Database Security System for Applying Sophisticated Access Control via Database Firewall Server

نویسندگان

  • Eun-Ae Cho
  • Chang-Joo Moon
  • Dae-Ha Park
  • Kangbin Yim
چکیده

Recently, information leakage incidents have occurred due to database security vulnerabilities. The administrators in the traditional database access control methods grant simple permissions to users for accessing database objects. Even ∗ corresponding author Database Security System 1193 though they tried to apply more strict permissions in recent database systems, it was difficult to properly adopt sophisticated access control policies to commercial databases due to performance degradations. This paper proposes a database security system including a database firewall server as an enhanced database access control system which can efficiently enforce sophisticated security policies to provide database with confidentiality using a data masking technique for diverse conditions such as the date, time, SQL string, and table columns to database systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Internet Commerce -- Design and Implementation of the Security Architecture of Security First Network Bank, FSB

Security First Network Bank (SFNB) (http://www.sfnb.com) went on-line in October 1995 as the world’s first on-line bank. The paper discusses how the security architecture was designed and implemented using the most currently available security technologies. The encryption technologies used to transport information across the Internet are widely known. Less widely known is how to protect the sys...

متن کامل

NT Security in an Open Academic Environment

Stanford Linear Accelerator Center (SLAC) was faced with the need to secure its PeopleSoftOracle business system in an academic environment that has no firewall. To provide protected access to the database servers for NT-based users all over the site while not hindering the lab’s open connectivity with the Internet, we implemented a pseudo three-tier architecture for PeopleSoft with Windows Ter...

متن کامل

Separating indexes from data: a distributed scheme for secure database outsourcing

Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...

متن کامل

An Authorization Framework for Database Systems

Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...

متن کامل

Chapter 2 Literature Survey 2.1 Introduction

Web application security is a major concern in today’s era for various organizations and banking sectors. Most of the organizations and banking sectors who use internet to provide web based services that protect their sensitive data using firewalls and few access control mechanisms. However, still the organizations data are revealed by internet hackers by some means of purposefully designed SQL...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computing and Informatics

دوره 32  شماره 

صفحات  -

تاریخ انتشار 2013