Volume 47– No.12, June 2012
Database Security and Encryption: A Survey Study
Iqra Basharat
Farooque Azam
National University of Sciences and
Technology (NUST), H-12,
Islamabad, Pakistan
National University of Sciences and
Technology (NUST), H-12,
Islamabad, Pakistan
ABSTRACT
Security in today’s world is one of the important challenges that people are facing all over the world in every aspect of their lives. Similarly security in electronic world has a great significance. In this paper, we survey the security of database.
This is an area of substantial interest in database because we know that, the use of database is becoming very important in today’s enterprise and databases contains information that is major enterprise asset. This survey was conducted to identify the issues and threats in database security, requirements of database security, and how encryption is used at different levels to provide the security.
Abdul Wahab Muzaffar
National University of Sciences and
Technology (NUST), H-12,
Islamabad, Pakistan
There are four types of controls mentioned by Denning [1] to obtain the database protection, those includes: access control, information flow control, cryptographic flow control and inference control.
Integrity
Confidentiality
Availability
General Terms
Your general terms must be any term which can be used for general classification of the submitted material such as Pattern
Recognition, Security, Algorithms et. al.
Keywords
Database
Security
Database, Security, Encryption, Access Control.
1. INTRODUCTION
We ask that authors follow some simple guidelines. In essence, we ask you to make your paper look exactly like this document. The easiest way to do this is simply to download the template, and replace the content with your own material.
Information or data is a valuable asset in any organization.
Almost all organization
References: [1] Ahmad Baraani-Dastjerdi; Josef Pieprzyk; Baraanidastjerdi Josef Pieprzyk ; ReihanedSafavi-Naini, Security In Databases: A Survey Study, 1996 [2] http://en.wikipedia.org/wiki/Database_security 27th Oct, 2010 1:00am Vulnerabilities, 2006 White Paper. Services, 2009. ICIW '09. Fourth International Conference on; Publication Year: 2009, Page(s): 163 – Technologies (E-ISSN: 2044-6004) 368 Volume 2, Issue 3, June 2011, page(s); 368-372 Sharing; Computer Supported Cooperative Work in Design, 2006 International Conference on Data Engineering (2007) Publisher: IEEE, Page(s): 676-685. Applications; Published in Industrial Informatics, 2008.