Data Confidentiality and Loss Prevention using Virtual Private Database

Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 3

Abstract

As organizations increase their adoption of database systems as the key data management technology for day-to-day operations and decision making, the security of data managed by these systems becomes crucial. Database systems become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Thus data loss prevention and in particular protection of data from unauthorized accesses remain important goal of any data management system. In this respect, over the years the database security community has developed a number of different techniques and approaches to assure data confidentiality, integrity, and availability. In this paper, we first survey the most relevant concepts underlying the notion of database security and summarize the menaces to databases and different categories of vulnerabilities in database. This paper focused on Virtual private database, allows fine - grained access control down to the tuple level using VIEWS. Virtual private database stops various sensitive data from leaving the corporation’s private confines. We demonstrate the practicality of our techniques by describing how VIEWS can be extended to perform access control to provide Row – Level, Column – Level Security, and Level – Based Security.

Authors and Affiliations

B. Lakshmi , K. Parish Venkata Kumar , A. Shahnaz Banu , K. Anji Reddy

Keywords

Related Articles

Frequent Item set Mining Using Global Profit Weight Algorithm

The objective of the study focused on weighted based frequent item set mining. The base paper has proposed multi criteria based frequent item set for weight calculation. Contribution towards this project is to implement...

FINGERPRINTING SCHEME FOR FILE SHARING IN TRANSFORM DOMAIN

Fingerprinting scheme plays an important role for file sharing. In this paper, a novel method is introduced for fingerprinting an image. The proposed method uses wavelet and Principal Component Analysis (PCA) techniques...

Iris Recognition Based On Its Texture Patterns

A biometric system uniquely identifies and authenticates humans based on their physical or behavioural features. Iris recognition is one of the most reliable methods of biometric authentication that recognizes a person b...

A GENERIC APPROACH TO CONTENT BASED IMAGE RETRIEVAL USING DCT AND CLASSIFICATION TECHNIQUES

With the rapid development of technology, the traditional information etrieval techniques based on keywords are not sufficient, content - based image retrieval (CBIR) has been an active research opic.Content Based Imag...

COMPARISON OF MULTICAST ROUTING PROTOCOLS IN AD-HOC WIRELESS NETWORKS

The majority of applications are in the areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue si...

Download PDF file
  • EP ID EP156516
  • DOI -
  • Views 83
  • Downloads 0

How To Cite

B. Lakshmi, K. Parish Venkata Kumar, A. Shahnaz Banu, K. Anji Reddy (2013). Data Confidentiality and Loss Prevention using Virtual Private Database. International Journal on Computer Science and Engineering, 5(3), 143-149. https://europub.co.uk/articles/-A-156516