Topic: Methods for Database Security

نویسندگان

  • Aparna Kolli
  • Lakshmi Ganesh
چکیده

Introduction: Database Security has become an important issue in today’s world. Organizations have become highly dependent on the database for their daily operations. The term security is the degree of protection against danger or loss, Security as a form of protection are structures and processes that provide or improve security as a condition i.e. a form of protection where a separation is created between the assets and the threat. Database security is the system, processes, and procedures that protect data in the database from unintended activity. An unintended activity can be defined as authenticated misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. The objective of database security is to prevent undesired information disclosure and modification of data while ensuring the availability of the necessary service. With the increase in the use of World Wide Web in recent years emphasize the web database security. One of the dominant problems with the database security is that though there have been many approaches to secure the data many conventional systems are bugged with holes that can be used by the malicious user to access the data. Thus good security schemes are very essential to protect the data in the databases. In order to prevent these unintended activities database security is attained through different methodologies. To build a secure database system, the architecture and functionality of traditional DBMS are to be extended. Secure transaction management, encryption schemes, cryptography, compression, Manipulation of data, Host Identity Protocol, Agent Based Simulation, Testing schemes for SQL injections are some of the methodologies to attain extension. Some functional programming languages are used as tools to implement security: C++, Java, and SQL. The database security is developed here with the construction of models. In this survey we are going to present different methods or frameworks explained in different papers for database security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Overview of Intrusion Detection Techniques in Database

Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...

متن کامل

A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing

Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...

متن کامل

Comparison of Bibliographic Databases in Retrieving Information on Telemedicine

Background & Aims: Some of the main questions which can be of importance for those researchers who intend to perform a systematic review in a field of science are: ‘What databases should I use for my review?’; ‘Do all these databases have the same value?’; and ‘Which sourcesretrieved the highest of relevant references?’. The main aim of this work was the identification of the best database for ...

متن کامل

Separating indexes from data: a distributed scheme for secure database outsourcing

Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...

متن کامل

An Authorization Framework for Database Systems

Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010