Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Database Security and Encryption: A Survey Study

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 47 - Number 12
Year of Publication: 2012
Authors:
Iqra Basharat
Farooque Azam
Abdul Wahab Muzaffar
10.5120/7242-0218

Iqra Basharat, Farooque Azam and Abdul Wahab Muzaffar. Article: Database Security and Encryption: A Survey Study. International Journal of Computer Applications 47(12):28-34, June 2012. Full text available. BibTeX

@article{key:article,
	author = {Iqra Basharat and Farooque Azam and Abdul Wahab Muzaffar},
	title = {Article: Database Security and Encryption: A Survey Study},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {47},
	number = {12},
	pages = {28-34},
	month = {June},
	note = {Full text available}
}

Abstract

Security in today's world is one of the important challenges that people are facing all over the world in every aspect of their lives. Similarly security in electronic world has a great significance. In this paper, we survey the security of database. This is an area of substantial interest in database because we know that, the use of database is becoming very important in today's enterprise and databases contains information that is major enterprise asset. This survey was conducted to identify the issues and threats in database security, requirements of database security, and how encryption is used at different levels to provide the security.

References

  • Ahmad Baraani-Dastjerdi; Josef Pieprzyk; Baraani-dastjerdi Josef Pieprzyk ; ReihanedSafavi-Naini, Security In Databases: A Survey Study, 1996
  • http://en. wikipedia. org/wiki/Database_security 27th Oct, 2010 1:00am
  • Amichai Shulman; Top Ten Database Security Threats, How to Mitigate the Most Significant Database Vulnerabilities, 2006 White Paper.
  • Tanya Bacca; Making Database Security an IT Security Priority A SANS Whitepaper – November 2009
  • http://www. freetechexams. com/computers-tips/computer-tips/database-security. html
  • Kadhem, H. ; Amagasa, T. ; Kitagawa, H. ; A Novel Framework for Database Security based on Mixed Cryptography; Internet and Web Applications and Services, 2009. ICIW '09. Fourth International Conference on; Publication Year: 2009, Page(s): 163 – 170
  • Luc Bouganim; Yanli GUO; Database Encryption; Encyclopedia of Cryptography and Security, S. Jajodia and H. van Tilborg (Ed. ) 2009, page(s): ) 1-9
  • Khaleel Ahmad; JayantShekhar; Nitesh Kumar; K. P. Yadav; Policy Levels Concerning Database Security; International Journal of Computer Science & Emerging Technologies (E-ISSN: 2044-6004) 368 Volume 2, Issue 3, June 2011, page(s); 368-372
  • Gang Chen; Ke Chen; Jinxiang Dong; A Database Encryption Scheme for Enhanced Security and Easy Sharing; Computer Supported Cooperative Work in Design, 2006. CSCWD '06. 10th International Conference on ; Publishing year 2006, page(s): 1 - 6
  • Dr. Anwar Pasha Abdul GafoorDeshmukh; Dr. Anwar Pasha Abdul GafoorDeshmukh; Transparent Data Encryption- Solution for Security of Database Contents; (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No. 3, March 2011
  • TingjianGe, Stan Zdonik; Fast, Secure Encryption for Indexing in a Column-Oriented DBMS; 2007 IEEE 23rd International Conference on Data Engineering (2007) Publisher: IEEE, Page(s): 676-685.
  • Lianzhong Liu and JingfenGai; A New Lightweight Database Encryption Scheme Transparent to Applications; Published in Industrial Informatics, 2008. INDIN 2008. 6th IEEE International Conference Issue Date: 13-16 July 2008 On page(s): 135 - 140