Journal articles on the topic 'Databases security'

To see the other types of publications on this topic, follow the link: Databases security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Databases security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar, and Supriya N. Deshpande. "Database Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.

Full text
Abstract:
Abstract: Database security is a crucial factor in safeguarding sensitive data in today's information-centric world. As organizations increasingly rely on databases for storing and managing vast volumes of data, ensuring the security of databases has become a top priority. This paper proposes a methodology for enhancing database security by addressing identified challenges and attacks. The methodology involves various steps, including identifying and assessing potential threats, evaluating existing security measures, implementing multi-layered defense, enforcing the principle of least privilege, regularly updating and patching DBMS, conducting regular security audits, providing user awareness training, implementing data encryption, monitoring and logging database activities, developing an incident response plan, staying updated with the latest research and best practices, and continuously improving security measures. By following this methodology, organizations can effectively enhance the security of their databases and safeguard critical data from potential attacks and breaches. Emphasis is placed on regular review and updates to security measures to proactively address evolving threats and ensure continuous protection of sensitive data.
APA, Harvard, Vancouver, ISO, and other styles
2

Ahmad, Khaleel, Mohammad Shoaib Alam, and Nur Izura Udzir. "Security of NoSQL Database Against Intruders." Recent Patents on Engineering 13, no. 1 (February 8, 2019): 5–12. http://dx.doi.org/10.2174/1872212112666180731114714.

Full text
Abstract:
Background: The evolution of distributed web-based applications and cloud computing has brought about the demand to store a large amount of big data in distributed databases. Such efficient systems offer excessive availability and scalability to users. The new type of database resolves many new challenges especially in large-scale and high concurrency applications which are not present in the relational database. NoSQL refers to non-relational databases that are different from the Relational Database Management System. Objective: NoSQL has many features over traditional databases such as high scalability, distributed computing, lower cost, schema flexibility, semi or un-semi structural data and no complex relationship. Method: NoSQL databases are “BASE” Systems. The BASE (Basically Available, Soft state, Eventual consistency), formulates the CAP theorem the properties of which are used by BASE System. The distributed computer system cannot guarantee all of the following three properties at the same time that is consistency, availability and partition tolerance. Results: As progressively sharp big data is saved in NoSQL databases, it is essential to preserve higher security measures to ensure safe and trusted communication across the network. In this patent, we describe the security of NoSQL database against intruders which is growing rapidly. Conclusion: This patent also defines probably the most prominent NoSQL databases and describes their security aspects and problems.
APA, Harvard, Vancouver, ISO, and other styles
3

Lysetskyi, Yu M., and D. Y. Kalbazov. "Information security of corporate databases." Mathematical machines and systems 3 (2023): 31–37. http://dx.doi.org/10.34121/1028-9763-2023-3-31-37.

Full text
Abstract:
Every day, companies all over the world collect and generate a large amount of data. Now in-formation is digital and is stored in automated digital databases, the use of which allows for processing large amounts of data that previously were difficult to process. Protecting corporate databases and the information within them is essential for economic security. It includes their physical protection, productivity assurance and monitoring, data protection from destruction or damage, access control, and recording of new databases appearing in the infrastructure. Howev-er, since users of different types and levels of access (internal users, system administrators, contractors, partners, and M2M communications) have access to databases, they can abuse their access rights in several ways. These may be an abuse of excessive, objectively necessary, or non-used rights. As a rule, an inefficiently controlled process of granting access rights creates excessive access rights which in turn may cause new information security risks. Security measures include implementing an access management process, granting minimally necessary access rights, and implementing a mechanism to control and block the given access rights. This article discusses such threats to databases as SQL Injections and NoSQL injection attacks, in-sufficient detailing of events in databases, backup leaks, vulnerabilities and configurations, DDoS attacks, and methods to counter these threats. The most effective way to protect data-bases is to implement specialized software and hardware complexes such as Imperva DBS and Imperva WAF developed for database protection. The use of Imperva DBS will help to solve all the key tasks of database protection and provide complete visibility and control over their usage in the enterprise infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
4

Haikal, Antoni, Heru Wijanarko, Ocha Oktafia, Muhammad Hikmah Husnuzon, Gunawan Gunawan, and Hamdani Arif. "Securing Databases: A Comparative Study on the Impact of Implementing SSL on MySQL 8.0.33." Jurnal Jartel Jurnal Jaringan Telekomunikasi 13, no. 2 (June 18, 2023): 135–41. http://dx.doi.org/10.33795/jartel.v13i2.735.

Full text
Abstract:
The increasing reliance on online communication and data storage has made protecting sensitive information a top priority for businesses and individuals. This study investigates the effectiveness of different security protocols in safeguarding databases from external threats. By comparing the performance of databases that use SSL and those that do not, this project provided valuable insights into the importance of securing data in transit and the impact of security protocols on database performance. The results of this research could be helpful for companies and individuals looking to improve the security of their databases and protect sensitive information. These research findings demonstrate that enabling SSL encryption leads to longer average execution times for database operations. This latency can be attributed to the computational workload associated with SSL's encryption and decryption processes. However, the trade-off between performance and security is essential to safeguarding data in transit.
APA, Harvard, Vancouver, ISO, and other styles
5

Kyrychenko, I. V., О. S. Nazarov, I. V. Gruzdo, and N. Kozel. "SECURITY IN DECENTRALIZED DATABASES." Bionics of Intelligence 1, no. 92 (June 2, 2019): 59–64. http://dx.doi.org/10.30837/bi.2019.1(92).10.

