Analysis of Challenges in the Design and Development of Multi-Level Secure Databases

نویسندگان

  • Pooja Sapra
  • Suresh Kumar
چکیده

Database security mainly deal with the secrecy, integrity and availability of data stored in a database. The common threats to the databases involve Privilege Abuse, Weak Authentication, Weak Audit Trails and Operating System Vulnerabilities. To make the security least compromised; all users are required to follow the rules set up by Database Administrator. These rules are said to be Mandatory Access Control (MAC) based security policies. The Multi-Level secure Databases are implemented by considering these policies. A multilevel secure database provides internal security to the database. The data stored in MLS databases is classified in several levels of sensitivity. A user is allowed to access the data that matches its classification level. The user classification is referred to clearance levels. Therefore, users with different clearance levels access different versions of data. Due to the various issues like Covert channel, Polyinstantiation and lack of security while transmitting the data in distributed databases, it becomes difficult to design and develop the secure databases. Various challenges in front of researchers are Query processing in distributed Multilevel Secure Databases, Deadlock Detection and Resolution and Concurrency control. In this paper we present all these issues and also the techniques which resolve the issues. Keywords— Multilevel security, Query processing, deadlock detection and recovery, transaction, wait-for-graph, concurrency control

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

A Review of the Process of Meaningful Use Program and its Challenges in the Electronic Health Record Roadmap

Introduction: Meaningful use program indicates that health care organizations make meaningful use of an accredited electronic health record system. The objective of this study was to investigate the process of “meaningful use” program and the related challenges for the development of electronic health record. Method: This review study was conducted in 2020. The PubMed, Scopus, Science Direct, a...

متن کامل

A Review of the Process of Meaningful Use Program and its Challenges in the Electronic Health Record Roadmap

Introduction: Meaningful use program indicates that health care organizations make meaningful use of an accredited electronic health record system. The objective of this study was to investigate the process of “meaningful use” program and the related challenges for the development of electronic health record. Method: This review study was conducted in 2020. The PubMed, Scopus, Science Direct, a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014