CFP last date
22 April 2024
Reseach Article

Analysis of Fine-Grained Access Control in Database

Published on May 2012 by Vaibhav N. Dhage, R. R. Shelke
National Conference on Recent Trends in Computing
Foundation of Computer Science USA
NCRTC - Number 4
May 2012
Authors: Vaibhav N. Dhage, R. R. Shelke
5d254061-8972-4b9c-b65e-267c5dc7e0c6

Vaibhav N. Dhage, R. R. Shelke . Analysis of Fine-Grained Access Control in Database. National Conference on Recent Trends in Computing. NCRTC, 4 (May 2012), 19-21.

@article{
author = { Vaibhav N. Dhage, R. R. Shelke },
title = { Analysis of Fine-Grained Access Control in Database },
journal = { National Conference on Recent Trends in Computing },
issue_date = { May 2012 },
volume = { NCRTC },
number = { 4 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 19-21 },
numpages = 3,
url = { /proceedings/ncrtc/number4/6540-1030/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computing
%A Vaibhav N. Dhage
%A R. R. Shelke
%T Analysis of Fine-Grained Access Control in Database
%J National Conference on Recent Trends in Computing
%@ 0975-8887
%V NCRTC
%N 4
%P 19-21
%D 2012
%I International Journal of Computer Applications
Abstract

The access control decision is enforced by a mechanism of security policy. Fine Grained Access Control (FGAC) is one of the ways to ensure data security in database. Nowadays, we store a measurable portion of that data in the relational database management systems (RDBMS). Access control is one of the cornerstones of any Information Security Policy. The granularity of such access control can be on different levels, like on directories or folder level, database level, table level, and even on individual record (tuple) and data field level. In this paper we described the introduction of Access Control Mechanisms of fine-grained access control in databases which determines whether access to a resource is permitted. We also included the study of Oracle's Virtual Private Database. Different models exist for providing access control at Database level is our proposed work.

References
  1. Neha Sehta, Dr. Suresh Jain "A Fine Grained Access Control Model for Relational Databases" IJCSIT, Vol. 3 (1), 2012, 3183 – 3186
  2. Stonebraker, M. , Wong, E. , 1974. "Access Control in a relational Database Management System by Query Modification" Proc. ACM Annual Conf. , p. 180-186. [doi:10. 1145/800182. 810400]
  3. Surajit Chaudhuri, Tanmoy Dutta, and S. Sudarshan, "Fine Grained Authorization Through Predicated Grants"
  4. Qihua Wang¤ Ting Yu,et al, On the Correctness Criteria of FineGrained Access Control in Relational Databases
  5. E. Bertino, S. Jajodia, and P. Samarati, "A Flexible Authorization Mechanism for Relational Data Management Systems," in ACM Transactions on Information Systems, April, 1999
  6. Nirmal Dagdee, Ruchi Vijaywargiya: "Role based hybrid access control Methodology for shared Electronic Health Records".
  7. Ravi S. Sandhu, Edward J. Coynek, Hal L. Feinsteink and Charles E. Youmank: "Role-Based Access Control Models", IEEE Computer, Volume 29, Number 2, pages 38-47, 1996
  8. Sabrina De Capitanidi Vimercati, Pierangela Samarati: New Directions in Access control, www. spdp. dti. unimi. it/papers/nato. pdf, 2002
  9. Pierangela Samarati1 and Sabrina De Capitani di Vimercati, "Access Control: Policies, Models, and Mechanisms".
  10. Utkarsh Jain, Seminar Report "Fine-grained Access Control in Databases"
  11. The virtual private database in oracle9ir2: An oracle technical white paper. http://otn. oracle. com/deploy/security/oracle9ir2/pdf/vpd9ir2twp. pdf.
Index Terms

Computer Science
Information Sciences

Keywords

Access Control Policy Data Security Query Fine Grained Access Control Dbms And Vpd