Data Confidentiality and Loss Prevention using Virtual Private Database
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 3
Abstract
As organizations increase their adoption of database systems as the key data management technology for day-to-day operations and decision making, the security of data managed by these systems becomes crucial. Database systems become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Thus data loss prevention and in particular protection of data from unauthorized accesses remain important goal of any data management system. In this respect, over the years the database security community has developed a number of different techniques and approaches to assure data confidentiality, integrity, and availability. In this paper, we first survey the most relevant concepts underlying the notion of database security and summarize the menaces to databases and different categories of vulnerabilities in database. This paper focused on Virtual private database, allows fine - grained access control down to the tuple level using VIEWS. Virtual private database stops various sensitive data from leaving the corporation’s private confines. We demonstrate the practicality of our techniques by describing how VIEWS can be extended to perform access control to provide Row – Level, Column – Level Security, and Level – Based Security.
Authors and Affiliations
B. Lakshmi , K. Parish Venkata Kumar , A. Shahnaz Banu , K. Anji Reddy
Classification of Herbs Plant Diseases via Hierarchical Dynamic Artificial Neural Network after Image Removal using Kernel Regression Framework
When herbs plants has disease, they can display a range of symptoms such as colored spots, or streaks that can occur on the leaves, stems, and seeds of the plant. These visual symptoms continuously change their color, sh...
Malaysian Car Number Plate Detection System Based on Template Matching and Colour Information
This paper presents a method for Malaysian car number plate detection system. This method utilizes template matching echnique to approximate the location of the number plate region. Using the output from this template m...
PERFORMANCE EVALUATION OF THREEPHASE INDUCTION MOTOR DRIVE FED FROM Z-SOURCE INVERTER
This paper presents a Z-source inverter which has been proposed as an alternative power conversion concept for adjustable speed AC drives. It is having both voltages buck and boost capabilities as they allow inverters to...
Performance Evaluation of Requirements Engineering Methodology for Automated Detection of Non Functional Requirements
Requirement Engineering (RE) deals with the requirements of a proposed solution and handles conflicting requirements of the various stakeholders and is critical to the success of a project. Good requirement engineering m...
Canonical Correlated Kernel PCA Method for Face Recognition
Practical face recognition systems are sometimes confronted with low-resolution face images. To address this problem, a super-resolution method that uses nonlinear mappings to infer coherent features that favor higher re...