Review Papers | Computer Science & Engineering | India | Volume 3 Issue 4, April 2014
A Review on Database Security
Tejashri R. Gaikwad, A. B. Raut
Protecting data is at the heart of many secure systems, and many users rely on a database management system to manage the protection. This paper is all about the security of database management systems, as an example of how application security can be designed and implemented for specific task. There is substantial current interest in DBMS Security because databases are newer than the programming and operating systems. Databases are essential to many business and government organizations, to make the retrieval and maintenance of data easy and efficient it is stored in a database. Database organization and contents are considered valuable corporate assets that must be carefully protected because databases are a favorite target for attackers. The basic security requirements of database system are not unlike those of other computing system. The basic problems are access control, exclusion of spurious data, authentication of users and reliability. In this paper the challenges and threats in database security are identified.
Keywords: Attack, Database security, Threat, Integrity
Edition: Volume 3 Issue 4, April 2014
Pages: 372 - 374
How to Cite this Article?
Tejashri R. Gaikwad, A. B. Raut, "A Review on Database Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131277, Volume 3 Issue 4, April 2014, 372 - 374
35 PDF Views | 28 PDF Downloads
Similar Articles with Keyword 'Attack'
Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks
Nikhita Nerkar, Vina M Lomte
Fragmentation and Duplication of Data for the Best Cloud Performance and Security (FDBPS)
Prof. Jaya Kumar B L, Saranya C
Secure Routing in Wireless Sensor Networks through the Identified Trusted Node
D. Latha, K. Palanivel
Similar Articles with Keyword 'Database security'
XOR- Based Secrete Sharing Scheme For Image Database Security: A Review
Bhagyashree A. Dhamande, Rutuja N. Kamble
An Image Database Security Using Multilayer Multi Share Visual Cryptography
Apurva A. Mohod, Prof. Komal B. Bijwe
A Random Walk through the Dark Side of NoSQL Databases in Big Data Analytics
Kudakwashe Zvarevashe, Tatenda Trust Gotora
Online Detection of Malicious Transactions from Database System
Dhanashree Parchand, Harmeet Kaur Khanuja
Comparative Analysis of Various Biometric Techniques for Database Security
Harpreet Saini, Kanwal Garg
Similar Articles with Keyword 'Threat'
Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
A Detailed Anatomization of Mobile Agents
Payal Beniwal, Dr. Mukesh Kumar
Multi Model Approach for Money Laundering Identification Using Fund Transition Matrix
G. Krishnapriya, Dr. M. Prabakaran
Security on Cloud Computing: A Review
Distributed Direct Neighbour Comparison Based Approach
Pankaj Singh Chouhan, Brajesh Kumar Shrivash, Nidhi Bajpai
Similar Articles with Keyword 'Integrity'
Regenerating Code Based on Public Auditing Scheme with Security Preserving for Cloud Storage
Dr. K. Sundeep Kumar, Anupama P. V
A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage
Pranita Bakka, Dr. Jayashree Agarkhed
Public Auditing System with Auto-Data Recovery System on Cloud Scheme
Dhane Sachin V., Joshi P.
Integrity Auditing for Dynamic Cloud Using Homomorphic Encryption with Group User Revocation
Madhuri. P, Jayavarthini. C