Survey On Database Security
نویسندگان
چکیده
A database-management system (DBMS) is a collection of correlated data and a set of programs to access correlated data. The collection of data, usually referred to as the database, contains information able to an enterprise. And hence the concept of security lies with-in. As the database contains all information relevant to particular enterprise, so it's very important to be in safe side to prevent all threats related to data. Various Security Mechanisms have been developed to prevent ill-legal and un-authorized access of data (enterprise related, web or network related etc. ) by un-authorized users and hackers. Database security is a growing concern of the market these days as there has been found an un-expected growth in ill-legal access of data. This paper is the brief analysis of all the threats and attacks against database security and integrity. Database security is the mechanisms that secure the database from data tampering, deliberate threats, unauthorized users and hackers. Security refers to protecting data from unauthorized users and Integrity refers to protecting the data against authorized users. Both concepts must be taken into consideration for making a complete check on overall security of database.
منابع مشابه
Separating indexes from data: a distributed scheme for secure database outsourcing
Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...
متن کاملA Survey on Security Issues in Big Data and NoSQL
This paper presents a survey on security and privacy issues in big data and NoSQL. Due to the high volume, velocity and variety of big data, security and privacy issues are different in such streaming data infrastructures with diverse data format. Therefore, traditional security models have difficulties in dealing with such large scale data. In this paper we present some security issues in big ...
متن کاملA Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing
Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...
متن کاملA Survey on Securing Databases From Unauthorized Users
Database and database technologies form a core component of many computing systems and applications which allow data to be stored, retained and shared electronically. As the use of database systems and the amount of data contained in these systems grows continuously and exponentially, database security has become an issue of utmost importance due to an increase in the number of incidents report...
متن کاملDatabase Access Control Policies
As organizations increase their dependence on database systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. A truly comprehensive approach for data protection must include mechanisms for enforcing access control policies based on data contents, subject qualifications and characteristics. The database security comm...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کامل