CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Security Issues and Their Techniques in DBMS - A Novel Survey

by Mohd Muntjir, Sultan Aljahdali, Mohd Asadullah, Junedul Haq
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 85 - Number 13
Year of Publication: 2014
Authors: Mohd Muntjir, Sultan Aljahdali, Mohd Asadullah, Junedul Haq
10.5120/14905-3402

Mohd Muntjir, Sultan Aljahdali, Mohd Asadullah, Junedul Haq . Security Issues and Their Techniques in DBMS - A Novel Survey. International Journal of Computer Applications. 85, 13 ( January 2014), 39-43. DOI=10.5120/14905-3402

@article{ 10.5120/14905-3402,
author = { Mohd Muntjir, Sultan Aljahdali, Mohd Asadullah, Junedul Haq },
title = { Security Issues and Their Techniques in DBMS - A Novel Survey },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 85 },
number = { 13 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 39-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume85/number13/14905-3402/ },
doi = { 10.5120/14905-3402 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:02:24.310685+05:30
%A Mohd Muntjir
%A Sultan Aljahdali
%A Mohd Asadullah
%A Junedul Haq
%T Security Issues and Their Techniques in DBMS - A Novel Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 85
%N 13
%P 39-43
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays a Database security has become an important issue in technical world. The main objective of database security is to forbid unnecessary information exposure and modification data while ensuring the availability of the needed services. A numbers of security methods have been created for protecting the databases. Many security models have been developed based on different security aspects of database. All of these security methods are useful only when the database management system is designed and developing for protecting the database. Recently the growth of web application with database at its backend Secure Database Management System is more essential than only a Secure Database. Therefore this paper highlight on the Threats, Security Methods and Vulnerabilities in Database Management System with the help of survey performed on the field of secure databases.

References
  1. Elisa Bertino, Fellow, IEEE, and Ravi Sandhu, Fellow, IEEE, "Database Security—Concepts, Approaches and Challenges" in IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 2, NO. 1, JANUARY-MARCH 2005
  2. Andriy Furmanyuk , Mykola Karpinskyy, Bohdan Borowik, "Modern Approaches to the Database Protection" in IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 6-8 September 2007, Dortmund, Germany
  3. Marco Vieira, Henrique Madeira , "Detection of Malicious Transactions in DBMS", 11th Pacific Rim International Symposium on Dependable Computing
  4. Hassn A. Afyuoni, A Book, "Database security and auditing "
  5. Aziah Asmawi , "System Architecture for SQL Injection and Insider Misuse Detection System for DBMS", my -1-4244-2328 6/08/$25. 00 © 2008 IEEE
  6. Guoliang Zou, Jing Wang, Dongmei Huang, LiangJun Jiang, "Model Design of Role-Based Access Control and Methods of Data Security", 2010 International Conference on Web Information Systems and Mining.
  7. E. B. Fernandez,R. C. Summers and C. Wood, Database Security and Integrity. Addison-Wesley, Feb. 1981.
  8. Premchand B. Ambhore,B. B. Meshram,V. B. Waghmare, "A IMPLEMENTATION OF OBJECT ORIENTED DATABASE SECURITY" , Fifth International Conference on Software Engineering Research, Management and Applications.
  9. Yu Chen and Wesley W. Chu, "Protection of Database Security via Collaborative Inference Detection ", IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 20, NO. 8, AUGUST 2008
  10. http://www. esecurityplanet. com/hackers/how-to-prevent-sql-injection-attacks. html
Index Terms

Computer Science
Information Sciences

Keywords

Vulnerability threats security methods DBMS