International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Review Papers | Computer Science & Engineering | India | Volume 3 Issue 4, April 2014

A Review on Database Security

Tejashri R. Gaikwad, A. B. Raut

Protecting data is at the heart of many secure systems, and many users rely on a database management system to manage the protection. This paper is all about the security of database management systems, as an example of how application security can be designed and implemented for specific task. There is substantial current interest in DBMS Security because databases are newer than the programming and operating systems. Databases are essential to many business and government organizations, to make the retrieval and maintenance of data easy and efficient it is stored in a database. Database organization and contents are considered valuable corporate assets that must be carefully protected because databases are a favorite target for attackers. The basic security requirements of database system are not unlike those of other computing system. The basic problems are access control, exclusion of spurious data, authentication of users and reliability. In this paper the challenges and threats in database security are identified.

Keywords: Attack, Database security, Threat, Integrity

Edition: Volume 3 Issue 4, April 2014

Pages: 372 - 374


How to Cite this Article?

Tejashri R. Gaikwad, A. B. Raut, "A Review on Database Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131277, Volume 3 Issue 4, April 2014, 372 - 374

35 PDF Views | 28 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Attack'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2038 - 2044

Fragmentation and Duplication of Data for the Best Cloud Performance and Security (FDBPS)

Prof. Jaya Kumar B L, Saranya C

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 685 - 689

Secure Routing in Wireless Sensor Networks through the Identified Trusted Node

D. Latha, K. Palanivel

Share this article



Similar Articles with Keyword 'Database security'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2062 - 2066

XOR- Based Secrete Sharing Scheme For Image Database Security: A Review

Bhagyashree A. Dhamande, Rutuja N. Kamble

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3262 - 3267

An Image Database Security Using Multilayer Multi Share Visual Cryptography

Apurva A. Mohod, Prof. Komal B. Bijwe

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 506 - 509

A Random Walk through the Dark Side of NoSQL Databases in Big Data Analytics

Kudakwashe Zvarevashe, Tatenda Trust Gotora

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 403 - 408

Online Detection of Malicious Transactions from Database System

Dhanashree Parchand, Harmeet Kaur Khanuja

Share this article

Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 150 - 154

Comparative Analysis of Various Biometric Techniques for Database Security

Harpreet Saini, Kanwal Garg

Share this article



Similar Articles with Keyword 'Threat'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2253 - 2256

A Detailed Anatomization of Mobile Agents

Payal Beniwal, Dr. Mukesh Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1671 - 1674

Multi Model Approach for Money Laundering Identification Using Fund Transition Matrix

G. Krishnapriya, Dr. M. Prabakaran

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1722 - 1729

Security on Cloud Computing: A Review

Rameshwari Malik

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2234 - 2241

Distributed Direct Neighbour Comparison Based Approach

Pankaj Singh Chouhan, Brajesh Kumar Shrivash, Nidhi Bajpai

Share this article



Similar Articles with Keyword 'Integrity'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2451 - 2458

Regenerating Code Based on Public Auditing Scheme with Security Preserving for Cloud Storage

Dr. K. Sundeep Kumar, Anupama P. V

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1681 - 1685

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Pranita Bakka, Dr. Jayashree Agarkhed

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2098 - 2102

Public Auditing System with Auto-Data Recovery System on Cloud Scheme

Dhane Sachin V., Joshi P.

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1093 - 1096

Integrity Auditing for Dynamic Cloud Using Homomorphic Encryption with Group User Revocation

Madhuri. P, Jayavarthini. C

Share this article
Top