Despite the growing attention from research and industry towards improving the security of our IT infrastructures, today the protection of data, entrusted to corporate information systems, is more more challenging than ever. There are several factors behind this trend. Data security concerns are evolving. In addition to the traditional requirements of data confidentiality, integrity and availability, new requirements are emerging such as data quality (P. Missier, 2003), completeness, timeliness and provenance. In particular, it is important that the data is complete, correct and up-to-date with respect to the outside world. Increasing data quality will make data more valuable. Highly valuable data increases the potential for profit from unauthorized access and the potential damage that can be done if the data is corrupted. The amount of data is increasingly greater: “The amount of information in the world is estimated to double every 20 months, and the size and number of databases are increasing even faster” (R.Agawal, 2002)). Therefore, protection mechanisms must be able to adapt well. We are witnessing a growing disintermediation in access to data. The intermediate information processing steps typically performed by company employees, such as typing an order received over the phone, are removed. Users outside traditional company boundaries can have direct and immediate online access to company information about them. In a traditional environment, any access to sensitive information occurs through employees. While employees are not always trustworthy, at least they are known, their access to sensitive data is limited by their function and employees who violate access policies may be subject to disciplinary action. designed and integrated with processing techniques for continuous queries. Finally, the confidentiality of user location data, acquired by sensors and communication networks, must be guaranteed. • Database survivability This is an important topic that has been largely unexplored, despite its relevance. Survivability refers to the ability of the database system to continue its functions, even at reduced capacity, despite disruptive events, such as information warfare attacks. To date, questions of database survival have not been investigated much. (Liu, 2002) proposed four database architectures for intrusion-tolerant database systems that focus on containing malicious transactions. While this is an important initial step, much more research needs to be devoted to the techniques and methodologies that ensure database system survival.
tags