SPF-110911 - Aum Sai Ram Security for Stream Data Presented...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Aum Sai Ram Security for Stream Data Presented by: Sujan Pakala
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Presentation Overview Review DSMS Discuss Need for Security Examples Review Dimensions of Data Security Present SPF Access Control Model Conclusions of SPF Current work
Background image of page 2
Data Streams st anfordst re amdat a m anager 3 Continuous, unbounded, rapid, time- varying streams of data elements Occur in a variety of modern applications Network monitoring and traffic engineering Sensor networks, RFID tags Telecom call records Financial applications Web logs and click-streams Manufacturing processes DSMS = Data Stream Management System
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
DBMS versus DSMS Persistent relations One-time queries Random access Access plan determined by query processor and physical DB design Transient streams (and persistent relations) Continuous queries Sequential access Unpredictable data characteristics and arrival patterns st anfordst re amdat a m anager 4
Background image of page 4
DSMS Overview (simplified) st anfordst re amdat am anager 5 DSMS Scratch Store Input streams Register Query Streamed Result Stored Result Archive Stored Relations
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security for Stream Data WHY?
Background image of page 6
Security for Stream Data To avoid thorns and cobwebs in the dark. . Turn on some shielding-light.
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security for Stream Data Compelling Examples Example 1: Protection against context-aware Spam/Adverts Example 2: Personal Health Monitor Data Example 3: (Emanations) Soldier/Transport- vehicle location and health
Background image of page 8
(Traditional) Dimensions of Data Security Protection Authentication Authorization (and access control) Confidentiality, Integrity Availability Privacy Inference Security
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/13/2011 for the course CSCE 824 taught by Professor Staff during the Fall '11 term at South Carolina.

Page1 / 43

SPF-110911 - Aum Sai Ram Security for Stream Data Presented...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online