Full text
Abstract:
Blockchain is a distributed network that records digital transactions on a publicly accessible ledger. This paper explores whether blockchain technology is a suitable platform for the preservation of digital signatures and public/ private key pairs. Conventional infrastructures use digital certificates, issued by certification authorities, to declare the authentication of key pairs and digital signatures. This paper suggests that the blockchain’s hash functions offer a better strategy for signature preservation than digital certificates. Compared to digital certificates, hashing provides better privacy and security. It is a form of authentication that does not require trust in a third-party authority, and the distributed nature of the blockchain network removes the problem of a single point of failure.
APA, Harvard, Vancouver, ISO, and other styles
6

Neto, Afonso Araújo, and Marco Vieira. "Security Gaps in Databases." International Journal of Secure Software Engineering 2, no. 3 (July 2011): 42–62. http://dx.doi.org/10.4018/jsse.2011070103.

Full text
Abstract:
When deploying database-centric web applications, administrators should pay special attention to database security requirements. Acknowledging this, Database Management Systems (DBMS) implement several security mechanisms that help Database Administrators (DBAs) making their installations secure. However, different software products offer different sets of mechanisms, making the task of selecting the adequate package for a given installation quite hard. This paper proposes a methodology for detecting database security gaps. This methodology is based on a comprehensive list of security mechanisms (derived from widely accepted security best practices), which was used to perform a gap analysis of the security features of seven software packages composed by widely used products, including four DBMS engines and two Operating Systems (OS). The goal is to understand how much each software package helps developers and administrators to actually accomplish the security tasks that are expected from them. Results show that while there is a common set of security mechanisms that is implemented by most packages, there is another set of security tasks that have no support at all in any of the packages.
APA, Harvard, Vancouver, ISO, and other styles
7

Pernul, G., and A. M. Tjoa. "Security Policies for Databases." IFAC Proceedings Volumes 25, no. 30 (October 1992): 259–65. http://dx.doi.org/10.1016/s1474-6670(17)49440-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thuraisingham, Bhavani. "Security for Distributed Databases." Information Security Technical Report 6, no. 2 (June 2001): 95–102. http://dx.doi.org/10.1016/s1363-4127(01)00210-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Teimoor, Ramyar Abdulrahman. "A Review of Database Security Concepts, Risks, and Problems." UHD Journal of Science and Technology 5, no. 2 (October 10, 2021): 38–46. http://dx.doi.org/10.21928/uhdjst.v5n2y2021.pp38-46.

Full text
Abstract:
Currently, data production is as quick as possible; however, databases are collections of well-organized data that can be accessed, maintained, and updated quickly. Database systems are critical to your company because they convey data about sales transactions, product inventories, customer profiles, and marketing activities. To accomplish data manipulation and maintenance activities the Database Management System considered. Databases differ because their conclusions based on countless rules about what an invulnerable database constitutes. As a result, database protection seekers encounter difficulties in terms of a fantastic figure selection to maintain their database security. The main goal of this study is to identify the risk and how we can secure databases, encrypt sensitive data, modify system databases, and update database systems, as well as to evaluate some of the methods to handle these problems in security databases. However, because information plays such an important role in any organization, understanding the security risk and preventing it from occurring in any database system require a high level of knowledge. As a result, through this paper, all necessary information for any organization has been explained; in addition, also a new technological tool that plays an essential role in database security was discussed.
APA, Harvard, Vancouver, ISO, and other styles
10

Arputharaj J, Vijay, and Dr R. Manicka Chezian. "A Collective Algorithmic ApproachFor Enhanced DNA Database Security." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 4, no. 1 (June 30, 2013): 174–78. http://dx.doi.org/10.24297/ijmit.v4i1.4631.

Full text
Abstract:
The proposed method is a mixture of several security methods namely digital authentication tag along with the data mining in the DNA database. Data mining in the area of human genetics, an important goal is to understand the mapping relationship between the individual variation in human DNA sequences and variability in various algorithms for database security issues, for mutation susceptibility and parental identification differences. This paper primarily deals with the advancement of genetic algorithm with proper security features in DNA Databases and it enhances the special features in DNA database security. Several security methods include encryption algorithms, higher, not as much of multifaceted with trouble-free to apply in DNA Databases, used for protected database. The Reverse Encryption algorithm to protect data,Advance Cryptography algorithm to resist data, also Advanced Encryption Standard (AES) is most preferable for security in DNA databases.
APA, Harvard, Vancouver, ISO, and other styles
11

Vishwakarma, Jaychand, and Abhishek Shukla. "Survey on Security Issues and Their Techniques in DBMS." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 1 (January 30, 2018): 124. http://dx.doi.org/10.23956/ijarcsse.v8i1.544.

