Semantic Inference Model For DatabaseInference Detection Violation
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2
Abstract
Database Security has become a major problem in modern day’s applications. Generally for Information security everybody tries to protect sensitive data by using different security techniques. Despite these security measures, a malicious user can access non-sensitive information and can infer sensitive data from it. We hereby investigate a semantic inference model based on non-deterministic approach to avoid the database inference problem. This model can work for single user as well as for multi user environment. Here Work is focused on employee information access. Probability of each employee goes on increasing on each query request. When a user poses a query, detection system will examine users past query log for last three days and calculates probability. If probability exceeds than the specified threshold, the query will be denied for that day. Also, to monitor activities, security officer can generate log.
Authors and Affiliations
Rupali Chopade , Prof. B. N. Jagdale , Prof. Amit Savyanavar
Public key cryptosystem and a key exchange protocol using tools of non-abelian group
Public Key Cryptosystems assure privacy as well as integrity of the transactions between two parties. The sizes of the keys play an important role. The larger the key the harder is to crack a lock of encrypted data. We...
Computational Approaches for determination of Most Probable RNA Secondary Structure Using Different Thermodynamics Parameters
ABSTRACT : Many bioinformatics studies require the analysis of RNA structures. More specifically, extensive work is done to elaborate efficient algorithms able to predict the 2-D folding structures of RNA. The core of RN...
Modeling of the Systems of Piloting In Training Institutions
From a globalization and complex environment .point of view the evaluation of the educational system turns out to be an imperative .The performance indicators allow to characterize the evolution of the educational system...
Framework for User Authenticity and Access Control Security over a Cloud
Cloud computing has emerged as a computing paradigm bringing forward many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the sam...
Performance Analysis of AODV-UI Routing Protocol With Energy Consumption Improvement Under Mobility Models in Hybrid Ad hoc Network
In mobile ad hoc networks (MANETs), routing protocol plays the most important role. In the last decade, Ad hoc On-demand Distance Vector (AODV) routing protocol becomes the attention of focussed research on MANETs world...