π Access Control & Inference Control in Database Security
A practical implementation project demonstrating how to secure database systems using Access Control mechanisms and Inference Control techniques. This repository includes SQL scripts, examples, and documentation to explain how different security models work and how to protect sensitive information from direct and indirect disclosure.
π Project Overview
This project explores two core components of database security:
- Access Control
Ensuring that users can only view or modify data they are authorized to access. Includes implementations of:
Role-Based Access Control (RBAC)
Discretionary Access Control (DAC)
Mandatory Access Control (MAC) (conceptual explanation)
SQL privilege management (GRANT, REVOKE)
- Inference Control
Protecting sensitive data from being inferred through aggregate queries or statistical techniques. Includes:
Aggregation attack examples
Tracker & differencing attacks
Query restriction rules
Secure view creation
Noise addition & anonymization concepts
π§ What This Repository Contains
βοΈ SQL scripts for creating users, roles, and privileges
βοΈ Access control examples (RBAC, DAC)
βοΈ Example of inference attacks and how to prevent them
βοΈ Secure view creation to block sensitive queries
βοΈ A complete practical assignment report
βοΈ Documentation explaining each security mechanism
π Repository Structure
. βββ access_control/
β βββ create_roles.sql
β βββ grant_permissions.sql
β βββ revoke_permissions.sql
β βββ dac_rbac_examples.sql
β βββ inference_control/
β βββ aggregation_attack.sql
β βββ differencing_attack.sql
β βββ secure_views.sql
β βββ query_restrictions.sql β
βββ docs/
β βββ Practical_Assignment_Report.pdf
β βββ Explanation.md
β
βββ README.md π οΈ Technologies Used
Sql Server / SSMS
SQL (Roles, Privileges, Views)
Database Security Concepts
π― Learning Outcomes
By using this project, students will understand how to:
Enforce fine-grained access control in databases
Prevent sensitive data leakage through inference attacks
Apply secure query design principles
Implement practical database security solutions
π License
This project is open-source and intended for academic and learning purposes.