CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Survey On Database Security

by Ramandeep Kaur, Kiranpreet, Prince Verma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 105 - Number 10
Year of Publication: 2014
Authors: Ramandeep Kaur, Kiranpreet, Prince Verma
10.5120/18415-9710

Ramandeep Kaur, Kiranpreet, Prince Verma . Survey On Database Security. International Journal of Computer Applications. 105, 10 ( November 2014), 27-31. DOI=10.5120/18415-9710

@article{ 10.5120/18415-9710,
author = { Ramandeep Kaur, Kiranpreet, Prince Verma },
title = { Survey On Database Security },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 105 },
number = { 10 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 27-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume105/number10/18415-9710/ },
doi = { 10.5120/18415-9710 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:37:23.265311+05:30
%A Ramandeep Kaur
%A Kiranpreet
%A Prince Verma
%T Survey On Database Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 105
%N 10
%P 27-31
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A database-management system (DBMS) is a collection of correlated data and a set of programs to access correlated data. The collection of data, usually referred to as the database, contains information able to an enterprise. And hence the concept of security lies with-in. As the database contains all information relevant to particular enterprise, so it's very important to be in safe side to prevent all threats related to data. Various Security Mechanisms have been developed to prevent ill-legal and un-authorized access of data (enterprise related, web or network related etc. ) by un-authorized users and hackers. Database security is a growing concern of the market these days as there has been found an un-expected growth in ill-legal access of data. This paper is the brief analysis of all the threats and attacks against database security and integrity. Database security is the mechanisms that secure the database from data tampering, deliberate threats, unauthorized users and hackers. Security refers to protecting data from unauthorized users and Integrity refers to protecting the data against authorized users. Both concepts must be taken into consideration for making a complete check on overall security of database.

References
  1. Anshuman Sharma, Anurag Gupta, Jagmohan Mago, "Fundamentals of DBMS", Fourth Ed. ,Lakhanpal Publishers, 2011
  2. Elisa Bertino, Ravi Sandhu, "Database Security-Concepts, Approaches, and Challenges," IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 1, pp. 2-19, Jan. -March 2005, doi:10. 1109/TDSC. 2005. 9
  3. Jiping Xiong, Lifeng Xuan, Jian Zhao and Tao Huang, "Web and Database Security", Unpublished
  4. Sabareesan M, Gobinathan N, "Network Database Security Issues and Defense", International Journal of Engineering Research and Applications(IJERA), Vol. 3, Issue 1, January -February 2013, pp. 1748-1752, ISSN: 2248-9622
  5. Shelly Rohilla, Pradeep Kumar Mittal, "Database Security: Threats and Challenges ", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013 ISSN: 2277 128X
  6. Silberschatz, Korth & Sudarshan, "Database System Concepts", Third Ed. , McGraw Hill International Editions, Computer Science Series-1997
  7. Ramez Elmasri and Shamkant B. Navathe, "Fundamentals of Database Systems", Third Ed. , Pearson Education
  8. An Introduction to Computer Security: The NIST Handbook", National Institute of Standards and Technology, U. S. Department of Commerce, Special Publication 800-12
Index Terms

Computer Science
Information Sciences

Keywords

Access Control Attacks Threats Discretionary Control Encryption and Decryption