Method and system for enhancing quorum based access control...

Data processing: database and file management or data structures – Database design – Data structure types

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S793000, C707S793000, C707S793000

Reexamination Certificate

active

06775668

ABSTRACT:

BACKGROUND OF THE INVENTION
The present invention relates generally to computer software, and more particularly, to a system and method for implementing a quorum based access control mechanism for modifying a database component.
In today's computer network environment, it is common that significant amounts of data are customarily stored and used by various users of a database. Naturally, data management has become an essential task for many data intensive industries. A smooth business operation relies both on the efficiency and security of the database. With the advancement of computer technologies, the size and complexity of a typical database is increasing continuously.
Different users of the database normally have different levels of access rights. From the perspective of data management, a database administrator (DBA) is powerful in that he usually has a full access to the entire database and all data stored therein. He can freely read, write and modify any data stored in the database. In a normal situation, the DBA is endowed with the highest level of trust because of his important responsibilities. Other users may be given different access rights depending on their needs. Some have read access rights only, while others have write access rights. Under certain circumstances, it is desirable to store data in a database in a secure way such that even a privileged user like the DBA should not be able to modify records of the database without being detected or without obtaining consents from some other database managers such as an independent auditor. The role of an independent auditor is to trace any user's , including the DBA's , actions relating to the database, thereby enhancing the integrity and the security of the database.
From the inception of the concept of computer databases, the access control issue of a database focuses on access rights of a single user. The scope of access belonging to a particular user depends exclusively on the access rights granted to him by a superior authority, who may very likely be the DBA. For example, in a normal case, a user who has a write access right to a database attribute can modify that attribute freely. However, those who have only an access right to read the same attribute can not “touch” the attribute.
With the database security problem becoming an increasingly complex and sensitive issue for operation on a daily basis, there is a growing need to support quorum based modifications in a database. There are situations when not a single user can be trusted to take actions alone in the database, and such situations warrant the need of a quorum based access control mechanism. In these situations, a minimum of two authorized users must together initiate a change to the database, and the number of the users required can be changed by a superior user of the database depending on the need of a particular case.
For instance, a network audit configuration is stored in a Novell proprietary Network Directory Service (the “NDS”) in the form of Audit Policy objects. The access control to these objects is managed by the NDS. In a typical scenario, there are at least two high-level trusted users involved, e.g., a DBA (or a system administrator of the same capacity) and a “top level auditor.” Unfortunately, neither of them trusts, or should trust, the other. Hence, any one of them is denied access to modify the network audit configuration (e.g., the audit policies) single-handedly. The check-and-balance relationship between the DBA and the auditor helps to enhance the database security, but nevertheless hinders some of the database operations. There are situations when any of them needs an access to the audit policy objects. For instance, some changes in the organization's security policies may need to be modified. However, it is not desirable that any one of them should be able to modify the audit policy objects or even modify an Access Control List (which enables him to modify the objects) without the knowledge of the other. A clear consent of both the DBA and the auditor is required for the modification to occur.
What is needed is an efficient method for implementing a quorum based access control mechanism for modifying a database.
SUMMARY OF THE INVENTION
A method and system is provided for implementing a quorum based access control mechanism for modifying at least one value of a database component (“Database Attribute”). In a typical example, the database is managed by a network directory service. Upon a request of an initiator who has a special right, the network directory service establishes one or more quorum attributes for defining the quorum based access control mechanism.
Once the quorum attributes are established, the quorum attributes provide one or more authorized users who have rights to participate in a quorum for accepting or rejecting a modification request. According to one example, various quorum attributes clearly define the access control mechanism. For instance, a Modified Attribute Value is for temporarily storing a proposed value for modifying the Database Attribute. A List of Owners indicates a list of authorized users who have rights to consider the Modified Attribute Value. A Quorum Size attribute defines a minimum number of authorized users to form a quorum to accept the Modified Attribute Value. A time period is also provided by the quorum attribute to require the modification request to be considered within a predetermined time frame. A Mandatory Authorizers attribute provides a list of authorized users whose participation in the quorum are mandatory for modifying the Database Attribute with the Modified Attribute Value. The Mandatory Authorizers is a sub group of the List of Owners. Moreover, an Authorization Status Table records identities and actions taken by the authorized users in the List of Owners.
When a modifier initiates a modification request, he proposes a value to modify the Database Attribute. The modification request is granted and the Database Attribute is changed to the proposed value if a quorum, as defined by the quorum attributes, is reached and all of the Mandatory Authorizers have accepted the proposed value within the predetermined time frame.


REFERENCES:
patent: 5678041 (1997-10-01), Baker et al.
patent: 5787169 (1998-07-01), Eldridge et al.
patent: 5864871 (1999-01-01), Kitain et al.
patent: 5937066 (1999-08-01), Gennaro et al.
patent: 5940843 (1999-08-01), Zucknovich et al.
patent: 5978914 (1999-11-01), Carley et al.
patent: 5987506 (1999-11-01), Carter et al.
patent: 6085191 (2000-07-01), Fisher et al.
patent: 6178508 (2001-01-01), Kaufman
patent: 6236996 (2001-05-01), Bapat et al.
patent: 6286001 (2001-09-01), Walker et al.
patent: 6295536 (2001-09-01), Sanne
patent: 6314408 (2001-11-01), Salas et al.
patent: 6366915 (2002-04-01), Rubert et al.
patent: 6434607 (2002-08-01), Haverstock et al.
patent: 6477559 (2002-11-01), Veluvali et al.
patent: 2002/0023232 (2002-02-01), Serani et al.
patent: 2002/0095415 (2002-07-01), Walker et al.
Naor et al., “Access control and signatures via quorum secret sharing”, IEEE, 1998, pp. 909-922.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for enhancing quorum based access control... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for enhancing quorum based access control..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for enhancing quorum based access control... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3333121

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.