Вы находитесь на странице: 1из 2

Privacy Issues and Preservation

 Is growing issue for database security and privacy experts

 Should limit performing large-scale data mining and analysis

 Violating only single repository’s data security could expose all data

 Common techniques to address this issue:

o Avoid building mammoth central warehouse as a mingle repository of vital information

o Intentionally modify or perturb data

o Avoiding central warehouses and using distributed data mining algorithms minimize the exchange of
data needed to develop globally valid model

o Complicated due to its multidisciplinary nature and the issues related to the subjectivity in the
interpretation of privacy, trust and so on

Challenges of Database Security

 DATA QUALITY
to ensure supporting the maintenance of quality data the database community could benefit from seal of quality
stamps posted on Web sites, more effective integrity semantics verification tools for data assessment based on
techniques such as record linkage, perhaps even more efficient application level recovery techniques.

 INTELLECTUAL PROPERTY RIGHTS


the book brings up the notion of using watermarking techniques to protect content from unauthorized
duplication and distribution over world networks by enabling provable ownership of the content. However,
research on such matters is still in progress.

 DATA SURVIVABILITY
 Database systems need to operate and continue their function, even with reduced capabilities, despite
disruptive events from warfare attack
 DBMS should be able to do the following:
o Confinement
 Take immediate action to eliminate the attacker’s access
 Isolate and contain the problem from further spread
o Damage assessment
 Determine the extent of the problem, including failed functions and corrupted data

o Reconfiguration

 Reconfigure to allow operations to continue in a degraded mode while recovery proceeds

o Repair

 Recover corrupted or lost data and repair or reinstall failed system functions to reestablish a
normal level of operations

o Fault treatment

 To the extent possible, identify the weaknesses exploited in the attack and take steps to prevent
a recurrence

Вам также может понравиться