Full text
Abstract:
Nowadays a Database security has become an important issue in technical world. The main objective of database security is to forbid unnecessary information exposure and modification data while ensuring the availability of the needed services. A numbers of security methods have been created for protecting the databases. Many security models have been developed based on different security aspects of database. All of these security methods are useful only when the database management system is designed and developing for protecting the database. Recently the growth of web application with database at its backend Secure Database Management System is more essential than only a Secure Database. Therefore this paper highlight on the Threats, Security Methods and Vulnerabilities in Database Management System with the help of survey performed on the field of secure databases.
APA, Harvard, Vancouver, ISO, and other styles
12

Mamta Rani. "Database security at cache layer." International Journal of Science and Research Archive 9, no. 2 (July 30, 2023): 016–19. http://dx.doi.org/10.30574/ijsra.2023.9.2.0506.

Full text
Abstract:
As database security is the main concern, we are going to place an encryption module at the cache layer. All the encryption and decryption will be done at the cache layer before storing that data to the database, which will provide more security to the database Higher level security should be provided to the database so here we are placing an idea of Elliptical Curve Cryptography. A database is a collection of data that helps us to collect, retrieve, organize and manage the data in an efficient and effective manner. Databases are critical assets. They store client details, financial information, personal files, company secrets and other data necessary for business. Today database security is getting greater importance than the past which is the amount of data is stored in a corporate database is increasing. People are depending more on the corporate data for making a decision, management of customer service and supply chain management etc. Data stored in databases is usually very vulnerable data so it becomes very important and crucial to maintain this data securely. There are many front end applications that fetch data from secondary storage to main memory for processing and from main memory, data is stored in cache for temporary processing. Any loss or unavailability of data may seriously affect its performance. The database security should provide protected access to the contents of a database and should preserve the integrity, availability, consistency, and quality of the data. In this paper, I present a model where data is protected even on cache layer.
APA, Harvard, Vancouver, ISO, and other styles
13

Gudriks, Rinalds, and Sergejs Kodors. "POSTGRESQL DATABASES SECURITY CONFIGURATION CHECKLIST." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 23 (April 24, 2019): 38. http://dx.doi.org/10.17770/het2019.23.4386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Yerkey, A. Neil. "Security of Microsoft Access Databases." Library & Archival Security 17, no. 2 (March 2001): 29–43. http://dx.doi.org/10.1300/j114v17n02_04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Henley, Stephen. "Project databases: standards and security." Geological Society, London, Special Publications 97, no. 1 (1995): 97–101. http://dx.doi.org/10.1144/gsl.sp.1995.097.01.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Lipton, J. D. "Security Interests in Electronic Databases." International Journal of Law and Information Technology 9, no. 1 (March 1, 2001): 65–86. http://dx.doi.org/10.1093/ijlit/9.1.65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ahlswede, R., and H. Aydinian. "On Security of Statistical Databases." SIAM Journal on Discrete Mathematics 25, no. 4 (January 2011): 1778–91. http://dx.doi.org/10.1137/070689589.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Laferriere, Claude, G. Owen Higginson, and Gordon G. Bell. "Security architectures for textual databases." Computers & Security 9, no. 7 (November 1990): 621–30. http://dx.doi.org/10.1016/0167-4048(90)90061-w.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Hashim, Hassan Bediar. "Challenges and Security Vulnerabilities to Impact on Database Systems." Al-Mustansiriyah Journal of Science 29, no. 2 (November 17, 2018): 117. http://dx.doi.org/10.23851/mjs.v29i2.332.

Full text
Abstract:
Abstract A lot of institutions depends at present on the systems database operations and their daily activities, thus providing a means for the maintenance of permanent data can refer to it at any time, as well as to search and to modify the data easily. in this paper to determine the security challenges in the databases, and requirements necessary to address those challenges in the data value to provide security base, and to determine the security rules and know the weaknesses that can be exploited any information in a manner not allowed, when he must protect the database to make sure of the following purposes: confidentiality, integrity and continuity. One of the solutions used in this research to protect databases, and encryption of sensitive data, and adjust the system databases, and updates the database systems and we review some of the ways to address these challenges in the security databases.
APA, Harvard, Vancouver, ISO, and other styles
20

ITAI, YAYA, AWODELE OLUDELE PhD, and NICOLAE GOGA PhD. "Trigger and Database Security." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 1 (February 1, 2013): 57–62. http://dx.doi.org/10.24297/ijct.v4i1b.3060.

Full text
Abstract:
Database Security is a growing concern evidenced by an increase in the number of reported incidencesof loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. Security models, developed for databases differ in many aspects because they focus on different features of the database security problem or because they make different assumptions about what constitutes a secure database. This paper explains the need for a database trigger and it role in enforcing the various database security challenges.
APA, Harvard, Vancouver, ISO, and other styles
21

P.J, Sankaranarayanan, and Geogen George. "Blockchain Based Aadhaar Security." International Journal of Engineering & Technology 7, no. 4.6 (September 25, 2018): 398. http://dx.doi.org/10.14419/ijet.v7i4.6.28450.

