Data Confidentiality and Loss Prevention using Virtual Private Database
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 3
Abstract
As organizations increase their adoption of database systems as the key data management technology for day-to-day operations and decision making, the security of data managed by these systems becomes crucial. Database systems become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Thus data loss prevention and in particular protection of data from unauthorized accesses remain important goal of any data management system. In this respect, over the years the database security community has developed a number of different techniques and approaches to assure data confidentiality, integrity, and availability. In this paper, we first survey the most relevant concepts underlying the notion of database security and summarize the menaces to databases and different categories of vulnerabilities in database. This paper focused on Virtual private database, allows fine - grained access control down to the tuple level using VIEWS. Virtual private database stops various sensitive data from leaving the corporation’s private confines. We demonstrate the practicality of our techniques by describing how VIEWS can be extended to perform access control to provide Row – Level, Column – Level Security, and Level – Based Security.
Authors and Affiliations
B. Lakshmi , K. Parish Venkata Kumar , A. Shahnaz Banu , K. Anji Reddy
An Investigation on Cloud data Storage and Confidentiality Techniques
Cloud computing gives an enormous measure of virtual storage to the clients. Cloud storage essentially serves to little and medium scale commercial enterprises. This will lessen their ventures and support of capacity ser...
ONLINE PRACTICUM MONITORING SYSTEM FOR LYCEUM OF THE PHILIPPINES UNIVERSITY BATANGAS CAMPUS
The main objective of this study to make the monitoring procedure trouble-free by developing a system which would be accessible through the internet. Students will have their own user accounts which will give them the ca...
Algorithm for Solving Job Shop Scheduling Problem Based on machine availability constraint
Typically, general job shop scheduling problems assume that working times of machines are equal, for instance eight hours a day. However, in real factories, these working times are different because the machines may have...
Interaction between Software Engineering and Artificial Intelligence- A Review
Software engineering and artificial intelligence is the two field of the computer science. During the last decades, the disciplines of Artificial Intelligence and Software Engineering have developed separately without th...
Non-Linear Segmentation of Touched Roman Characters Based on Genetic Algorithm
The segmentation accuracy of Roman cursive characters, especially touched characters, is essential for the high performance of Optical Character Recognition Systems. This paper presents a new approach for non-linear seg...