2 MOTIVATION
Tampering and injecting or deleting certain fields in
the database by an administrator or a hacker with
administrative privileges in spite of various security
measures such as database access controls is a
serious issue. In this communications world, where
most of the transactions are done over the
web/internet, there is a need for the applications to
know whether the data they are retrieving from the
database is authentic or not. In addition, a number of
legislative and commercial initiatives are requiring
increased attention to the privacy, confidentiality
and authenticity/integrity of electronic stored data to
safeguard non-public personal information (NPI)
and other sensitive enterprise data. Information
security requirements associated with these
measures include:
HIPAA (Health Insurance Portability and
Accountability Act) (Arup, 2004) introduced in
United States to eliminate the problems concerning
the Health care access and made mandatory for all
healthcare companies to be HIPAA compliant by
2003. The main aim of HIPPA is to make patient
information available to authorized users only and to
maintain the Privacy of information.
The Gramm-Leach-Bliley Act (GLB Act,
2004), also known as the Financial Modernization
Act of 1999, is a federal law enacted in the United
States to control the ways that financial institutions
deal with the private information of individuals. It
stresses on the collection and disclosure of private
financial information and says that the financial
institutes must implement security programs to
protect such information so that the private
information is not accessed through false pretences.
Sarbanes-Oxley Act – Passed in 2002, places
strict requirements on company Boards and Officers
to proactively prevent mishandling of information
(Sarbanes, 2004). The Sarbanes-Oxley Act has
changed how companies must disclose information
regarding the responsibilities of corporate directors,
officers and reporting obligations. Public companies
must comply with these regulations or face
significant penalties.
The Data protection Act, 1998, came into
effect in March 2000 in United Kingdom. Data
protection act serves to protect people from their
personal information being treated, and used in a
harmful manner (DP Act, 2004). The main objective
of Data Protection law is to ensure that the
fundamental right to privacy is not infringed through
the abuse of today's technology. This act says the
personal data should be collected for specified
lawful means and should be processed fairly and
lawfully. Non-compliance with the data protection
provisions may result in exposing the institution to
civil and or criminal liability in addition to the
related negative publicity.
3 RELATED RESEARCH WORK
R Graubart in his paper on “The Integrity-Lock
Approach to Secure Database Management”
(Richard, 1984) has proposed the concept of using
checksums at record level and field level for
integrity purpose. In this architecture, a trusted front
end is introduced between the user/client and the
untrusted DBMS for the verification of checksums.
The paper also analysed the advantages and
disadvantages of this approach when checksums are
used at record level and at field level.
E Mykletun and M Narasimha proposed a new
scheme using Merkley’s Hash Trees for Integrity
and Authentication in Outsourced Databases
(Mykleuton, 2003a). Here a Hash Tree is
constructed and stored at the database in addition to
the records. All the records are placed at the leaves
of the tree, the interior nodes are the hashes of the
data at sons of that node, and the owner of data signs
the root node. Whenever the client queries the
database, all the relevant records and the necessary
hashes unto the root are sent to the client. The client
verifies the signature of the root and reconstructs the
tree using the data sent to it and checks all the
hashes of the Hash Tree. This approach solves the
problem of completeness of query replies in addition
to data integrity problem.
In a later paper by the same authors, they
proposed two new schemes using Condensed RSA
and BGLS signatures (Mykleuton, 2003b). The first
scheme is for single owner, multiple querier models,
and second one for multi owner and multi querier
model. Both the schemes concentrated on reducing
the amount of extra information to be transferred
from database sever to client for verification of
integrity of data.
Another recent approach by C N Zhang, proposed an
integrated approach for integrity of database and
Fault Tolerance (Chang, 2004). This approach
utilizes the redundant residue number systems and
Chinese remainder Theorem for checksum
generation and verification. This approach also
detects and corrects a single error in the data.
However, this approach requires finding n number
of big relatively primes where n is the number of
fields in the record and also the approach requires lot
of security analysis to be done.
SECURING THE ENTERPRISE DATABASE
77