Full text
Abstract:
A blockchain is a decentralized, disseminated and digital ledger that can’t be altered retroactively without modifying every single blocks and the consensus of the network. Blockchain can be used in smart contracts, Banks, IoT devices, Database management, etc., Due to recent times flaws and leakage of Aadhaar information (Aadhaar which is the largest government databases of the Indian citizens) in Internet the security and privacy of Aadhaar became questionable. In order to ensure the security of Aadhaar, Blockchain has the potential to overcome security and privacy challenges in Aadhaar. In this project we are going to create a Blockchain for Aadhaar database and implement light weight algorithm for efficiency, optimization and scalability along with the Blockchain securing algorithm.
APA, Harvard, Vancouver, ISO, and other styles
22

S R V Satish, Karuturi. "Database Security Issues and Challenges in Cloud Computing." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11 (April 5, 2024): 937–43. http://dx.doi.org/10.17762/ijritcc.v11i11.10396.

Full text
Abstract:
The majority of enterprises have recently enthusiastically embraced cloud computing, and at the same time, the database has moved to the cloud. This cloud database paradigm can lower data administration expenses and free up new business to concentrate on the product that is being delivered. Furthermore, issues with scalability, flexibility, performance, availability, and affordability can be resolved with cloud computing. Security, however, has been noted as posing a serious risk to cloud databases and has been essential in fostering public acceptance of cloud computing. Several security factors should be taken into account before implementing any cloud database management system. These features comprise, but are not restricted to, data privacy, data isolation, data availability, data integrity, confidentiality, and defense against insider threats. In this paper, we discuss the most recent research that took into account the security risks and problems associated with adopting cloud databases. In order to better comprehend these problems and how they affect cloud databases, we also provide a conceptual model. Additionally, we look into these problems to the extent that they are relevant and provide two instances of vendors and security features that were used for cloud-based databases. Finally, we provide an overview of the security risks associated with open cloud databases and suggest possible future paths.
APA, Harvard, Vancouver, ISO, and other styles
23

Mocean, Loredana, and Miranda-Petronella Vlad. "Database Security in RDF Terms." Scientific Bulletin 28, no. 1 (June 1, 2023): 55–65. http://dx.doi.org/10.2478/bsaft-2023-0006.

Full text
Abstract:
Abstract Databases are perhaps the most attacked and vulnerable elements in the online environment as far as organizations are concerned. The databases contain the most important information of an organization and its confidential data, along with those of its customers. However, little of the effort dedicated to security is intended to protect data. The present paper draws attention to the need to implement a simple and then complex security in a database using RDF (Resource Description Framework) based descriptions. Our example is one implemented for Microsoft Access and covers different security level descriptions considering attack types. We choose to represent the basic concepts and abstract syntax using the RDF data modeling vocabulary and we’re using as a starting point a legacy relational database where the company already catalogued attacks.
APA, Harvard, Vancouver, ISO, and other styles
24

NICA, ELVIRA, BOGDAN GEORGE TUDORICA, DOREL-MIHAIL DUSMANESCU, GHEORGHE POPESCU, and ALINA MARIA BREAZ. "Databases Security Issues - A Short Analysis on the Emergent Security Problems Generated By NoSQL Databases." ECONOMIC COMPUTATION AND ECONOMIC CYBERNETICS STUDIES AND RESEARCH 53, no. 3/2019 (September 21, 2019): 113–29. http://dx.doi.org/10.24818/18423264/53.3.19.07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Chen, Ailin, Shaoyuan Yu, Xinyi Yang, Ding Huang, and Yongjun Ren. "IoT data security in outsourced databases: A survey of verifiable database." Heliyon 10, no. 7 (April 2024): e28117. http://dx.doi.org/10.1016/j.heliyon.2024.e28117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Stenin, Dmitriy, Natalya Stenina, Arman Akanov, and Kakim Sagindikov. "Digitalization and Innovative Development of Mining Processes." E3S Web of Conferences 105 (2019): 03012. http://dx.doi.org/10.1051/e3sconf/201910503012.

Full text
Abstract:
This article discusses the issues of digitalization and using of information technologies, and in particular databases at all stages of the technological process of mining. In addition, the paper proposes options for protection against some of the possible attacks and information protection using countermeasures and control methods that exist at the present time. Database security is an important approach for planning and decision-making clear the security requirements of the database. Database security, especially for an industry such as mining, is a very important issue for companies. With increasing complexity of the databases, we may encounter with more complex problems related to information security.
APA, Harvard, Vancouver, ISO, and other styles
27

Ashwaq A. Alotaibi, Reem M. Alotaibi and Nermin Hamza, Ashwaq A. Alotaibi, Reem M. Alotaibi and Nermin Hamza. "Access Control Models in NoSQL Databases: An Overview." journal of king abdulaziz university computing and information technology sciences 8, no. 1 (March 10, 2019): 1–9. http://dx.doi.org/10.4197/comp.8-1.1.

