CFP last date
22 April 2024
Reseach Article

Database Security and Encryption: A Survey Study

by Iqra Basharat, Farooque Azam, Abdul Wahab Muzaffar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 47 - Number 12
Year of Publication: 2012
Authors: Iqra Basharat, Farooque Azam, Abdul Wahab Muzaffar
10.5120/7242-0218

Iqra Basharat, Farooque Azam, Abdul Wahab Muzaffar . Database Security and Encryption: A Survey Study. International Journal of Computer Applications. 47, 12 ( June 2012), 28-34. DOI=10.5120/7242-0218

@article{ 10.5120/7242-0218,
author = { Iqra Basharat, Farooque Azam, Abdul Wahab Muzaffar },
title = { Database Security and Encryption: A Survey Study },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 47 },
number = { 12 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 28-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume47/number12/7242-0218/ },
doi = { 10.5120/7242-0218 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:41:42.499658+05:30
%A Iqra Basharat
%A Farooque Azam
%A Abdul Wahab Muzaffar
%T Database Security and Encryption: A Survey Study
%J International Journal of Computer Applications
%@ 0975-8887
%V 47
%N 12
%P 28-34
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security in today's world is one of the important challenges that people are facing all over the world in every aspect of their lives. Similarly security in electronic world has a great significance. In this paper, we survey the security of database. This is an area of substantial interest in database because we know that, the use of database is becoming very important in today's enterprise and databases contains information that is major enterprise asset. This survey was conducted to identify the issues and threats in database security, requirements of database security, and how encryption is used at different levels to provide the security.

References
  1. Ahmad Baraani-Dastjerdi; Josef Pieprzyk; Baraani-dastjerdi Josef Pieprzyk ; ReihanedSafavi-Naini, Security In Databases: A Survey Study, 1996
  2. http://en. wikipedia. org/wiki/Database_security 27th Oct, 2010 1:00am
  3. Amichai Shulman; Top Ten Database Security Threats, How to Mitigate the Most Significant Database Vulnerabilities, 2006 White Paper.
  4. Tanya Bacca; Making Database Security an IT Security Priority A SANS Whitepaper – November 2009
  5. http://www. freetechexams. com/computers-tips/computer-tips/database-security. html
  6. Kadhem, H. ; Amagasa, T. ; Kitagawa, H. ; A Novel Framework for Database Security based on Mixed Cryptography; Internet and Web Applications and Services, 2009. ICIW '09. Fourth International Conference on; Publication Year: 2009, Page(s): 163 – 170
  7. Luc Bouganim; Yanli GUO; Database Encryption; Encyclopedia of Cryptography and Security, S. Jajodia and H. van Tilborg (Ed. ) 2009, page(s): ) 1-9
  8. Khaleel Ahmad; JayantShekhar; Nitesh Kumar; K. P. Yadav; Policy Levels Concerning Database Security; International Journal of Computer Science & Emerging Technologies (E-ISSN: 2044-6004) 368 Volume 2, Issue 3, June 2011, page(s); 368-372
  9. Gang Chen; Ke Chen; Jinxiang Dong; A Database Encryption Scheme for Enhanced Security and Easy Sharing; Computer Supported Cooperative Work in Design, 2006. CSCWD '06. 10th International Conference on ; Publishing year 2006, page(s): 1 - 6
  10. Dr. Anwar Pasha Abdul GafoorDeshmukh; Dr. Anwar Pasha Abdul GafoorDeshmukh; Transparent Data Encryption- Solution for Security of Database Contents; (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No. 3, March 2011
  11. TingjianGe, Stan Zdonik; Fast, Secure Encryption for Indexing in a Column-Oriented DBMS; 2007 IEEE 23rd International Conference on Data Engineering (2007) Publisher: IEEE, Page(s): 676-685.
  12. Lianzhong Liu and JingfenGai; A New Lightweight Database Encryption Scheme Transparent to Applications; Published in Industrial Informatics, 2008. INDIN 2008. 6th IEEE International Conference Issue Date: 13-16 July 2008 On page(s): 135 - 140
Index Terms

Computer Science
Information Sciences

Keywords

Database Security Encryption Access Control