Abstract

Today we are living in a digital world where we all are connected to an open access network to exchange information. This information is more valuable assets that need protection from unauthenticated access. There are many security models has been proposed to protect the data stored in database but still needs more protection from attacks. In this study we have a three layer security model for relational database. Proposed model builds a security architecture based on access control policy, cryptography techniques and stored procedure. These mechanisms and techniques are combined together to present an interactive three-layer security model for securing relational databases in distributed environment. This model provides a kind of security controlling both in rests of database and data in motion from malicious user and other attacks.

Highlights

  • The rapid growth of network technology and information processing system led to the development of distributed database management system

  • To compare the performance of queries between non-secure and secured databases we run four queries in four consecutive environments which are as followsEnvironment 1: in this environment we have considered only a non-secure database, Environment 2: in this environment the data is not protected with integrity only encryption is applied for data protection Environment 3: in this environment only stored procedure and access policy rules are applied for integrity

  • Environment 4: in this environment both stored procedure and access policy rules are applied for integrity and encryption is applied for confidentiality

Read more

Summary

INTRODUCTION

The rapid growth of network technology and information processing system led to the development of distributed database management system. In this type of system, data are stored in different computers scattered in different geographical sites connected via network [1, 2]. Distributed database security is an important issue which includes number of processes and procedures that protect a database from unplanned happenings. These activities can be considered as unconstitutional modification, authenticated exploitation and cruel attacks. Access control becomes a mostly used technique today which is based on user roles with privileges on stored database objects. Dr Pramod Singh, Assistant Professor, School of Studies Computer application Bastar University, Jagdalpur (CG),India

IMPLEMENTATION
EXPERIMENTAL RESULTS
Result of Query-1
Result of Query-2
Result of Query-3
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.