Full text
Abstract:
Recently non-relational databases known as NoSQL have become most popular for handling a huge amount of data. Many organizations move from relational databases towards NoSQL databases due to the growing popularity of cloud computing and big data. NoSQL database is designed to handle unstructured data like documents, e-mails, and social media efficiently. It uses distributed and cooperating devices to store and retrieve data. As a large number of people storing sensitive data in NoSQL databases, security issues become critical concerns. NoSQL has many advantages like scalability and availability, but it suffers from some security issues like weak authorization mechanisms. This paper reviews the different models of NoSQL databases and the security issues concerning these databases. In addition, we present the existing access control models in different NoSQL databases.
APA, Harvard, Vancouver, ISO, and other styles
28

Alshammari, Bandar M. "Security Assessment Model for Database Relational Designs." Journal of Medical Imaging and Health Informatics 9, no. 6 (August 1, 2019): 1171–80. http://dx.doi.org/10.1166/jmihi.2019.2715.

Full text
Abstract:
The increasing number of data breaches has led many organizations to focus on securing their IT infrastructures and application architectures. However, the main causes of many of the latest attacks are not associated with these two architectures. The damage caused by most of the recent attacks could have been minimized if more attention was given to enhancing the security of all components of the database architecture. The existing enterprise database architecture frameworks do not consider this issue a priority; hence, it has received minimal attention. The enterprise database architecture is the most important architecture because it is responsible for defining how all types of data, whether security-critical or not, are stored and accessed. This paper focuses on addressing the lack of a complete solution to help enterprise system architects to address the security of their organizations from early stages. The novelty of this approach is that it specifies how to modify the required artifacts by the enterprise database architecture to address security-critical data. The approach also defines a number of security measurements that help enterprise architects in measuring the security of the organization database based on those artifacts. These metrics are developed based on the results of a cybersecurity experiment conducted on 100 randomly selected open-source websites. The paper's contributions also consist of the definition of a number of security refactoring rules that specify how to modify current enterprise databases to make them more secure. This paper uses an existing relational diagram for a health clinic database to illustrate the application of the model to an existing database. The validity and applicability of these metrics and refactoring rules are proved using an experiment conducted on a number of security-related databases.
APA, Harvard, Vancouver, ISO, and other styles
29

Agarwal, Archita, Maurice Herlihy, Seny Kamara, and Tarik Moataz. "Encrypted Databases for Differential Privacy." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 170–90. http://dx.doi.org/10.2478/popets-2019-0042.

Full text
Abstract:
Abstract The problem of privatizing statistical databases is a well-studied topic that has culminated with the notion of differential privacy. The complementary problem of securing these differentially private databases, however, has—as far as we know—not been considered in the past. While the security of private databases is in theory orthogonal to the problem of private statistical analysis (e.g., in the central model of differential privacy the curator is trusted) the recent real-world deployments of differentially-private systems suggest that it will become a problem of increasing importance. In this work, we consider the problem of designing encrypted databases (EDB) that support differentially-private statistical queries. More precisely, these EDBs should support a set of encrypted operations with which a curator can securely query and manage its data, and a set of private operations with which an analyst can privately analyze the data. Using such an EDB, a curator can securely outsource its database to an untrusted server (e.g., on-premise or in the cloud) while still allowing an analyst to privately query it. We show how to design an EDB that supports private histogram queries. As a building block, we introduce a differentially-private encrypted counter based on the binary mechanism of Chan et al. (ICALP, 2010). We then carefully combine multiple instances of this counter with a standard encrypted database scheme to support differentially-private histogram queries.
APA, Harvard, Vancouver, ISO, and other styles
30

Yesin, Vitalii, Mikolaj Karpinski, Maryna Yesina, Vladyslav Vilihura, and Stanislaw A. Rajba. "Technique for Evaluating the Security of Relational Databases Based on the Enhanced Clements–Hoffman Model." Applied Sciences 11, no. 23 (November 25, 2021): 11175. http://dx.doi.org/10.3390/app112311175.

Full text
Abstract:
Obtaining convincing evidence of database security, as the basic corporate resource, is extremely important. However, in order to verify the conclusions about the degree of security, it must be measured. To solve this challenge, the authors of the paper enhanced the Clements–Hoffman model, determined the integral security metric and, on this basis, developed a technique for evaluating the security of relational databases. The essence of improving the Clements–Hoffmann model is to expand it by including a set of object vulnerabilities. Vulnerability is considered as a separate objectively existing category. This makes it possible to evaluate both the likelihood of an unwanted incident and the database security as a whole more adequately. The technique for evaluating the main components of the security barriers and the database security as a whole, proposed by the authors, is based on the theory of fuzzy sets and risk. As an integral metric of database security, the reciprocal of the total residual risk is used, the constituent components of which are presented in the form of certain linguistic variables. In accordance with the developed technique, the authors presented the results of a quantitative evaluation of the effectiveness of the protection of databases built on the basis of the schema with the universal basis of relations and designed in accordance with the traditional technology of relational databases.
APA, Harvard, Vancouver, ISO, and other styles
31

Alshammari, Ahmad. "Structuring and organizing database security domain from big data perspective using meta-modeling approach." International Journal of ADVANCED AND APPLIED SCIENCES 11, no. 2 (February 2024): 180–94. http://dx.doi.org/10.21833/ijaas.2024.02.019.

