Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Study of Students' Database Security Practices and Perceptions

Print
PDF
IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research
© 2019 by IJCA Journal
ICAIM 2017 - Number 1
Year of Publication: 2019
Authors:
Ajay Rai
Aishwarya Ram
Rafiya Siddiqui
Sonu Gupta

Ajay Rai, Aishwarya Ram, Rafiya Siddiqui and Sonu Gupta. Article: Study of Students Database Security Practices and Perceptions. IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research ICAIM 2017(1):20-22, February 2019. Full text available. BibTeX

@article{key:article,
	author = {Ajay Rai and Aishwarya Ram and Rafiya Siddiqui and Sonu Gupta},
	title = {Article: Study of Students Database Security Practices and Perceptions},
	journal = {IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research},
	year = {2019},
	volume = {ICAIM 2017},
	number = {1},
	pages = {20-22},
	month = {February},
	note = {Full text available}
}

Abstract

Data is the most main asset in today's world as it is used in day-to-day life from a single individual to large organizations. To access the historic or current data it is stored in database. Database involves storing vital and confidential information related to various organizations and is prone to security threats. The violation of database security can lead to the exposure of confidential data, loss of data integrity etc. the organization need to set up various security levels for the access of information according to the organization hierarchy. Database security is concerned with the protection of databases against its confidentiality, integrity and availability. Database access control deals with controlling i. e. who is allowed to access which data in the database. In this paper, the students'perspection of securing their database and the type of database which they use is explored.

References

  • Date C. J. 1981. An Introduction to Database Systems. Addison-Wesley Publishing. Reading, MA. 574 pages
  • KorthSilberschatz, Sudarshan, "Database System Concepts", McGraw Hill,2006
  • Shmueli, Erez, Vaisenberg, Ronen, Elovici, Yuval and Glezer, Chanan(2009)Database Encryption- An Overview of Contemporary Challenges and Design Considerations SIGMOD Record vol38, No 3.
  • H. M. Sneed, B. Demuth and B. Freitag, "A Process for Assessing Data Quality," 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops, Luxembourg, 2013, pp. 114-119.
  • Kadhem, H. ; Amagasa, T. ; Kitagawa, H. ; A Novel Framework for Database Security based on Mixed Cryptography; Internet and Web Applications and Services, 2009. ICIW '09. Fourth International Conference Publication Year: 2009, Page(s): 163 – 170
  • Luc Bouganim; Yanli GUO; Database Encryption; Encyclopedia of Cryptography and Security, S. Jajodia and H. van Tilborg (Ed. ) 2009, page(s): 1-9
  • Khaleel Ahmad; JayantShekhar; Nitesh Kumar; K. P. Yadav; Policy Levels Concerning Database Security; International Journal of Computer Science & Emerging Technologies (E-ISSN: 2044-6004) 368 Volume 2, Issue 3, June 2011, page(s); 368-372
  • IqraBasharat, FarooqueAzam and Abdul Wahab Muzaffar. Article: Database Security and Encryption: A Survey Study. International Journal of Computer Applications 47(12):28-34, June 2012.