A Review on Database Security
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 130 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 4, April 2014

A Review on Database Security

Tejashri R. Gaikwad, A. B. Raut

Protecting data is at the heart of many secure systems, and many users rely on a database management system to manage the protection. This paper is all about the security of database management systems, as an example of how application security can be designed and implemented for specific task. There is substantial current interest in DBMS Security because databases are newer than the programming and operating systems. Databases are essential to many business and government organizations, to make the retrieval and maintenance of data easy and efficient it is stored in a database. Database organization and contents are considered valuable corporate assets that must be carefully protected because databases are a favorite target for attackers. The basic security requirements of database system are not unlike those of other computing system. The basic problems are access control, exclusion of spurious data, authentication of users and reliability. In this paper the challenges and threats in database security are identified.

Keywords: Attack, Database security, Threat, Integrity

Edition: Volume 3 Issue 4, April 2014

Pages: 372 - 374

Share this Article

How to Cite this Article?

Tejashri R. Gaikwad, A. B. Raut, "A Review on Database Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131277, Volume 3 Issue 4, April 2014, 372 - 374

Enter Your Registered Email Address





Similar Articles with Keyword 'Attack'

Downloads: 37 | Weekly Hits: ⮙2 | Monthly Hits: ⮙37

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Downloads: 41 | Weekly Hits: ⮙1 | Monthly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 46 | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 89 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2067 - 2068

An Analysis of Mobile Applications Security; Issue and Aspects from the Users Perspective

Ashish A Kulkarni, Dr. Shivaji R. Madan

Share this Article

Downloads: 91 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Similar Articles with Keyword 'Database security'

Downloads: 106 | Monthly Hits: ⮙8

Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 193 - 195

Application for Detecting and Preventing SQL Injection Attacks using Web Service

Anuja A. Patil, Ketaki H. Pangu

Share this Article

Downloads: 106 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 242 - 245

An Approach to Detect and Prevent SQL Injection Attacks using Web Service

Shabnam R. Makanadar, Vaibhav V. Solankurkar

Share this Article

Downloads: 108 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2062 - 2066

XOR- Based Secrete Sharing Scheme For Image Database Security: A Review

Bhagyashree A. Dhamande, Rutuja N. Kamble

Share this Article

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3262 - 3267

An Image Database Security Using Multilayer Multi Share Visual Cryptography

Apurva A. Mohod, Prof. Komal B. Bijwe

Share this Article

Downloads: 117 | Weekly Hits: ⮙2 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 506 - 509

A Random Walk through the Dark Side of NoSQL Databases in Big Data Analytics

Kudakwashe Zvarevashe, Tatenda Trust Gotora

Share this Article

Similar Articles with Keyword 'Threat'

Downloads: 37 | Weekly Hits: ⮙2 | Monthly Hits: ⮙37

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Downloads: 60 | Weekly Hits: ⮙3 | Monthly Hits: ⮙19

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1669 - 1672

Random Forest Based Heart Disease Prediction

Adeen, Preeti Sondhi

Share this Article

Downloads: 93 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 99 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 759 - 761

Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website

Phani K. Cheruku, Atul Kumar

Share this Article

Downloads: 100 | Weekly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Similar Articles with Keyword 'Integrity'

Downloads: 73 | Weekly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 83 | Weekly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Downloads: 99 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Downloads: 100 | Weekly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Downloads: 100 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article



Top