2 DATABASE PRIVACY ISSUES
Database privacy is an issue of a significant interest.
Many works, particularly on privacy of data
transmission exist. This paper only focuses on
privacy of stored data.
Access control is a widespread and mandatory
security mechanism to prevent access to the database
from outsiders. (Oracle Database) presents a fine-
grained access control (FGAC) mechanism for
databases. FGAC allows to implement security
policies with functions and then to use those security
policies to implement row-level security on tables
and views. Although access control mechanisms
become more refined, they are not sufficient to
guarantee data privacy from an insider. Another
approach in database privacy is multi-level security
(Jajodia and Sandhu). Whereas access control
approach usually offers a per-table granularity, both
data and entities are assigned security levels in
multi-level approach. Multilevel security extends
access control, but it does not provide the necessary
control to the data owner over its data.
Thus, some paper opt for an individual centric
privacy approach. (Marchiori) proposes a solution
allowing corporations to define their own privacy
policies. The organization is here considered as
trustful. Therefore, considering as uncomfortable the
philosophy of trusting corporations to protect
privacy, (Aggarwal et al.) exports the privacy
policies from the organization to the data owner, and
seeks to enable the data owner to retain control over
its personal information even after its release to an
organization.
(Bawa et al.) adopts a completely different approach
by splitting the information over several providers.
A index allows to reconstruct the original
information. The problem comes down to provide
privacy-preserving search over distributed access
controlled content.
Other research papers introduce statistical databases
(Adam and Worthman). The main idea is to enable
queries on aggregate of information without
revealing individual records. This interesting
approach does not fit our requirement because we
need to minimize impact on existing database
system.
Finally, (Adam and Worthman) explores data
privacy issues in the “databases as service” (DAS)
paradigm. DAS systems provide its customers
seamless mechanisms to create, store, and access
their databases at the host site. Data privacy is
ensured by data storage in encrypted form. The main
challenge, on top of the key management, is the
execution of SQL queries by the service provider
over encrypted database without decrypting the data.
This innovative approach completely exports the
database query processor to the client side.
3 SMMART SECURE STORAGE
APPROACH
3.1 Overview
Providing a privacy policy-based storage mechanism
is a real challenge because of the complexity of
relational database and the major issue of executing
SQL queries over encrypted data. This section
presents the SMMART secure storage approach.
At the service level, two main entities are involved:
the service provider, i.e. the company that hosts the
SMMART system and all the associated services,
and the client, which consumes the service. At the
data level, the client uses several devices to collect
its data. Vehicles of client company embed RFID
and sensors networks in order to collect information,
and a data concentrator unit (DCU) to gather it.
Then, information is accessible either through the
mobile device or through the back-end database,
which synchronize with the DCU.
The figure 1 presents the overall SMMART system.
Figure 1: Simplified view of the SMMART system.
Finally, the goal of the privacy policy-based storage
mechanism lies in providing to the client the mean to
control its own data privacy. To address this issue
the client defines privacy policies to attribute a
privacy level to its data (section 2.2). According to
this privacy level, the client’s data are finally stored
in the service provider backend database. Moreover,
client manages its own encryption material, that
means database encryption is based on user-supplied
keys (section 2.3).
3.2 Policy-based Privacy
Policies allow the client to fully control its own data
privacy. Figure 2 gives a very simple example of
ICEIS 2007 - International Conference on Enterprise Information Systems
606