preview

Essay On Database Security And Encryption

Better Essays

International Journal of Computer Applications (0975 – 888)
Volume 47– No.12, June 2012

Database Security and Encryption: A Survey Study
Iqra Basharat

Farooque Azam

National University of Sciences and
Technology (NUST), H-12,
Islamabad, Pakistan

National University of Sciences and
Technology (NUST), H-12,
Islamabad, Pakistan

ABSTRACT
Security in today’s world is one of the important challenges that people are facing all over the world in every aspect of their lives. Similarly security in electronic world has a great significance. In this paper, we survey the security of database.
This is an area of substantial interest in database because we know that, the use of database is becoming very important in
today’s …show more content…

Data/information is always a most important asset for any organization whose security cannot be compromised. With the advances in technology, the risk to these valuable assets increases. So their security is a big challenge. In [8] different database security layers are defined shown in figure (2) below. These layers are: database administrator, system administrator, security officer, developers and employee. For each layer some well-defined security policies have been anticipated. These policies ensure the security features, privacy, confidentiality and integrity.
This study mainly focuses on issues in databases security and measures taken to solve those issues. Securing sensitive data from illegal access, theft and forging becomes a big challenge for different organizations, like government, no-government and privates sectors. Encryption of data in client or server side where data is shared between different parties is not sufficient.
Basically the problem is to ensure that semi trusted database is secure or not. [6]

28

International Journal of Computer Applications (0975 – 888)
Volume 47– No.12, June 2012
A new hypothesis for database encryption is proposed in which database encryption can be provided as a service to applications with unified access to encrypted database. Using such an encrypted data management model, applications can concentrate on their core businesses and protect data privacy against both malicious outsiders and the

Get Access