supply chain capabilities and challenges, Exploring the Convergence of Big Data and the Internet of Things, 2018. https://doi.org/10.4018/978-1-5225-2947-7.ch001

    Book  Google Scholar 

  18. Gorton, I. and Gracio, D.K., Data-Intensive Computing Architectures, Algorithms, and Applications, Cambridge Press, 2012.

    Book  Google Scholar 

  19. Elvis, D. and Foster, C., Database Systems: A Pragmatic Approach, Apress, 2016.

    Google Scholar 

  20. Poltavtseva, M.A., Zegzhda, D.P., and Kalinin, M.O., Big data management system security threat model, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 903–913.

    Article  Google Scholar 

  21. Yip, R.W. and Levitt, K.N., Data level inference detection in database systems, Proceedings of 11th IEEE Computer Security Foundations Workshop, Rockport, MA, 1988, pp. 179–189.

  22. Hinke, T.H., Delugach, H.S., and Wolf, R.P., Protecting databases from inference attacks, Comput. Secur., 1997, vol. 16, no. 8, pp. 687–708.

    Article  Google Scholar 

  23. Yang, Y.J., Li, Y.J., and Deng, R.H., New paradigm of inference control with trusted computing, IFIP Annual Conference on Data and Applications Security and Privacy, Redondo Beach, CA, 2007, pp. 243–258.

  24. Ozsoyoglu, G., On inference control in semantic data models for statistical databases, J. Comput. Syst. Sci., 1990, vol. 40, no. 3, pp. 405–443.

    Article  MathSciNet  Google Scholar 

  25. Hylkema, M., A Survey of Database Inference Attack Prevention Methods, Educ. Technol. Res., 2009.

  26. Biskup, J., Embley, D.W., and Lochner, J.H., Reducing inference control to access control for normalized database schemas, Inf. Process. Lett., 2008, vol. 106, no. 1, pp. 8–12.

    Article  MathSciNet  Google Scholar 

  27. Chen, Y. and Chu, W., Database security protection via inference detection, Intelligence and Security Informatics, San Diego, CA, 2006, pp. 452–458.

    Book  Google Scholar 

  28. Goyal, V., Gupta, S.K., Singh, M., and Gupta, A., Auditing inference based disclosures in dynamic databases, Workshop on Secure Data Management, Auckland, 2008, pp. 67–81.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. A. Poltavtsev.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by O. Pismenov

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Poltavtsev, A.A., Khabarov, A.R. & Selyankin, A.O. Inference Attacks and Information Security in Databases. Aut. Control Comp. Sci. 54, 829–833 (2020). https://doi.org/10.3103/S0146411620080271

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411620080271

Keywords:

Navigation