International Journal of Computer Applications (0975 – 888)
Volume 47– No.12, June 2012
Database Security and Encryption: A Survey Study
Iqra Basharat
Farooque Azam
National University of Sciences and
Technology (NUST), H-12,
Islamabad, Pakistan
National University of Sciences and
Technology (NUST), H-12,
Islamabad, Pakistan
ABSTRACT
Security in today’s world is one of the important challenges that people are facing all over the world in every aspect of their lives. Similarly security in electronic world has a great significance. In this paper, we survey the security of database.
This is an area of substantial interest in database because we know that, the use of database is becoming very important in
today’s
…show more content…
Data/information is always a most important asset for any organization whose security cannot be compromised. With the advances in technology, the risk to these valuable assets increases. So their security is a big challenge. In [8] different database security layers are defined shown in figure (2) below. These layers are: database administrator, system administrator, security officer, developers and employee. For each layer some well-defined security policies have been anticipated. These policies ensure the security features, privacy, confidentiality and integrity.
This study mainly focuses on issues in databases security and measures taken to solve those issues. Securing sensitive data from illegal access, theft and forging becomes a big challenge for different organizations, like government, no-government and privates sectors. Encryption of data in client or server side where data is shared between different parties is not sufficient.
Basically the problem is to ensure that semi trusted database is secure or not. [6]
28
International Journal of Computer Applications (0975 – 888)
Volume 47– No.12, June 2012
A new hypothesis for database encryption is proposed in which database encryption can be provided as a service to applications with unified access to encrypted database. Using such an encrypted data management model, applications can concentrate on their core businesses and protect data privacy against both malicious outsiders and the
In today’s world of instant connectivity and information at users’ fingertips, it’s vital that sensitive information is safeguarded against those who seek to do personal harm and profit from gaining access to the data. The key behind keeping information safe is the method in which it’s protected and encrypted. In order to appreciate how information is secured, users must understand the encryption concepts behind it. To do this, one must comprehend the current encryption standards, the trends and developments in encryption technology, the importance of securing data, the government’s regulations pertaining to encryption, the companies involved in research and implementation, the implications of leaked or stolen data, and a brief look into
Why is it so important to have security for an organizations database? One reason will be to secure the organizations personal and confidentiality data information. Oracle has a database security software that enables a regulatory compliance for both oracle and non-oracle databases. Oracle has a powerful and a preventative detective security controls that will include database
In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.
Security is very critical section in Distribution DBMS concerning credit card data and customer’s data.
“The practice of keeping data protected from corruption and unauthorized access” is known as data security (SpamLaw, 2011). The focal point of data security is the protection of
Research Objective: The main theme of this research paper is to protect sensitive information that any organization or business possess. With community’s increasing reliance on information systems and technology there is scope for security breaches, more likely to happen. Not only monetary loss it can create damage to information assets that has sensitive data. To secure these assets from any internal or external damage organizations has to follow proposed rules and guidelines. Also security responsibilities
In this paper we will look at defining the problem of data security and public administration. The reader will see the evidence gathered to get a better understanding of the problem of not securing data when sending it. The reader will learn different alternatives to how they can ensure the data is secure.
Nowadays, Personalized medicine is an promising way of treatment for the patients. Medical records make into standardize and manage in the form of Electronic Medical Record.(EMR). Personal health record (PHR) is essential for continuing the treatment, tracing the previous clinical reports and in taking drugs. The management of PHR by hand increases the time of processing and arise the complexity in storage problem. The health information exchange often outsources the data to be stored at a third party. Third party implements the encryption techniques for access control mechanism. The access control mechanism provides the security against intruders and unauthorized person.
First, data will be protected with IT security systems to include the most effective firewalls, encryption protocols and auditing processes. Data will be backed-up data using two systems, 1 local from separate
Data security is not just imperative to consumers whose information is stored; it is also significant to the organizations who store this information. A failure to secure information can impede a business in a number of ways. Losing information that gives an organization a competitive advantage can lead the destruction of; and cause consumers to abandon the organization and seek out another organization to do business with.
It is every company mandatory requirement to make sure sensitive data is protected from public access at all times. In large organization sensitive information such as employee salary and performance should be kept confidential from most of the DBA users. For this DBMS uses database security and authorization subsystems that is responsible for security to the portions of database or to restrict the access to the sensitive information.
Data needs to be protected in every form that it holds: stored data, in use data, and mobilized data. Each of these forms have their own distinctive security challenges.
Banner by Ellucian, an Enterprise Resource Planning (ERP) system is widely used by many higher education institutions in the world today. Known to be the leading ERP system in higher education, Ellucian develops security plans for each institution that establishes procedural protection for their highly sensitive database that stores critical personnel and students account information. In order to effectively secure this sensitive information, it is recommended that the institution’s IT Department enforces the highest level of tiered defense in depth security measures to ensure and maintain data confidentiality, integrity, and availability of the data. Lack of proper security measures can result in data vulnerabilities that will reap great distress on the institution along with its students, faculty and staff.
Encryption is a method of programming data for security so that it appears to be random data. Only the people sending and receiving the information have the key to decrypt the message, which will put it back into its original form making it readable. The only people with the key are the people who are intended to read the message. Not many people know what encryption is. I took a survey of twenty students and asked two questions. The first question I asked was do you know what encryption means and the second question I asked was have you ever heard of anybody using encryption. This is a chart of the information I received:
With advances in technology constantly happening, it can be hard to keep up with all of the latest trends. If organizations cannot keep up with the latest trends, it can lead to flaws in their security. Any flaws in security can have a detrimental effect on an organization’s database. Almost every organization has some sort of database, whether it is for maintaining customers, inventory, or vital information.