Security against Inference Attacks on Negative Information in Object-Oriented Databases

Inference attacks mean that a user derives information on the execution results of unauthorized queries from the execution results of authorized queries. Although many studies so far focus on only inference of positive information (i.e., which object is the execution result of a given unauthorized query), negative information (i.e., which object is never the execution result of a given unauthorized query) is also sensitive. In this paper, we define the following two types of security problems against inference attacks on given negative information: (1) Is the information secure under a given database instance? (2) Is it secure under any database instance of a given database schema? It is shown that the first problem is decidable in polynomial time in the description size of the database instance while the second one is undecidable. A decidable sufficient condition for given negative information to be secure under any database instance of a given database schema is also proposed.

[1]  Minoru Ito,et al.  Authorization Analysis of Queries in Object-Oriented Databases , 1995, DOOD.

[2]  Minoru Ito,et al.  A Formal Approach to Detecting Security Flaws in Objected-Oriented Databases , 1999 .

[3]  Kan Zhang IRI: A Quantitative Approach to Inference Analysis in Relational Databases , 1997, DBSec.

[4]  Keishi Tajima Static detection of security flaws in object-oriented databases , 1996, SIGMOD '96.

[5]  Ira S. Moskowitz,et al.  Bayesian Methods to the Database Inference Problem , 1998, DBSec.

[6]  Csilla Farkas,et al.  The Inference Problem and Updates in Relational Databases , 2001, DBSec.

[7]  Hiroyuki Seki,et al.  Testing Type Consistency of Method Schemas , 1995 .

[8]  Elisa Bertino,et al.  Research Issues in Discretionary Authorizations for Object Bases , 1993, Security for Object-Oriented Systems.

[9]  E. Paul On Solving the Equality Problem in Theories Defined by Horn Clauses , 1986, Theor. Comput. Sci..

[10]  Robert E. Tarjan,et al.  Variations on the Common Subexpression Problem , 1980, J. ACM.

[11]  Sridhar Ramaswamy,et al.  Method schemas , 1990, PODS '90.

[12]  Ira S. Moskowitz,et al.  Bayesian Methods Applied to the Database Inference Problem , 1999 .

[13]  Matthew Morgenstern,et al.  Security and inference in multilevel database and knowledge-base systems , 1987, SIGMOD '87.

[14]  Minoru Ito,et al.  The Security Problem against Inference Attacks on Object-Oriented Databases , 1999, DBSec.

[15]  Peter J. Denning,et al.  Data Security , 1979, CSUR.

[16]  Ehud Gudes,et al.  A Method-Based Authorization Model for Object-Oriented Databases , 1993, Security for Object-Oriented Systems.