Full text
Abstract:
Database security is an area focused on safeguarding databases against harmful access. It involves ensuring data accuracy, blocking unauthorized entry, and preventing harmful code within the database. Although various security models and methods exist, they often don't comprehensively cover all aspects of database security. This leads to a diverse and unclear understanding of database security among experts. This study proposes a unified framework, the Database Security Meta-model (DBSM), which acts as a standard language in this field. The DBSM, comprising twelve main elements, is thoroughly vetted to align with security needs and offers guidelines for practitioners to create specific security solutions.
APA, Harvard, Vancouver, ISO, and other styles
32

Vilihura, Vladislav, Yuriy Gorbenko, Vitaliy Yesin, and Serhiy Rassomakhin. "Using formal security models in secure databases." Physico-mathematical modelling and informational technologies, no. 32 (July 7, 2021): 70–74. http://dx.doi.org/10.15407/fmmit2021.32.070.

Full text
Abstract:
The paper contains key provisions (requirements) that should be followed when building secure databases using the capabilities of the main formal access control models, such as discretionary access control models, mandatory access control models, role-based access control models. At the same time, it is noted that any security model does not provide protection but only provides the principle of building a secure database, the implementation of which should ensure the security properties inherent in the model. The security of the database is equally determined by: the properties of the model itself (one or more), its (their) adequacy to the threats affecting the system, and how it (they) is correctly implemented(s). The decisive factor in making a decision is always an assessment of a specific situation, which will allow you to make the right choice, including the complex use of formal models.
APA, Harvard, Vancouver, ISO, and other styles
33

Dempsey, B. J., and J. Herrin. "WEB-Enabled Medical Databases: a Threat to Security?" Methods of Information in Medicine 39, no. 04/05 (2000): 298–302. http://dx.doi.org/10.1055/s-0038-1634448.

Full text
Abstract:
Abstract:An increasing number of clinical databases are being adapted to allow access through Internet protocols, particularly Hypertext Transfer Protocol (HTTP). The World Wide Web (WWW) provides a user-friendly, standardized, broadly distributed database interface; at the same time, it may also present a threat to the security and confidentiality of patient data. However, there is little empirical evidence concerning such threats. Using publicly available records we estimate the additional risk of security violations due to web-enabling a database. The evidence, though limited, suggests that the additional risk may be small relative to more traditional security threats.
APA, Harvard, Vancouver, ISO, and other styles
34

Jamali, Mujeeb-ur-Rehman, Najma Imtiaz Ali, Imtiaz Ali Brohi, Muhammad Umar Murad, Yasir Nawaz, and Uswa Urooj. "An Empirical Evaluation of Data Integrity Algorithm Performance in Non-Relational Document Databases." VAWKUM Transactions on Computer Sciences 11, no. 2 (December 8, 2023): 70–82. http://dx.doi.org/10.21015/vtcs.v11i2.1663.

Full text
Abstract:
Non-relational document databases are a type of NoSQL databases, are gaining popularity owing to their flexibility, scalability, and performance. Document databases provide some distinct security issues. One of the most difficult security challenges is that they are frequently built to be extremely accessible. This can make them more vulnerable to assault if suitable security measures are not taken. Users of database can access data with weak authentication or authorization. Another issue is that they store data in a semi-structured or unstructured format. This makes it difficult to create and execute security safeguards. It may be difficult to detect and secure sensitive data that is kept. Document databases are certain data integrity problems. In this research work, we have developed Big Document DBCrypto’s architecture under which Middle ware provides users to use symmetric cryptography with any hashing algorithm or asymmetric cryptography with digital signatures to ensure data integrity.
APA, Harvard, Vancouver, ISO, and other styles
35

Kunda, Douglas, and Hazael Phiri. "A Comparative Study of NoSQL and Relational Database." Zambia ICT Journal 1, no. 1 (December 11, 2017): 1–4. http://dx.doi.org/10.33260/zictjournal.v1i1.8.

Full text
Abstract:
Relational Database and NoSQL are competing types of database models. The former has been in existence since 1979 and the latter since the year 2000. The demands of modern applications especially in web 2.0, 3.0 and big data have made NoSQL a popular database of choice. Choosing an appropriate database model to use is an important decision that developers must make based on the features of a given database model. This paper compares the features of Relational Databases and NoSQL to establish which database is better at supporting demands of modern applications. The paper also brings out the challenges of NoSQL. Finally, the paper concludes by determining whether Relational Databases would completely be replaced by NoSQL database models. The findings revealed that, Relational Databases are based on ACID model which emphasizes better consistency, security and offers a standard query language. However, Relational Databases have poor scalability, weak performance, cost more, face availability challenges when supporting large number of users and handle limited volume of data. NoSQL, on the other hand is based on the BASE model, which emphasizes greater scalability and provides a flexible schema, offers better performance, mostly open source, cheap but, lacks a standard query language and does not provide adequate security mechanisms. Both databases will continue to exist alongside each other with none being better than the other. The choice of the database to use will depend on the nature of the application being developed. Each database type has its own challenges and strengths, with relational database lacking of support for unstructured data while NoSQL lacks standardization and has poor security. Modern applications in web 2.0, 3.0 and big data are well suited to use NoSQL but, there are still many applications that rely on Relational Databases.
APA, Harvard, Vancouver, ISO, and other styles
36

