Security Policies for Securing Cloud Databases

Abstract

Databases are an important and almost mandatory means for storing information for later use. Databases require effective security to protect the information stored within them. In particular access control measures are especially important for cloud databases, because they can be accessed from anywhere in the world at any time via the Internet. The internet has provided a plethora of advantages by increasing accessibility to various services, education, information and communication. The internet also presents challenges and disadvantages, which include securing services, information and communication. Naturally, the internet is being used for good but also to carry out malicious attacks on cloud databases. In this paper we discuss approaches and techniques to protect cloud databases, including security policies which can realized as security patterns.

Authors and Affiliations

Ingrid Buckley, Fan Wu

Keywords

Related Articles

CREeLS: Crowdsourcing based Requirements Elicitation for eLearning Systems

Crowdsourcing is the process of having a task performed by the crowd. Because of the Web evolution, recently crowdsourcing is being used in the field of Requirements Engineering to help in simplifying its activities. Amo...

Diabetes Monitoring System Using Mobile Computing Technologies

Diabetes is a chronic disease that needs to regularly be monitored to keep the blood sugar levels within normal ranges. This monitoring depends on the diabetic treatment plan that is periodically reviewed by the endocrin...

Quadrant Based WSN Routing Technique By Shifting Of Origin

A sensor is a miniaturized, low powered (basically battery powered), limited storage device which can sense the natural phenomenon or things and convert it into electrical energy or vice versa using transduction process....

Software Migration Frameworks for Software System Solutions: A Systematic Literature Review

This study examines and review the current software migration frameworks. With the quick technological enhancement, companies need to move their software’s from one platform to another platform like cloud-based migration...

Achieving Flatness: Honeywords Generation Method for Passwords based on user behaviours

Honeywords (decoy passwords) have been proposed to detect attacks against hashed password databases. For each user account, the original password is stored with many honeywords in order to thwart any adversary. The honey...

Download PDF file
  • EP ID EP110583
  • DOI 10.14569/IJACSA.2014.050607
  • Views 107
  • Downloads 0

How To Cite

Ingrid Buckley, Fan Wu (2014). Security Policies for Securing Cloud Databases. International Journal of Advanced Computer Science & Applications, 5(6), 33-36. https://europub.co.uk/articles/-A-110583