![]() |
10.5120/15217-3722 |
Shagufta Rajguru and Deepak Sharma. Article: Countermeasures to Database Security: A Survey. International Journal of Computer Applications 87(7):1-5, February 2014. Full text available. BibTeX
@article{key:article, author = {Shagufta Rajguru and Deepak Sharma}, title = {Article: Countermeasures to Database Security: A Survey}, journal = {International Journal of Computer Applications}, year = {2014}, volume = {87}, number = {7}, pages = {1-5}, month = {February}, note = {Full text available} }
Abstract
A database is a collection of data of different types, while DBMS is a set of specifications that tells how data is to be stored in a database and how data should be accessed by the components of the database. The data and the metadata when exposed to the outside world may endanger the security of the DBMS. Therefore precautions should be taken that the data should be available to the right user at any point of time. In this study the architecture of the database is understood and tried to identify the vulnerabilities and threats related to them. Also it is noticed that if the architecture of the database is secured it would provide secure data management system. Different security methods implemented for different scenarios are discussed in this paper. With the help of these tools, a proposal for the security at the application level (View level) of the database architecture is suggested.
References
- Timothy J O'Leary, Linda I. Oleary Computing Essentials 2005,TMH
- Abraham Silberschatz, Henry F. Korth, S. Sudarshan, Database System Concepts, Fifith Edition.
- Singh, Sartaj. "Inherent Dangers in Database Security. " Computing Sciences (ICCS), 2012 International Conference on. IEEE, 2012.
- Baek, Jong-Il, and Dea-Woo Park. "A study on database vulnerable object analysis and control technology. " Information Science and Digital Content Technology (ICIDT), 2012 8th International Conference on. Vol. 3. IEEE, 2012.
- Popeea, Traian, Anca Constantinescu, and Razvan Rughinis. "Providing data anonymity for a secure database infrastructure. " Roedunet International Conference (RoEduNet), 2013 11th. IEEE, 2013.
- Huang, Qiang, and Lianzhong Liu. "A Logging Scheme for Database Audit. "Computer Science and Engineering, 2009. WCSE'09. Second International Workshop on. Vol. 2. IEEE, 2009.
- Neto, Afonso Araújo, and Marco Vieira. "A trust-based benchmark for DBMS configurations. " Dependable Computing, 2009. PRDC'09. 15th IEEE Pacific Rim International Symposium on. IEEE, 2009.
- Lin, Jin-Cherng, Jan-Min Chen, and Cheng-Hsiung Liu. "An Automatic Mechanism for Sanitizing Malicious Injection. " Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for. IEEE, 2008.
- Rathod, Yagnik A. , M. B. Chaudhari, and G. B. Jethava. "Database intrusion detection by transaction signature. " Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on. IEEE, 2012.
- Yan, Yi, Su Zhengyuan, and Dai Zucheng. "The database protection system against SQL attacks. " Computer Research and Development (ICCRD), 2011 3rd International Conference on. Vol. 3. IEEE, 2011.
- Rashid, Zahid, Abdul Basit, and Zahid Anwar. "TRDBAC: Temporal reflective database access control. " Emerging Technologies (ICET), 2010 6th International Conference on. IEEE, 2010.
- Yangqing, Zhu, et al. "Design of a new web database security model. "Electronic Commerce and Security, 2009. ISECS'09. Second International Symposium on. Vol. 1. IEEE, 2009.
- Popeea, Traian, et al. "Inference Detection and Database Security for a Business Environment. " Intelligent Networking and Collaborative Systems (INCoS), 2012 4th International Conference on. IEEE, 2012.
- Wang, Shuguang, and Shao Qian. "The Analysis of Database Remote Attack Defense. " Intelligence Information Processing and Trusted Computing (IPTC), 2010 International Symposium on. IEEE, 2010.