Forum for Science, Industry and Business

Sponsored by:     3M 
Search our Site:

 

Passwords to guard entry aren’t enough to protect complex data

16.02.2004


Security mechanisms also must protect what goes out



Passwords to guard entry aren’t enough to protect complex data - security mechanisms also must protect what goes out

"Data can easily find itself in danger of being accessed by ’bad guys,’" says emeritus professor of computer science Gio Wiederhold, who will speak about trusted information databases Feb. 14 in Seattle at the annual meeting of the American Association for the Advancement of Science (AAAS). "Passwords and other means of access control are okay, but additional security mechanisms are needed to provide security." To ensure that data records are not released into the wrong hands, Wiederhold suggests adding filters to outgoing data.


Traditional security systems often utilize access control in which passwords are the key to identifying authorized users and granting them access to data. While doctors or nurses may have access to medical data in a hospital database, they cannot access financial data in the hospital’s accounting database. Conversely, an insurance company can access financial records but not patient medical records. Patients, in contrast, can request access to both types of data. A database administrator in a traditional system defines different roles for different users, and those roles define the type of access allowed.

The good news about traditional systems is that bad guys must employ multiple ’hacks’ to get past the firewalls, operating systems and the database security itself. The bad news is that because the filter is at the level of user access, security stops once a user gains access to material authorized for his or her role. If a good guy turns bad - as in the case where a disgruntled employee with access privileges decides to do some damage - the database becomes endangered.

A severe disadvantage to the access-driven security model is that it requires that all of the contents be well organized and placed into neat bins for access by those with authorized roles. Protection is poor for data that are complex, multipurpose, unstructured, formatted as images, or now used for roles not recognized when the data were first collected. Medical records, for instance, are nearly impossible to organize for all the roles that they serve.

The most serious issue is that access control does not consider collaboration. For instance, in a medical setting, many types of users legitimately need access to patient data, and their legitimate access rights intersect in many ways. A document given to a researcher in a specific area, say cardiac disease, may also include information about pregnancy, psychological profile, or HIV status. Because of their holistic role, patient medical records cannot be organized to separate all of those aspects. Simply removing patient identification from every separate aspect of a patient’s record disables research, since long-term follow-up and integration of data from encounters at diverse sites are needed. Wiederhold says filters can and should check outgoing documents for terms warranting more protection.

"When these [medical] and other databases are designed, the possible uses and security needs cannot be fully considered," Wiederhold says. If a company outsources work to a consultant, the consultant needs access to the company database. By using release control - which monitors the contents of documents being delivered to the requestor - alongside traditional access control, the consultant is restricted to material that is relevant to a particular project, Wiederhold says. The databases need not be redesigned to reclassify or remove data that is inappropriate or proprietary.

Protecting data before it gets released means vetting the contents of documents retrieved from internal files, Wiederhold says. Document release protection may be desirable for diverse systems with data output, such as e-mail, file systems, databases and websites. Such filters are already operational in e-mail systems employing "dirty word" filters and in military systems that "fuzzify" shared data that only can be seen clearly using specially supplied equipment.

As data increase in complexity, it becomes increasingly difficult to define a good security model that works well for different types of collaborating users. For example, customers of an online file-sharing business need to be able to access files from the company’s database, but they should not be able to see contents pertaining to other customers, such as credit card numbers or e-mail-address. Recognizing that we must allow access to many types of users - each with their own objectives and ethics - means that a simple good guy/bad guy access model is inadequate. While access control working alongside release control will improve the protection of privacy, complex security definitions may conflict with each other or even form security holes, Wiederhold says. "The scope of potential use of data is so large that no approach that relies on any specific data organization will be adequate for all future needs," he says. "But relying only on access control is certainly inadequate."


CONTACT: Dawn Levy, News Service: (650) 725-1944, dawnlevy@stanford.edu
COMMENT: Gio Wiederhold, Computer Science: (650) 725-8363, gio@cs.stanford.edu

Mirella Bucci | EurekAlert!
Further information:
http://www.stanford.edu/dept/news/

More articles from Information Technology:

nachricht Controlling robots with brainwaves and hand gestures
20.06.2018 | Massachusetts Institute of Technology, CSAIL

nachricht Innovative autonomous system for identifying schools of fish
20.06.2018 | IMDEA Networks Institute

All articles from Information Technology >>>

The most recent press releases about innovation >>>

Die letzten 5 Focus-News des innovations-reports im Überblick:

Im Focus: Temperature-controlled fiber-optic light source with liquid core

In a recent publication in the renowned journal Optica, scientists of Leibniz-Institute of Photonic Technology (Leibniz IPHT) in Jena showed that they can accurately control the optical properties of liquid-core fiber lasers and therefore their spectral band width by temperature and pressure tuning.

Already last year, the researchers provided experimental proof of a new dynamic of hybrid solitons– temporally and spectrally stationary light waves resulting...

Im Focus: Overdosing on Calcium

Nano crystals impact stem cell fate during bone formation

Scientists from the University of Freiburg and the University of Basel identified a master regulator for bone regeneration. Prasad Shastri, Professor of...

Im Focus: AchemAsia 2019 will take place in Shanghai

Moving into its fourth decade, AchemAsia is setting out for new horizons: The International Expo and Innovation Forum for Sustainable Chemical Production will take place from 21-23 May 2019 in Shanghai, China. With an updated event profile, the eleventh edition focusses on topics that are especially relevant for the Chinese process industry, putting a strong emphasis on sustainability and innovation.

Founded in 1989 as a spin-off of ACHEMA to cater to the needs of China’s then developing industry, AchemAsia has since grown into a platform where the latest...

Im Focus: First real-time test of Li-Fi utilization for the industrial Internet of Things

The BMBF-funded OWICELLS project was successfully completed with a final presentation at the BMW plant in Munich. The presentation demonstrated a Li-Fi communication with a mobile robot, while the robot carried out usual production processes (welding, moving and testing parts) in a 5x5m² production cell. The robust, optical wireless transmission is based on spatial diversity; in other words, data is sent and received simultaneously by several LEDs and several photodiodes. The system can transmit data at more than 100 Mbit/s and five milliseconds latency.

Modern production technologies in the automobile industry must become more flexible in order to fulfil individual customer requirements.

Im Focus: Sharp images with flexible fibers

An international team of scientists has discovered a new way to transfer image information through multimodal fibers with almost no distortion - even if the fiber is bent. The results of the study, to which scientist from the Leibniz-Institute of Photonic Technology Jena (Leibniz IPHT) contributed, were published on 6thJune in the highly-cited journal Physical Review Letters.

Endoscopes allow doctors to see into a patient’s body like through a keyhole. Typically, the images are transmitted via a bundle of several hundreds of optical...

All Focus news of the innovation-report >>>

Anzeige

Anzeige

VideoLinks
Industry & Economy
Event News

Munich conference on asteroid detection, tracking and defense

13.06.2018 | Event News

2nd International Baltic Earth Conference in Denmark: “The Baltic Sea region in Transition”

08.06.2018 | Event News

ISEKI_Food 2018: Conference with Holistic View of Food Production

05.06.2018 | Event News

 
Latest News

Creating a new composite fuel for new-generation fast reactors

20.06.2018 | Materials Sciences

Game-changing finding pushes 3D-printing to the molecular limit

20.06.2018 | Materials Sciences

Could this material enable autonomous vehicles to come to market sooner?

20.06.2018 | Materials Sciences

VideoLinks
Science & Research
Overview of more VideoLinks >>>