Data Security: Introduction and Motivation
In the last few years, the amount of information stored in electronic media has increased significantly. Information which is stored in some medium is usually called data. An important aspect of the storage of information is the way in which access is performed; this is commonly called information retrieval. Here, practically always some knowledge is required in order to be able to access the information. This knowledge can come in many different forms. For example, in order to be able to withdraw money from an automated teller, a certain code must be supplied. This code is assigned to the account holder personally and is to be kept confidential. It should be noted that this is indeed an example of limiting access to information, as it is the stored information (“How much money is left in the account?”) which is ultimately translated into more tangible resources (i.e., bank notes). Of crucial importance is the requirement that without this knowledge the stored information cannot be accessed. Clearly, it would be highly undesirable if someone other than the account holder, i.e., someone who does not know the code, could withdraw money from the account. Since this vital knowledge is deliberately hidden, presumably by the owner of the resource, access becomes impossible for anybody but the original owner. Thus the resource is protected, the information is secret.
KeywordsData Security Confidential Data Access Mechanism Restricted Group Bank Note
Unable to display preview. Download preview PDF.