CFP last date
22 July 2024
Reseach Article

Countermeasures to Database Security: A Survey

by Shagufta Rajguru, Deepak Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 87 - Number 7
Year of Publication: 2014
Authors: Shagufta Rajguru, Deepak Sharma
10.5120/15217-3722

Shagufta Rajguru, Deepak Sharma . Countermeasures to Database Security: A Survey. International Journal of Computer Applications. 87, 7 ( February 2014), 1-5. DOI=10.5120/15217-3722

@article{ 10.5120/15217-3722,
author = { Shagufta Rajguru, Deepak Sharma },
title = { Countermeasures to Database Security: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 87 },
number = { 7 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume87/number7/15217-3722/ },
doi = { 10.5120/15217-3722 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:05:16.290782+05:30
%A Shagufta Rajguru
%A Deepak Sharma
%T Countermeasures to Database Security: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 87
%N 7
%P 1-5
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A database is a collection of data of different types, while DBMS is a set of specifications that tells how data is to be stored in a database and how data should be accessed by the components of the database. The data and the metadata when exposed to the outside world may endanger the security of the DBMS. Therefore precautions should be taken that the data should be available to the right user at any point of time. In this study the architecture of the database is understood and tried to identify the vulnerabilities and threats related to them. Also it is noticed that if the architecture of the database is secured it would provide secure data management system. Different security methods implemented for different scenarios are discussed in this paper. With the help of these tools, a proposal for the security at the application level (View level) of the database architecture is suggested.

References
  1. Timothy J O'Leary, Linda I. Oleary Computing Essentials 2005,TMH
  2. Abraham Silberschatz, Henry F. Korth, S. Sudarshan, Database System Concepts, Fifith Edition.
  3. Singh, Sartaj. "Inherent Dangers in Database Security. " Computing Sciences (ICCS), 2012 International Conference on. IEEE, 2012.
  4. Baek, Jong-Il, and Dea-Woo Park. "A study on database vulnerable object analysis and control technology. " Information Science and Digital Content Technology (ICIDT), 2012 8th International Conference on. Vol. 3. IEEE, 2012.
  5. Popeea, Traian, Anca Constantinescu, and Razvan Rughinis. "Providing data anonymity for a secure database infrastructure. " Roedunet International Conference (RoEduNet), 2013 11th. IEEE, 2013.
  6. Huang, Qiang, and Lianzhong Liu. "A Logging Scheme for Database Audit. "Computer Science and Engineering, 2009. WCSE'09. Second International Workshop on. Vol. 2. IEEE, 2009.
  7. Neto, Afonso Araújo, and Marco Vieira. "A trust-based benchmark for DBMS configurations. " Dependable Computing, 2009. PRDC'09. 15th IEEE Pacific Rim International Symposium on. IEEE, 2009.
  8. Lin, Jin-Cherng, Jan-Min Chen, and Cheng-Hsiung Liu. "An Automatic Mechanism for Sanitizing Malicious Injection. " Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for. IEEE, 2008.
  9. Rathod, Yagnik A. , M. B. Chaudhari, and G. B. Jethava. "Database intrusion detection by transaction signature. " Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on. IEEE, 2012.
  10. Yan, Yi, Su Zhengyuan, and Dai Zucheng. "The database protection system against SQL attacks. " Computer Research and Development (ICCRD), 2011 3rd International Conference on. Vol. 3. IEEE, 2011.
  11. Rashid, Zahid, Abdul Basit, and Zahid Anwar. "TRDBAC: Temporal reflective database access control. " Emerging Technologies (ICET), 2010 6th International Conference on. IEEE, 2010.
  12. Yangqing, Zhu, et al. "Design of a new web database security model. "Electronic Commerce and Security, 2009. ISECS'09. Second International Symposium on. Vol. 1. IEEE, 2009.
  13. Popeea, Traian, et al. "Inference Detection and Database Security for a Business Environment. " Intelligent Networking and Collaborative Systems (INCoS), 2012 4th International Conference on. IEEE, 2012.
  14. Wang, Shuguang, and Shao Qian. "The Analysis of Database Remote Attack Defense. " Intelligence Information Processing and Trusted Computing (IPTC), 2010 International Symposium on. IEEE, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Database DBMS architecture of DBMS vulnerabilities threats