Title :
Detecting Suspicious Relational Database Queries
Author :
Bottcher, S. ; Hartel, Rita ; Kirschner, Matthias
Author_Institution :
EIM - Electr. Eng., Comput. Sci. & Math., Univ. of Paderborn, Paderborn
Abstract :
Whenever secret information has been shared among multiple partners and has been illegally leaked to a third party, it is important for the trust among the partners to identify the information leak. We present a forensic approach to privacy violation control that after information has been leaked identifies those partners that had access to the leaked information. Our approach represents secret information as a boolean formula and compares it with the queries and the relational database state to which the queries were applied. We use this technique to identify suspicious queries, i.e., queries that have got sufficient information to infer secret information that has been leaked. Furthermore, we prove that checking where a select-project query is suspicious with respect to a given secret information is NP-complete, but a polynomial time solution exists for interesting subclasses.
Keywords :
data privacy; query processing; relational databases; security of data; NP complete; information leak; secret information; suspicious relational database queries detection; Access control; Availability; Computer security; Database languages; Forensics; Polynomials; Relational databases; Testing; US Department of Transportation; XML; Auditing Compliance; Privacy; relational Database;
Conference_Titel :
Availability, Reliability and Security, 2008. ARES 08. Third International Conference on
Conference_Location :
Barcelona
Print_ISBN :
978-0-7695-3102-1
DOI :
10.1109/ARES.2008.125