secure databases
Recently Published Documents


TOTAL DOCUMENTS

46
(FIVE YEARS 1)

H-INDEX

7
(FIVE YEARS 0)

Author(s):  
Vladislav Vilihura ◽  
Yuriy Gorbenko ◽  
Vitaliy Yesin ◽  
Serhiy Rassomakhin

The paper contains key provisions (requirements) that should be followed when building secure databases using the capabilities of the main formal access control models, such as discretionary access control models, mandatory access control models, role-based access control models. At the same time, it is noted that any security model does not provide protection but only provides the principle of building a secure database, the implementation of which should ensure the security properties inherent in the model. The security of the database is equally determined by: the properties of the model itself (one or more), its (their) adequacy to the threats affecting the system, and how it (they) is correctly implemented(s). The decisive factor in making a decision is always an assessment of a specific situation, which will allow you to make the right choice, including the complex use of formal models.


2020 ◽  
Vol 53 (2) ◽  
pp. 47-52
Author(s):  
G. Shvachych ◽  
◽  
O. Kholod ◽  
Busygin

The innovative blockchain technology is still in its infancy, and some researchers still treat it with a degree of distrust. However, among the features of its application and its inherent features, one can identify a severe potential that eliminates the current level of such distrust. Note that the “blockchain” concept has been actively discussed along with the cryptocurrency growing popularity. There is a strong belief that this technology can be a real breakthrough in economics, finance, and secure databases. The blockchain consists of a chain of blocks being stored on different computers containing a timestamp and a link to the previous block.


Author(s):  
Jaychand Vishwakarma ◽  
Abhishek Shukla

Nowadays a Database security has become an important issue in technical world. The main objective of database security is to forbid unnecessary information exposure and modification data while ensuring the availability of the needed services. A numbers of security methods have been created for protecting the databases. Many security models have been developed based on different security aspects of database. All of these security methods are useful only when the database management system is designed and developing for protecting the database. Recently the growth of web application with database at its backend Secure Database Management System is more essential than only a Secure Database. Therefore this paper highlight on the Threats, Security Methods and Vulnerabilities in Database Management System with the help of survey performed on the field of secure databases.


Author(s):  
Young-Dal Jang ◽  
Ji-Hong Kim

In accordance with the database management, DAS(Database as Service) model is one solution for outsourcing. However, we need some data protection mechanisms in order to maintain the database security The most effective algorithm to secure databases from the security threat of third party attackers is to encrypt the sensitive data within the database. However, once we encrypt the sensitive data, we have difficulties in queries execution on the encrypted database. In this paper, we focus on the search process on the encrypted database. We proposed the selective tuple encryption method using Bloom Filter which could tell us the existence of the data. Finally, we compare the search performance between the proposed method and the other encryption methods we know.


Author(s):  
Young-Dal Jang ◽  
Ji-Hong Kim

In accordance with the database management, DAS(Database as Service) model is one solution for outsourcing. However, we need some data protection mechanisms in order to maintain the database security The most effective algorithm to secure databases from the security threat of third party attackers is to encrypt the sensitive data within the database. However, once we encrypt the sensitive data, we have difficulties in queries execution on the encrypted database. In this paper, we focus on the search process on the encrypted database. We proposed the selective tuple encryption method using Bloom Filter which could tell us the existence of the data. Finally, we compare the search performance between the proposed method and the other encryption methods we know.


Sign in / Sign up

Export Citation Format

Share Document