Skip to main content

SPIDER: An Autonomic Computing Approach to Database Security Management

  • Conference paper
Secure Data Management (SDM 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4165))

Included in the following conference series:

  • 535 Accesses

Abstract

The system management complexity is exponentially increasing for the computing systems by even threatening their viability. Researchers and practitioners are scrambling to significantly simplify the all aspects of system management complexity. One of the most notable efforts towards this direction is the autonomic computing initiative, which is inspired by how the human body works to manage itself. In this paper, we focus on the database security management. We approach the security management issues from the autonomic computing perspective. We consider situations where the database is damaged by successful malicious attacks. Our goal is to design the system in such a way that the database system should be able to isolate the damaged parts of the system and to keep the other parts of the system functioning as the damage is being repaired.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IBM Tivoli Risk Manager. Info. available at: http://www-306.ibm.com/software/tivoli/products/risk-mgr/

  2. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proc. of VLDB (2002)

    Google Scholar 

  3. Agrawal, S., Chaudri, S., Narasayya, V.R.: Automated Selection of Materialized Views and Indexes for SQL Databases. In: Proc. of VLDB (2000)

    Google Scholar 

  4. Axelsson, S.: Intrusion Detection Systems: A Taxomomy and Survey. Technical report, Dept. of Computer Engineering, Chalmers University of Technology, Sweden (2000)

    Google Scholar 

  5. Castano, S., Fugini, M., Martella, G., Samarati, P.: Database Security. Addison-Wesley Publishing Company, Reading (1995)

    MATH  Google Scholar 

  6. Chaudhuri, S., Christensen, E., Graefe, G., Narasayya, V.R., Zwilling, M.J.: Self-tuning technology in microsoft SQL server. Data Engineering Bulletin 22(2), 20–26 (1999)

    Google Scholar 

  7. Damiani, E., di Vimercati, S.D.C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted Relational DBMSs. In: Proc. of 10th ACM Conf. On Computer and Communications Security (2003)

    Google Scholar 

  8. Denning, D.: An Intrusion-Detection Model. IEEE Transactions on Software Engineering 13(2) (1987)

    Google Scholar 

  9. Ganek, A.G., Corbi, T.A.: The Dawning of the Autonomic Computing Era. IBM Systems Journal 42(1), 5–18 (2003)

    Article  Google Scholar 

  10. Hacıgümüş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over Encrypted Data in Database Service Provider Model. In: Proc. of ACM SIGMOD (2002)

    Google Scholar 

  11. Hacıgümüş, H., Iyer, B., Mehrotra, S.: Providing Database as a Service. In: Proc. of ICDE (2002)

    Google Scholar 

  12. Jensen, C.S., Mark, L., Roussopoulos, N.: Incremental Implementation Model for Relational Databases with Transaction Time. IEEE Transactions on Knowledge and Data Engineering 3(4), 461–473 (1991)

    Article  Google Scholar 

  13. Kemmerer, R.A., Vigna, G.: Intrusion detection: a brief history and overview. IEEE Computer 35(4) (2002)

    Google Scholar 

  14. Kephart, J.O., Chess, D.M.: The Vision of Autonomic Computing. IEEE Computer 36(1), 41–50 (2003)

    Google Scholar 

  15. Kwan, E., Lightstone, S., Storm, A., Wu, L.: Automatic Configuration for IBM DB2 Universal Database, available at: http://www.redbooks.ibm.com/redpapers/pdfs/redp0441.pdf

  16. Lohman, G., Lightstone, S.: SMART: Making DB2 (More) Autonomic. In: Bressan, S., Chaudhri, A.B., Li Lee, M., Yu, J.X., Lacroix, Z. (eds.) CAiSE 2002 and VLDB 2002. LNCS, vol. 2590. Springer, Heidelberg (2003)

    Google Scholar 

  17. Lohman, G., Valentin, G., Zilio, D., Zuliani, M., Skelly, A.: DB2 Advisor: An optimizer Smart Enough to Recommend Its Own Indexes. In: Proc. of ICDE (2000)

    Google Scholar 

  18. Lunt, T., Fernandez, E.B.: Database Security. ACM SIGMOD Record 19(4) (1990)

    Google Scholar 

  19. Rao, J., Zhang, C., Lohman, G., Megiddo, G.: Automating Physical Database Design in a Parallel Database System. In: Proc. of ACM SIGMOD (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hacıgümüş, H. (2006). SPIDER: An Autonomic Computing Approach to Database Security Management. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2006. Lecture Notes in Computer Science, vol 4165. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11844662_13

Download citation

  • DOI: https://doi.org/10.1007/11844662_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38984-2

  • Online ISBN: 978-3-540-38987-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics