Overview of Database Query Auditing Techniques

Abstract

Government regulations and increased awareness of security issues have increased the auditing requirements of information technology systems. The goal of an auditing system is to determine if security and other policies are being violated. It provides the way to detect intrusions into the system, including privileged users and also provide periodic report of system usage and data modifications. Auditing can also be used to detect and recover database systems in case of system failure or human errors. Thus auditing is a key part of the security infrastructure in a database system. While commercial database systems provide mechanisms such as triggers that can be used to track and log any changes made to “sensitive” data using UPDATE queries, they are not useful for tracking accesses to sensitive data using complex SQL queries, which is important for many applications given recent laws such as HIPAA. This paper focuses on a framework for auditing queries and several different notions of suspiciousness for simple SQL queries. It also focuses on notion of SELECT triggers that extends triggers to work for SELECT queries in order to facilitate data auditing.

Authors and Affiliations

Ms. Vidya Ingle, Prof. Manjusha Deshmukh

Keywords

Related Articles

IoT and Wireless Communications: An Overview

The fundamental premise behind this notion is that the Internet is present all around us in the form of a variety of items or objects such as mobile phones, computers, and everyday goods such as refrigerators, TVs, and s...

Advancing Medical Diagnostics with Deep Learning and Data Preprocessing

To address the inefficiencies and inaccuracies in analyzing large-scale medical diagnostic datasets, this paper introduces a deep learning-based method for processing auxiliary medical diagnostic data. The proposed appro...

A Review Study on Green Tea and Its Health Benefits

The Camellia sinensis plant conveys an extent of white, green, or dull teas. Tea is among the most notable beverages on earth, behind water similar to joy or clinical benefits. Green tea is more imperative than dull tea...

An Improved Dynamic Round Robin CPU Scheduling Algorithm Using SJF Technique

CPU Scheduling is one of the fundamental concepts of operating system. There exists a number of CPU scheduling algorithms like first come f irst serve, shortest job first scheduling, round robin scheduling, priority sche...

Twitter Data Classification by Applying and Comparing Multiple Machine Learning Techniques

Having an average of five hundred million tweets sent out per day, twitter has become one of the largest platforms of data analysis for the researchers. Previously, various researches have been conducted on twitter data...

Download PDF file
  • EP ID EP749395
  • DOI -
  • Views 19
  • Downloads 0

How To Cite

Ms. Vidya Ingle, Prof. Manjusha Deshmukh (2014). Overview of Database Query Auditing Techniques. International Journal of Innovative Research in Computer Science and Technology, 2(3), -. https://europub.co.uk/articles/-A-749395