Larchenko, Maryna. "MODERN PROBLEMS OF CRYPTOGRAPHIC PROTECTION OF DATABASES." Technical Sciences and Technologies, no. 3(29) (2022): 102–13. http://dx.doi.org/10.25140/2411-5363-2022-3(29)-102-113.

Full text
Abstract:
In the conditions of growing digitalization of society, the issue of database protection is extremely urgent. Currently, Ukraine is at the stage of introducing European information protection standards, but the software component of its protection also needs further improvement. Information security threats are destruction,modification, blocking, unauthorized access, leakage, disclosure. In particular, cryptographic protection of databases allows preventing access to the information they con-tain by means of mathematical transformations. It is primarily about prevention of unauthorized modification and unauthorized disclosure of information.Cryptographic protection of databases can use encryption of data that is stored in a file (after encryption), as well as en-cryption of directories and files themselves. The approach to database protection should be comprehensive. Therefore, encryption cannot be used to solve access control problems. Encryption keys should be changed regularly as part of good security practices. The database should be unavailable during this time. A copy ofthe database must be stored offline at a remote location for some time. The administrator role can be split between two or more people so that each person does not have full access to the entire database, or the role can be limited to just administering the database without access to the information itself.Protecting the database is becoming an increasingly difficult task for an organization, because sensitive data is often the target of attackers. One of the mandatory requirements for database security is its cryptographic transformation, which is carried out both during the movement of information over networks and during storage in database systems. This can prevent attacks from both external and internal attackers. Although, database encryption cannot overcome all security threats, the application of a well-configured program that uses a reliable algorithm can significantly increase the integrity, confidentiality and availability of database information.Further improvement and development of the national system of cryptographic protection of databases will require a coordinated resolution of issues at the legislative (normative-legal), system-wide, procedural-functional, functional-technical, and software-technical levels.
APA, Harvard, Vancouver, ISO, and other styles
37

Li, Guoliang, Haowen Dong, and Chao Zhang. "Cloud databases." Proceedings of the VLDB Endowment 15, no. 12 (August 2022): 3758–61. http://dx.doi.org/10.14778/3554821.3554893.

Full text
Abstract:
As database vendors are increasingly moving towards the cloud data service, i.e., databases as a service (DBaaS), cloud databases have become prevalent. Compared with the early cloud-hosted databases, the new generation of cloud databases, also known as cloud-native databases, seek for higher elasticity and lower cost by developing new techniques, e.g., compute-storage disaggregation and the log is the database. To better harness the power of these cloud databases, it is important to study and compare the pros and cons of their key techniques. In this tutorial, we offer a comprehensive survey of cloud-native databases. Based on various system architectures, we introduce a taxonomy for the state-of-the-art cloud-native OLTP databases and OLAP databases, respectively. We then take a deep dive into their key techniques regarding storage management, transaction processing, analytical processing, data replication, serverless computing, database recovery, and security. Finally, we discuss the research challenges and opportunities.
APA, Harvard, Vancouver, ISO, and other styles
38

Ślęzak, Łukasz, and Jarosław Butanowicz. "Security of Statistical Databases as an element of Enterprise Security Architecture." Computer Science and Mathematical Modelling 13, no. 13 (December 30, 2014): 37–44. http://dx.doi.org/10.5604/15084183.1136516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Gele, Aori. "Study on the Security of the Databases in Cloud Computing Environment." Applied Mechanics and Materials 443 (October 2013): 473–76. http://dx.doi.org/10.4028/www.scientific.net/amm.443.473.

Full text
Abstract:
In the modern information technologies, cloud computing is the most popular. However, the security problems in the application of the cloud databases should be never ignored. In this paper, the characteristics of cloud computing database are first introduced, and then the potential security problems as well as solutions in the application of cloud database are analyzed.
APA, Harvard, Vancouver, ISO, and other styles
40

Poltavtsev, A. A., A. R. Khabarov, and A. O. Selyankin. "Inference Attacks and Information Security in Databases." Automatic Control and Computer Sciences 54, no. 8 (December 2020): 829–33. http://dx.doi.org/10.3103/s0146411620080271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

M., Monisha, Narmathadevi V., and D. Kerana Hanirex. "Enhancing Security and Consistency for Cloud Databases." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 3 (March 31, 2015): 49–63. http://dx.doi.org/10.53555/nncse.v2i3.488.

Full text
Abstract:
Cloud computing is one of the most important research area. The cloud information don't seem to be safe and secured, because the third parties will access and acquire the knowledge from cloud at any time and will misuse the data or information of a particular user or organization and thus it is concerned, the information stored in cloud should come with the guarantee of security. The effectiveness of the planned design is evaluated through theoretical analysis and intensive experimental results supported a model implementation subject to the TPC-C (Transaction Processing Control) normal benchmark for various numbers of purchasers and network latencies. Information and table information area unit encrypted through constant encoding key before being saved. This encoding secret is known as a passkey. Only trusted clients that already know the key will rewrite the information and acquire data that is necessary to code and rewrite tenant knowledge. Each information is retrieved by purchasers through associated ID. The ID which is generated by the Message Authentication Code (MAC) function to the name of the object (database or table) described by the corresponding row. Deterministic MACfunction allows clients to retrieve the information of a given table by knowing its plaintext name. The advantage during this design is to boost smart Quality of Service (QoS) and Distributing knowledge among completely different suppliers and taking advantage of secret sharing
APA, Harvard, Vancouver, ISO, and other styles
42

Agrawal, D. "Integrating Security with Fault-tolerant Distributed Databases." Computer Journal 33, no. 1 (January 1, 1990): 71–78. http://dx.doi.org/10.1093/comjnl/33.1.71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Hansen, Steven C. "Hybrid inferential security methods for statistical databases." ACM SIGAPP Applied Computing Review 3, no. 1 (June 20, 1995): 14–18. http://dx.doi.org/10.1145/214310.214433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Thuraisingham, Bhavani. "Security and Privacy Issues for Sensor Databases." Sensor Letters 2, no. 1 (March 1, 2004): 37–47. http://dx.doi.org/10.1166/sl.2004.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Mariuţa, Şerban. "Principles of Security and Integrity of Databases." Procedia Economics and Finance 15 (2014): 401–5. http://dx.doi.org/10.1016/s2212-5671(14)00465-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Doyle, Sean D. "The Security, Audit and Control of Databases." Computer Fraud & Security Bulletin 1992, no. 3 (March 1992): 17–18. http://dx.doi.org/10.1016/0142-0496(92)90221-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Paniagua Diez, Fidel, Amrutha Chikkanayakanahalli Vasu, Diego Suarez Touceda, and Jose Maria Sierra Camara. "Modeling XACML Security Policies Using Graph Databases." IT Professional 19, no. 6 (November 2017): 52–57. http://dx.doi.org/10.1109/mitp.2017.4241465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

David, Baptiste, Dorian Larget, and Thibaut Scherrer. "The security of databases: the Access case." Journal of Computer Virology and Hacking Techniques 9, no. 2 (March 12, 2013): 95–107. http://dx.doi.org/10.1007/s11416-013-0182-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Karpisz, Dariusz, Anna Kiełbus, and Maryna Zembytska. "Selected Problems of Industry Databases and Information Infrastructure Security." Quality Production Improvement - QPI 1, no. 1 (July 1, 2019): 371–77. http://dx.doi.org/10.2478/cqpi-2019-0050.

Full text
Abstract:
Abstract The paper presents selected security problems in ICT systems and OT used in industry. In the Industry 4.0 era, the knowledge and competence of the IT staff and the maintenance staff must be linked. Selected problems and their analysis and solutions form the semi-secure network and use of NoSQL databases as a database bridges are presented in the article for various branches of industry.
APA, Harvard, Vancouver, ISO, and other styles
50

Subach, I., and O. Vlasenko. "Architecture of intelligent SIEM for detecting cyber incidents in databases of military information and communication systems." Communication, informatization and cybersecurity systems and technologies, no. 4 (December 21, 2023): 82–92. http://dx.doi.org/10.58254/viti.4.2023.07.82.

Full text
Abstract:
The article looks at the current supply of cyber defense to the databases of information and communication systems. The effectiveness of continuous visits to databases is analyzed. The analysis indicates that existing systems are not immune to security, which is a critical aspect in the field of cybersecurity. A new approach to the architecture of the SIEM system is being introduced, which is aimed at different parts of the protection circuit of the information and communication system. The fragmented architecture makes it possible to effectively detect and respond to cyber attacks at all levels of protection, from the operating system to databases. A new approach is being introduced to ensure cyber security of databases with the benefit of the intelligent capabilities of the SIEM system. The main aspect of this architecture is rich database protection, which allows you to effectively detect and respond to cyber attacks. The registration approach includes the addition of data from different levels to the security circuit of the information and communication system, the module for analyzing data about categories in the database, which operates on the basis of The use of fuzzy multiplicity theory methods, fuzzy logic inference and rule correlation module to improve the detection of cyber incidents. And also the integration of OLAP technologies to provide a deep and analytical view of the database security system. The architecture for identifying cyber incidents has been designed to improve the efficiency of identifying cyber incidents related to the functioning of the database of information and communication systems and. The result of the investigation is a reduction in the capabilities of the SIEM system in identifying and responding to cyber identities in the database of the military information system. Further, we directly monitor the operational model of the cybersecurity system of the information and communication system database.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography