This document proposes using role-based access control (RBAC) to improve database intrusion detection. It discusses how RBAC restricts access to databases based on user roles. Administrators who access sensitive attributes would have their audit logs mined to determine attribute sensitivity. This information could then be used to detect intrusions using fewer rules. The document outlines the RBAC model and relationships between users, jobs, and access. It also describes implementing RBAC in 6 steps and using a formula to represent the RBAC access control process to better secure database attributes and detect intrusions.
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection SystemSimran Seth
This document describes a project to develop an intrusion detection system (IDS) using query pattern access and fuzzy clustering. The system aims to detect insider threats and prevent inference attacks on sensitive database attributes by monitoring user access patterns. It will create user profiles based on historical access logs and detect anomalies by comparing new queries to the profiles. Fuzzy clustering will be used to partition users into groups with similar access patterns defined by cluster profiles containing access rules. The IDS seeks to enforce database security while addressing the limitations of existing syntactic and data-centric auditing approaches.
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...journal ijrtem
An intrusion detection system (IDS) is designed to monitor all inbound and outbound network
activity and identify any suspicious patterns that may indicate a network or system attack from someone
attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the
main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS
essentially reviews your network traffic and data and will identify probes, attacks, exploits and other
vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an
alert, logging the event or even paging an administrator. In some cases, the IDS may be prompted to reconfigure
the network to reduce the effects of the suspicious intrusion. The proposed protocol called Password Guessing
Resistant Protocol (PGRP), helps in preventing such attacks and provides a pleasant login experience for
legitimate users. PGRP limits the number of login attempts for unknown users. In additional we propose an attack
detector for cloud spoofing that utilizes MAC (Media access Control) and RSS (Received Signal strength) analysis.
Next, we describe how we integrated our attack detector into a real-time indoor localization system, which is also
capable of localizing the positions of the attackers
International Refereed Journal of Engineering and Science (IRJES) irjes
International Refereed Journal of Engineering and Science (IRJES)
Ad hoc & sensor networks, Adaptive applications, Aeronautical Engineering, Aerospace Engineering
Agricultural Engineering, AI and Image Recognition, Allied engineering materials, Applied mechanics,
Architecture & Planning, Artificial intelligence, Audio Engineering, Automation and Mobile Robots
Automotive Engineering….
Data modeling is the process of exploring data structures and relationships. It involves identifying entity types, attributes, relationships and applying normalization. Conceptual, logical and physical data models are used at different stages of the design process. Database security involves techniques like access control, encryption and firewalls to protect data confidentiality, integrity and availability. Issues like SQL injection occur when user input is not sanitized before passing to the database.
Security Issues Surrounding Data Manipulation in a Relational DatabaseDavid Murphy
This document discusses security issues related to data manipulation in relational database management systems (RDBMS). It begins by introducing RDBMS and describing common access control policies like mandatory access control, discretionary access control, and role-based access control. It then discusses how structured query language (SQL) enables data manipulation but is also vulnerable to SQL injection attacks. Specific examples of database breaches at large companies are provided to illustrate security issues related to weak authentication policies, plaintext passwords, and SQL injection vulnerabilities. The document argues that proper user input validation and intrusion prevention systems are needed to protect against unauthorized data access and modification in RDBMS.
The document discusses a proposed intrusion detection framework for mobile database systems. It introduces a unique profiling method using carefully selected database objects and data concerning the location of database requests. Experiments implementing the system achieved promising detection rates with low false alarm rates. The document reviews existing literature on intrusion detection systems, location-aware IDS, and IDS at the database level. It identifies gaps in current approaches, including high false positive/negative rates. The proposed framework aims to provide a more robust detection method for insider threats in mobile environments.
This document discusses 5 different application security models: database role based, application role based, application function based, application role and function based, and application table based. For each model, it describes the key tables used to implement the model, how privileges are assigned, and some characteristics of the model. The models aim to provide data security and access protection at the table level through different approaches to assigning privileges to users.
This document describes a mobile application called Pharmi Track that allows users to track nearby pharmacies and doctors. It discusses the need for such an application given that currently finding pharmacies and doctor availability can be difficult. The proposed system would allow users, doctors, and pharmacists to register and then users could search for and order medicines from nearby pharmacies. It would also allow users to post questions to doctors and see pharmacy and doctor recommendations. The document outlines the system design, including components, functionality, architecture, and security measures to make it reliable. It concludes the application would provide medical assistance to users by helping them find pharmacies and doctors more easily.
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...IJERA Editor
Now in organizations or companies maximum information or data available and that data are related to tabular
form means relational database. Sometimes organization wanted to distribute that particular information or data
in within organization or other organization in daily basis. Here the thing is that the organization faces the some
kind of problems of security related because they distributed that information for its purposes and here
sometimes organization wanted that particular information will be modified or upgraded, Now they can used
numbers of methods or technics for encryption and electronic signatures for given a security and protection of
that particular data in during transmission network. In that protection of that protection used various different
mechanisms and strong methods for accessing that specific that particular data or information. It is very well
known that current or today the proper data must take as access control polices. Also some kind of methods for
CIA towards database system must be adopted
This summary provides an overview of a document that examines electronic health records (EHR) information security dynamics for EHR projects using service-oriented architecture (SOA). The document discusses how SOA solutions can increase interoperability but also complexity of security aspects for distributed EHR systems. It presents frameworks like IHE ATNA and BPPC that provide security standards. The document aims to adapt Forrester's market growth model using system dynamics to analyze policy changes and feedback effects for EHR projects. It discusses factors in an SOA security model like organizational maturity, costs, risks and quality. The modeling aims to help understand complex dynamics and reduce decision-making complexity in EHR security management.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM csandit
This document presents the results of a case study on an adaptive authentication system. The study analyzed over 171,000 login records from over 1,200 users collected over 254 days. It found that most logins occurred during standard working hours and from within the organization's internal network. When analyzing attribute factors like location, time, browser and operating system, it found most logins originated from Kuala Lumpur, Malaysia, and the most used browser and operating system combination was Chrome on Windows 7. The study aims to evaluate the adaptive authentication system's ability to determine risk levels based on normal user behavior profiles.
1) The document discusses various ways that artificial intelligence can be applied to different phases of the software engineering lifecycle, including requirements specification, design, coding, testing, and estimation.
2) It provides examples of using techniques like natural language processing to clarify requirements, knowledge graphs to manage requirements information, and computational intelligence for requirements prioritization.
3) For design, the document discusses using intelligent agents to recommend patterns and designs to satisfy quality attributes from requirements and assist with assigning responsibilities to components.
Continuous User Identity Verification through Secure Login SessionIRJET Journal
This document proposes a system for continuous user identity verification through secure login sessions using multi-modal biometrics. The system uses biometrics like fingerprints, facial recognition, and keyboard dynamics along with one-time passwords and random security questions to authenticate users. During login sessions, one-time passwords are sent to the user's email and random questions are asked every 5-10 minutes to continuously verify the user's identity. This prevents unauthorized access if the user leaves their device unattended during a session. The proposed system detects misuse of resources and prevents malicious activities through continuous multi-modal biometric authentication. Biometric and user data are stored on smartphones and web services.
This document analyzes the effect of compressive sensing theory and watermarking on verification and authentication performance in a multibiometric system. It proposes embedding sparse measurements of a watermark biometric image, generated using compressive sensing theory, into transform coefficients of a host biometric image. This provides two levels of security and authentication using the watermarked host image and reconstructed watermark image. Experimental results on different watermarking techniques show the proposed techniques do not affect the multibiometric system's verification performance or authentication accuracy while providing security against various attacks.
The document summarizes two recent studies on access control. It discusses the authors' contributions in each study, their motivations, and potential additional areas of study. The first study introduced metrics to evaluate access control rule sets and provide a scientific method for comparing rule sets. The second study surveyed access control in fog computing, highlighting security challenges and providing requirements and taxonomies for access control models. It suggests attribute-based encryption as an area for further fog computing access control research.
For more course tutorials visit
www.newtonhelp.com
CST 610 Project 1 Information Systems and Identity Management
CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CST 610 Project 3 Assessing Information System Vulnerabilities and Risk
Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...ijcsta
Business logics of relational databases applications are an important source of security violations, namely in respect
to access control. The situation is particularly critical when access control policies are many and complex. In these
cases, programmers of business logics can hardly master the established access control policies. Now we consider
situations where business logics are built with tools such as JDBC and ODBC. These tools convey two sources of
security threats: 1) the use of unauthorized Create, Read, Update and Delete (CRUD) expressions and also 2) the
modification of data previously retrieved by Select statements. To overcome this security gap when Role-based
access control policies are used, we propose an extension to the basic model in order to control the two sources
of security threats. Finally, we present a software architectural model from which distributed and typed RBAC
mechanisms are automatically built, this way relieving programmers from mastering any security schema. We
demonstrate empirical evidence of the effectiveness of our proposal from a use case based on Java and JDBC.
This paper deals with the risk assessment of different types of electronics and mobile payment systems as well as the countermeasures to mitigate the identified risk in various electronics and mobile payment synthesis.
C RITICAL A SSESSMENT OF A UDITING C ONTRIBUTIONS T O E FFECTIVE AND E FF...csandit
Database auditing has become a very crucial aspect
of security as organisations increase their
adoption of database management systems (DBMS) as m
ajor asset that keeps, maintain and
monitor sensitive information. Database auditing is
the group of activities involved in observing
a set of stored data in order to be aware of the ac
tions of users. The work presented here
outlines the main auditing techniques and methods.
Some architectural based auditing systems
were also considered to assess the contribution of
auditing to database security. Here a
framework of several stages to be used in the insti
gation of auditing is proposed. Some issues
relating to handling of audit trails are also discu
ssed in this paper. This paper also itemizes
some of the key important impacts of the concept to
security and how compliance with
government policies and regulations is enforced thr
ough auditing. Once the framework is
adopted, it will provide support to database audito
rs and DBAs.
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Journals
Abstract Health Care is the most important unindustrialized field. Cloud is an emerging trend in software industry. In medical field, there are large dataset comprising highly sensitive data about patient’s medical records. Based on these records, diagnosis for the patient will be given. Moving data to the cloud makes to explore a large information for diagnosis as expert documentation will also be stored as part of health record. Physicians from anywhere at any time can get access over these reports for better treatment. The Medicare industry vacillates to store these data to the cloud as the patients might feel insecure about their health records. This work introduces the idea of combining Cipher Cloud, Inter Cloud and ABE schemes, proposes an innovative method to enhance security features in the cloud by double encryption using algorithms and tools. By this, only authorized entities are proficient of accessing these records. Rather than storing data in single cloud, Inter Cloud (Multi-cloud) also adds advantage for our proposed work. Keywords: Virtualization, Cipher cloud, Trust, Encryption, Inter cloud
Authentication and Authorization for User Roles and Device for Attack Detecti...IRJET Journal
This document summarizes a research paper that proposes methods for user authentication and authorization to protect relational databases from insider and outsider attacks. It discusses using digital signatures, user roles, and access policies to control what resources different users can access. The proposed methods aim to detect anomalies in database access, such as SQL injection attacks, based on profiling typical application queries and constraints. A user-to-user relationship graph is also used to help with online access control. The document outlines related work on smart grid security and presents the proposed framework and modules before discussing expected experimental results.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
This document proposes a two-factor authentication security model for online banking transactions. The model uses a three-tier architecture with presentation, business, and data layers. It requires users to register with personal information and receive an m-Pin for the first authentication factor. When users want to make a transaction, the system generates a transaction password that is hashed with salt before storage. This hashed password acts as the second authentication factor and prevents hackers from using stolen login credentials to make unauthorized transactions even if they access the stored data. The system aims to block hackers before any harm can be done to users' accounts.
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...IRJET Journal
1) The document discusses applying advanced encryption algorithms to implement access controls for sensitive information stored in relational databases. It focuses on role-based access control systems where only authorized users have permission to access certain data.
2) The AES encryption algorithm is described as suitable for encrypting sensitive fields in database tables. When applied, authorized users with the encryption key can decrypt and access encrypted data while unauthorized users only see encrypted values.
3) As an example, a hospital database table with a 'Disease' field is shown before and after encrypting that sensitive field with AES. This allows only authorized medical staff to access full patient medical records.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Database Security—Concepts,Approaches, and ChallengesElisaOllieShoresna
Database Security—Concepts,
Approaches, and Challenges
Elisa Bertino, Fellow, IEEE, and Ravi Sandhu, Fellow, IEEE
Abstract—As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more
vulnerable to security breaches even as they gain productivity and efficiency advantages. Though a number of techniques, such as
encryption and electronic signatures, are currently available to protect data when transmitted across sites, a truly comprehensive
approach for data protection must also include mechanisms for enforcing access control policies based on data contents, subject
qualifications and characteristics, and other relevant contextual information, such as time. It is well understood today that the
semantics of data must be taken into account in order to specify effective access control policies. Also, techniques for data integrity
and availability specifically tailored to database systems must be adopted. In this respect, over the years the database security
community has developed a number of different techniques and approaches to assure data confidentiality, integrity, and availability.
However, despite such advances, the database security area faces several new challenges. Factors such as the evolution of security
concerns, the “disintermediation” of access to data, new computing paradigms and applications, such as grid-based computing and on-
demand business, have introduced both new security requirements and new contexts in which to apply and possibly extend current
approaches. In this paper, we first survey the most relevant concepts underlying the notion of database security and summarize the
most well-known techniques. We focus on access control systems, on which a large body of research has been devoted, and describe
the key access control models, namely, the discretionary and mandatory access control models, and the role-based access control
(RBAC) model. We also discuss security for advanced data management systems, and cover topics such as access control for XML.
We then discuss current challenges for database security and some preliminary approaches that address some of these challenges.
Index Terms—Data confindentiality, data privacy, relational and object databases, XML.
�
1 INTRODUCTION
AS organizations increase their adoption of databasesystems as the key data management technology for
day-to-day operations and decision making, the security of
data managed by these systems becomes crucial. Damage
and misuse of data affect not only a single user or
application, but may have disastrous consequences on the
entire organization. The recent rapid proliferation of Web-
based applications and information systems have further
increased the risk exposure of databases and, thus, data
protection is today more crucial than ever. It is also
important to appreciate that data needs to be protected
not only from external threats, but also from insider threats ...
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdfDr Amit Phadikar
This document discusses database security and access control models. It provides an overview of three main access control models: discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC). DAC allows users discretion over their own data and to share access privileges. However, it is vulnerable to Trojan horse attacks where a user's privileges are abused. MAC enforces security based on classification levels and prevents reading or writing outside of clearance levels. RBAC assigns system access based on user roles and duties. The document examines advantages and limitations of each model and how they enforce database security policies.
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...IJERA Editor
Now in organizations or companies maximum information or data available and that data are related to tabular
form means relational database. Sometimes organization wanted to distribute that particular information or data
in within organization or other organization in daily basis. Here the thing is that the organization faces the some
kind of problems of security related because they distributed that information for its purposes and here
sometimes organization wanted that particular information will be modified or upgraded, Now they can used
numbers of methods or technics for encryption and electronic signatures for given a security and protection of
that particular data in during transmission network. In that protection of that protection used various different
mechanisms and strong methods for accessing that specific that particular data or information. It is very well
known that current or today the proper data must take as access control polices. Also some kind of methods for
CIA towards database system must be adopted
This summary provides an overview of a document that examines electronic health records (EHR) information security dynamics for EHR projects using service-oriented architecture (SOA). The document discusses how SOA solutions can increase interoperability but also complexity of security aspects for distributed EHR systems. It presents frameworks like IHE ATNA and BPPC that provide security standards. The document aims to adapt Forrester's market growth model using system dynamics to analyze policy changes and feedback effects for EHR projects. It discusses factors in an SOA security model like organizational maturity, costs, risks and quality. The modeling aims to help understand complex dynamics and reduce decision-making complexity in EHR security management.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM csandit
This document presents the results of a case study on an adaptive authentication system. The study analyzed over 171,000 login records from over 1,200 users collected over 254 days. It found that most logins occurred during standard working hours and from within the organization's internal network. When analyzing attribute factors like location, time, browser and operating system, it found most logins originated from Kuala Lumpur, Malaysia, and the most used browser and operating system combination was Chrome on Windows 7. The study aims to evaluate the adaptive authentication system's ability to determine risk levels based on normal user behavior profiles.
1) The document discusses various ways that artificial intelligence can be applied to different phases of the software engineering lifecycle, including requirements specification, design, coding, testing, and estimation.
2) It provides examples of using techniques like natural language processing to clarify requirements, knowledge graphs to manage requirements information, and computational intelligence for requirements prioritization.
3) For design, the document discusses using intelligent agents to recommend patterns and designs to satisfy quality attributes from requirements and assist with assigning responsibilities to components.
Continuous User Identity Verification through Secure Login SessionIRJET Journal
This document proposes a system for continuous user identity verification through secure login sessions using multi-modal biometrics. The system uses biometrics like fingerprints, facial recognition, and keyboard dynamics along with one-time passwords and random security questions to authenticate users. During login sessions, one-time passwords are sent to the user's email and random questions are asked every 5-10 minutes to continuously verify the user's identity. This prevents unauthorized access if the user leaves their device unattended during a session. The proposed system detects misuse of resources and prevents malicious activities through continuous multi-modal biometric authentication. Biometric and user data are stored on smartphones and web services.
This document analyzes the effect of compressive sensing theory and watermarking on verification and authentication performance in a multibiometric system. It proposes embedding sparse measurements of a watermark biometric image, generated using compressive sensing theory, into transform coefficients of a host biometric image. This provides two levels of security and authentication using the watermarked host image and reconstructed watermark image. Experimental results on different watermarking techniques show the proposed techniques do not affect the multibiometric system's verification performance or authentication accuracy while providing security against various attacks.
The document summarizes two recent studies on access control. It discusses the authors' contributions in each study, their motivations, and potential additional areas of study. The first study introduced metrics to evaluate access control rule sets and provide a scientific method for comparing rule sets. The second study surveyed access control in fog computing, highlighting security challenges and providing requirements and taxonomies for access control models. It suggests attribute-based encryption as an area for further fog computing access control research.
For more course tutorials visit
www.newtonhelp.com
CST 610 Project 1 Information Systems and Identity Management
CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CST 610 Project 3 Assessing Information System Vulnerabilities and Risk
Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...ijcsta
Business logics of relational databases applications are an important source of security violations, namely in respect
to access control. The situation is particularly critical when access control policies are many and complex. In these
cases, programmers of business logics can hardly master the established access control policies. Now we consider
situations where business logics are built with tools such as JDBC and ODBC. These tools convey two sources of
security threats: 1) the use of unauthorized Create, Read, Update and Delete (CRUD) expressions and also 2) the
modification of data previously retrieved by Select statements. To overcome this security gap when Role-based
access control policies are used, we propose an extension to the basic model in order to control the two sources
of security threats. Finally, we present a software architectural model from which distributed and typed RBAC
mechanisms are automatically built, this way relieving programmers from mastering any security schema. We
demonstrate empirical evidence of the effectiveness of our proposal from a use case based on Java and JDBC.
This paper deals with the risk assessment of different types of electronics and mobile payment systems as well as the countermeasures to mitigate the identified risk in various electronics and mobile payment synthesis.
C RITICAL A SSESSMENT OF A UDITING C ONTRIBUTIONS T O E FFECTIVE AND E FF...csandit
Database auditing has become a very crucial aspect
of security as organisations increase their
adoption of database management systems (DBMS) as m
ajor asset that keeps, maintain and
monitor sensitive information. Database auditing is
the group of activities involved in observing
a set of stored data in order to be aware of the ac
tions of users. The work presented here
outlines the main auditing techniques and methods.
Some architectural based auditing systems
were also considered to assess the contribution of
auditing to database security. Here a
framework of several stages to be used in the insti
gation of auditing is proposed. Some issues
relating to handling of audit trails are also discu
ssed in this paper. This paper also itemizes
some of the key important impacts of the concept to
security and how compliance with
government policies and regulations is enforced thr
ough auditing. Once the framework is
adopted, it will provide support to database audito
rs and DBAs.
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Journals
Abstract Health Care is the most important unindustrialized field. Cloud is an emerging trend in software industry. In medical field, there are large dataset comprising highly sensitive data about patient’s medical records. Based on these records, diagnosis for the patient will be given. Moving data to the cloud makes to explore a large information for diagnosis as expert documentation will also be stored as part of health record. Physicians from anywhere at any time can get access over these reports for better treatment. The Medicare industry vacillates to store these data to the cloud as the patients might feel insecure about their health records. This work introduces the idea of combining Cipher Cloud, Inter Cloud and ABE schemes, proposes an innovative method to enhance security features in the cloud by double encryption using algorithms and tools. By this, only authorized entities are proficient of accessing these records. Rather than storing data in single cloud, Inter Cloud (Multi-cloud) also adds advantage for our proposed work. Keywords: Virtualization, Cipher cloud, Trust, Encryption, Inter cloud
Authentication and Authorization for User Roles and Device for Attack Detecti...IRJET Journal
This document summarizes a research paper that proposes methods for user authentication and authorization to protect relational databases from insider and outsider attacks. It discusses using digital signatures, user roles, and access policies to control what resources different users can access. The proposed methods aim to detect anomalies in database access, such as SQL injection attacks, based on profiling typical application queries and constraints. A user-to-user relationship graph is also used to help with online access control. The document outlines related work on smart grid security and presents the proposed framework and modules before discussing expected experimental results.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
This document proposes a two-factor authentication security model for online banking transactions. The model uses a three-tier architecture with presentation, business, and data layers. It requires users to register with personal information and receive an m-Pin for the first authentication factor. When users want to make a transaction, the system generates a transaction password that is hashed with salt before storage. This hashed password acts as the second authentication factor and prevents hackers from using stolen login credentials to make unauthorized transactions even if they access the stored data. The system aims to block hackers before any harm can be done to users' accounts.
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...IRJET Journal
1) The document discusses applying advanced encryption algorithms to implement access controls for sensitive information stored in relational databases. It focuses on role-based access control systems where only authorized users have permission to access certain data.
2) The AES encryption algorithm is described as suitable for encrypting sensitive fields in database tables. When applied, authorized users with the encryption key can decrypt and access encrypted data while unauthorized users only see encrypted values.
3) As an example, a hospital database table with a 'Disease' field is shown before and after encrypting that sensitive field with AES. This allows only authorized medical staff to access full patient medical records.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Database Security—Concepts,Approaches, and ChallengesElisaOllieShoresna
Database Security—Concepts,
Approaches, and Challenges
Elisa Bertino, Fellow, IEEE, and Ravi Sandhu, Fellow, IEEE
Abstract—As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more
vulnerable to security breaches even as they gain productivity and efficiency advantages. Though a number of techniques, such as
encryption and electronic signatures, are currently available to protect data when transmitted across sites, a truly comprehensive
approach for data protection must also include mechanisms for enforcing access control policies based on data contents, subject
qualifications and characteristics, and other relevant contextual information, such as time. It is well understood today that the
semantics of data must be taken into account in order to specify effective access control policies. Also, techniques for data integrity
and availability specifically tailored to database systems must be adopted. In this respect, over the years the database security
community has developed a number of different techniques and approaches to assure data confidentiality, integrity, and availability.
However, despite such advances, the database security area faces several new challenges. Factors such as the evolution of security
concerns, the “disintermediation” of access to data, new computing paradigms and applications, such as grid-based computing and on-
demand business, have introduced both new security requirements and new contexts in which to apply and possibly extend current
approaches. In this paper, we first survey the most relevant concepts underlying the notion of database security and summarize the
most well-known techniques. We focus on access control systems, on which a large body of research has been devoted, and describe
the key access control models, namely, the discretionary and mandatory access control models, and the role-based access control
(RBAC) model. We also discuss security for advanced data management systems, and cover topics such as access control for XML.
We then discuss current challenges for database security and some preliminary approaches that address some of these challenges.
Index Terms—Data confindentiality, data privacy, relational and object databases, XML.
�
1 INTRODUCTION
AS organizations increase their adoption of databasesystems as the key data management technology for
day-to-day operations and decision making, the security of
data managed by these systems becomes crucial. Damage
and misuse of data affect not only a single user or
application, but may have disastrous consequences on the
entire organization. The recent rapid proliferation of Web-
based applications and information systems have further
increased the risk exposure of databases and, thus, data
protection is today more crucial than ever. It is also
important to appreciate that data needs to be protected
not only from external threats, but also from insider threats ...
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdfDr Amit Phadikar
This document discusses database security and access control models. It provides an overview of three main access control models: discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC). DAC allows users discretion over their own data and to share access privileges. However, it is vulnerable to Trojan horse attacks where a user's privileges are abused. MAC enforces security based on classification levels and prevents reading or writing outside of clearance levels. RBAC assigns system access based on user roles and duties. The document examines advantages and limitations of each model and how they enforce database security policies.
IRJET- A Review On - Controlchain: Access Control using BlockchainIRJET Journal
This document summarizes several access control models that could be used for the Internet of Things (IoT), including Mandatory Access Control (MAC), Discretionary Access Control (DAC), Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Organization-Based Access Control (OrBAC), and OAuth. It discusses the key components, advantages, and limitations of each model. Specifically, it notes that MAC and DAC focus on confidentiality but lack flexibility, RBAC is well-suited for independent domains but not cross-domains, ABAC provides more flexible access based on user, resource, and environment attributes defined in XACML policies, and OrBAC extends this to incorporate organizational
Databases store logically interrelated data representing real-world aspects. They require security measures to protect data confidentiality, integrity, and availability from threats. Common threats include privilege abuse, injection attacks, and unmanaged sensitive data. Database security uses prevention techniques like access control and detection techniques like auditing. Access control policies include discretionary access control based on authorization rules, mandatory access control, and role-based access control. Views and stored procedures also help implement access control by restricting data access.
Database
Database security means protection of a database against unauthorized access, either intentional or unintentional
Database security requires the mechanisms, that protect a database against the intentional or accidental threats
Such mechanisms affect the hardware, software, people, and data components of a database management system
Database security protects against:
Theft and fraud,
Loss of confidentiality
Loss of privacy
Loss of integrity
Loss of availability
The scope of database security.
Why database security is a serious concern for an organization.
The type of threats that can affect a database system.
How to protect a computer system using computer-based controls.
The security measures provided by Microsoft Office Access and Oracle DBMSs.
Approaches for securing a DBMS on the Web
The document summarizes a seminar on database security threats, challenges, and approaches. It discusses how database security aims to protect the confidentiality, integrity, and availability of data. It outlines several challenges to database security like complex access control policies, security for large distributed databases, and privacy-preserving techniques. The document also discusses approaches to database security including encryption, digital signatures, role-based access control policies, and both built-in database protections and third-party security solutions.
This document discusses database security and provides an overview of the topic. It begins with an introduction that defines database security goals of secrecy, integrity, and availability. It then discusses security threats such as misuse of authority, logical inference, aggregation, masquerading, and bypassing controls. The document uses a simple example database to illustrate concepts throughout. It reviews relational database models and conceptual data modeling. It also outlines several database security models and research areas.
This document discusses database security and privacy. It covers various types of security including discretionary access control based on granting and revoking privileges, mandatory access control and role-based access control. It also discusses threats to database security such as loss of integrity, availability and confidentiality. Methods to protect against these threats include access control, flow control, encryption and decryption. The document also covers public key infrastructure and encryption standards such as DES and AES.
This document discusses database security, threats, and countermeasures. It defines database security as protecting the confidentiality, integrity, and availability of database data. Common threats include unauthorized access, data corruption, and network issues. Countermeasures include access control, authorization, encryption, backups, and firewalls. Firewalls monitor network traffic to identify and block harmful queries. Encryption uses keys to securely store and decrypt data. Authorization controls user permissions. These controls help secure database data from both intentional and accidental threats.
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdfKavitaShinde26
This document provides an overview of database integrity and security concepts. It discusses domain constraints and referential integrity, which enforce data validity. It then covers database security topics like authentication, access control using methods like discretionary access control and mandatory access control. Role-based access control is described for assigning user permissions. The use of views for security enforcement and an overview of encryption techniques like symmetric and public key encryption are also summarized. The document is presented as part of a course on database concepts by an assistant professor.
what is security of database system
how we can handle database security
how database security can be check
what are the countermeasures of database security
This document discusses various topics related to database security including authentication, authorization, access control methods, encryption, and intrusion detection. It defines data security as protecting data from unauthorized access and explains authentication verifies a user's identity while authorization verifies their access privileges. The document also distinguishes between discretionary access control which allows owners to specify access and mandatory access control which is system-enforced based on clearance levels. Symmetric and asymmetric encryption methods are overviewed along with the purpose of audit trails to log database transactions. Common attacks like SQL injection are also outlined.
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
The document discusses cooperative relay based data transmission and proposes a system to select the most energy efficient relay node for a source node to transmit data through. It analyzes different cooperative relaying techniques like amplify-and-forward, decode-and-forward, and compress-and-forward. The proposed system aims to minimize the source node's cost for cooperation by selecting the relay node that provides the highest energy efficiency. This allows high data transmission over long distances with improved energy efficiency compared to direct transmission without a relay.
iaetsd Software defined am transmitter using vhdlIaetsd Iaetsd
This document discusses the design and implementation of an amplitude modulation (AM) software defined radio transmitter using an FPGA. It begins with an abstract describing the goals of the project. It then provides an overview of the system design, including discussion of the individual components like the microphone, analog to digital converter, digital to analog converter, carrier frequency generator, and antenna. It describes how these components will be implemented on the FPGA, including using behavioral modeling with VHDL. It also discusses designing filters and modulation/demodulation circuits. The overall summary is that this document outlines the goals and high-level system design for creating an AM transmitter using an FPGA that can transmit an audio signal by digitally modulating a carrier frequency.
iaetsd Health monitoring system with wireless alarmIaetsd Iaetsd
The document describes a health monitoring system with wireless alarm that detects a patient's heart rate and temperature. It consists of a sensor unit worn on the wrist that monitors vital signs and transmits data wirelessly to an alarm and display unit. This allows caregivers to be alerted quickly if a patient's condition changes, such as if their heart rate is too high or low. The system uses a microcontroller to process sensor readings from a pulse oximetry sensor and transmit data via RF to the receiving unit, which contains another microcontroller connected to an RF receiver and buzzer alarm. If an abnormal heart rate is detected, the system triggers an alarm to notify caregivers.
iaetsd Equalizing channel and power based on cognitive radio system over mult...Iaetsd Iaetsd
This document summarizes a research paper about equalizing power and channel allocation in a cognitive radio system using multiuser OFDM. It discusses how frequency spectrum is becoming scarce due to increased wireless usage, and how cognitive radio can help improve spectrum utilization by allowing unlicensed secondary users to access licensed bands opportunistically when primary users are not using them. The paper presents a system model for a cognitive radio network with one primary user and multiple secondary user pairs. It formulates the problem of allocating subcarriers and power to the secondary users while avoiding interference to the primary user.
iaetsd Economic analysis and re design of driver’s car seatIaetsd Iaetsd
The document discusses redesigning car seats to improve comfort. It notes that car seat design must balance comfort, safety, and health. Static comfort relates to the seat's form and support, while dynamic comfort considers vibration levels. The study reexamines existing car seat designs and proposes a novel design with improvements in form, features, usability, and comfort. A survey was also conducted to define important comfort factors like pain prevention to help guide future seat designs.
iaetsd Design of slotted microstrip patch antenna for wlan applicationIaetsd Iaetsd
This document describes the design and simulation of a slotted microstrip patch antenna for wireless local area network (WLAN) applications operating at 2.4 GHz. The antenna was designed on an FR-4 substrate with a dielectric constant of 4.2 and thickness of 1.6 mm. Simulation in HFSS showed the antenna has a voltage standing wave ratio of 1.88 at the resonant frequency, with omnidirectional radiation patterns. The compact size and simple design make this slotted patch antenna suitable for use in embedded wireless systems.
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSIaetsd Iaetsd
This document reviews research on enhancing heat transfer using ribs mounted inside ducts. Various studies investigated ribs of different shapes, pitches, heights and angles. Continuous ribs, transverse ribs, angled ribs, and other rib configurations were examined. Most studies found that ribs increased turbulence and heat transfer compared to smooth ducts. Some key findings included V-shaped ribs providing better performance than other shapes, and certain rib pitches and angles performing better depending on parameters like Reynolds number. In general, ribs were found to effectively enhance heat transfer through boundary layer disruption and increased turbulence compared to smooth ducts.
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...Iaetsd Iaetsd
This document discusses two methods for generating power from solar panels for a home without using inverters or batteries.
Method 1 proposes a hybrid AC/DC home grid system that shifts harmonic intensive loads to the DC side to reduce power conversion losses and isolates harmonic content. Solar power is fed to the home through a DC-DC converter, MPPT, and inverter to power AC loads, with a separate DC connection for DC loads.
Method 2 generates AC power directly from an array of solar cells connected in an alternating anti-parallel configuration, eliminating power losses from an inverter. Compatibility with residential loads is analyzed. This novel technique could remove the need for batteries and reduce overall cost.
The performance of
This document describes the fabrication of a dual power bike that can operate using either an internal combustion engine or electric motor. The goal is to improve fuel efficiency and reduce pollution by allowing electric-only operation in the city. The bike combines a petrol engine with a battery and electric motor, resulting in twice the fuel economy of a conventional bike. It works by using the electric motor powered by the battery for low-power city driving, and switching to the petrol engine for higher speeds or power needs. This hybrid system aims to lower costs and pollution compared to other vehicles.
This document discusses Blue Brain technology and the goal of creating an artificial brain using silicon chips. It aims to upload the contents of a natural human brain into a virtual brain. This would allow human intelligence, memories, and personalities to potentially persist after death through the virtual brain. The document outlines how nanobots could scan a human brain at a cellular level and transfer that information to a supercomputer to recreate the brain's structure and function virtually. It compares key aspects of natural and virtual brains, such as how inputs, interpretation, outputs, memory, and processing would theoretically work for a virtual brain modeled after the human brain.
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...Iaetsd Iaetsd
The document proposes an innovative street lighting and surveillance system using Internet of Things (IoT) and Li-Fi technologies. The system uses LED street lights equipped with sensors and cameras that can monitor traffic, detect crimes, and provide emergency assistance. Data from the lights would be transmitted using Li-Fi and stored in the cloud for analysis. This integrated system could save energy, reduce costs, and improve safety, traffic management, and emergency response capabilities in cities.
The document proposes a Surveillance Aided Robotic Bird (SARB) to improve on existing surveillance systems. SARB would be designed like a bird and equipped with cameras, including night vision, to monitor areas remotely. It would be powered by carbon nanotubes, allowing for wireless charging and extended flight time. SARB could track intruders under the control of image processing and fly between fixed points for charging. This would provide a more natural, mobile and energy efficient form of surveillance compared to static cameras.
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid GrowthIaetsd Iaetsd
This document discusses how small and medium enterprises can achieve long term rapid growth. It focuses on the concept of "time monopoly" which has two components - a competitive advantage over competitors in a niche market, and a time advantage where it takes competitors longer to catch up.
The literature review discusses different sources of competitive advantage according to Porter, including variety-based positioning, needs-based positioning, and access-based positioning. It also discusses the importance of fit between different business activities for achieving a competitive advantage.
The paper proposes five propositions for rapid growth. These include that all areas can enable or hinder growth; areas can be transformed from hindering to enabling growth; businesses need scalability; and time monopoly,
iirdem Design of Efficient Solar Energy Collector using MPPT AlgorithmIaetsd Iaetsd
This document discusses the design of an efficient solar energy collector using a Maximum Power Point Tracking (MPPT) algorithm. It aims to maximize solar energy output through the use of lenses to concentrate sunlight onto solar panels and an MPPT algorithm to track the optimal power point. The methodology involves designing a DC-DC boost converter, lens-based solar cell, and a microcontroller with driver circuit. Simulations and hardware implementation will analyze the solar array, boost converter, and verify the system collects more energy than a fixed panel system.
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...Iaetsd Iaetsd
This document describes a proposed crash impact attenuation system for automobiles that uses mechatronic systems. The system includes an accident prediction system using ultrasound sensors to monitor vehicle surroundings and detect potential collisions. It also includes a crash absorption system with components like a pneumatic cylinder attached to the vehicle chassis that can push and pull a shock energy absorber upon detection of an imminent crash by the microcontroller. This proposed system aims to reduce crash impacts and potentially save lives by fully absorbing crash forces through controlled actuation of the absorber components.
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...Iaetsd Iaetsd
1) The document describes a smart home energy management system that uses wireless sensor networks and ZigBee technology to monitor and control home appliances in real-time. Electrical parameters like voltage, current, and power consumption are measured.
2) The system allows flexible control of appliances based on consumer needs. Appliances can be monitored and controlled remotely or automatically based on power consumption thresholds.
3) Key features of the system include using a TRIAC circuit to control appliances without needing a microcontroller, and providing flexible control options to users for switching devices on/off according to their preferences. This allows improving consumer comfort while optimizing energy use.
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
This document proposes a Shared Authority based Privacy preserving Authentication protocol (SAPA) for handling privacy issues in cloud storage. SAPA achieves shared access authority through an anonymous access request matching mechanism. It applies attribute-based access control to allow users to reliably access their own data fields. It also uses proxy re-encryption to provide temporary authorized data sharing among multiple users. The goal is to preserve user privacy during data access and sharing in the cloud.
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
This document proposes a Robust Key-Aggregate Cryptosystem (RKAC) that allows flexible and efficient assignment of decryption rights for encrypted data stored in cloud storage. The RKAC produces constant-sized ciphertexts such that a constant-sized aggregate decryption key can decrypt any subset of ciphertexts. This allows the data owner to share access to selected encrypted files by sending a single small aggregate key to authorized users, without decrypting the files themselves or distributing individual keys. The RKAC is described as providing a secure and flexible method for sharing encrypted data stored in the cloud.
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
This document discusses attribute-based encryption in cloud computing with outsourced revocation. It proposes a pseudonym generation scheme for identity-based encryption and outsourced revocation in cloud computing. The scheme offloads most key generation operations to a Key Update Cloud Service Provider during key issuing and updating, leaving only simple operations for the Private Key Generator and users. It aims to reduce computation overhead at the Private Key Generator while using an untrusted cloud service provider.
iaetsd Modeling of solar steam engine system using parabolicIaetsd Iaetsd
The document describes the modeling and testing of a solar-steam engine system using a parabolic concentrator. The system focuses solar radiation onto a boiler to generate steam, which is then used to power an oscillating steam engine coupled to a generator to produce electricity. The parabolic dish has a diameter of 0.625m and focuses sunlight onto a 1L boiler. Testing showed the system could produce 9V with no load and 5.3V under load, demonstrating its potential for rural electrification applications.
This presentation provides a comprehensive overview of a specialized test rig designed in accordance with ISO 4548-7, the international standard for evaluating the vibration fatigue resistance of full-flow lubricating oil filters used in internal combustion engines.
Key features include:
This research presents a machine learning (ML) based model to estimate the axial strength of corroded RC columns reinforced with fiber-reinforced polymer (FRP) composites. Estimating the axial strength of corroded columns is complex due to the intricate interplay between corrosion and FRP reinforcement. To address this, a dataset of 102 samples from various literature sources was compiled. Subsequently, this dataset was employed to create and train the ML models. The parameters influencing axial strength included the geometry of the column, properties of the FRP material, degree of corrosion, and properties of the concrete. Considering the scarcity of reliable design guidelines for estimating the axial strength of RC columns considering corrosion effects, artificial neural network (ANN), Gaussian process regression (GPR), and support vector machine (SVM) techniques were employed. These techniques were used to predict the axial strength of corroded RC columns reinforced with FRP. When comparing the results of the proposed ML models with existing design guidelines, the ANN model demonstrated higher predictive accuracy. The ANN model achieved an R-value of 98.08% and an RMSE value of 132.69 kN which is the lowest among all other models. This model fills the existing gap in knowledge and provides a precise means of assessment. This model can be used in the scientific community by researchers and practitioners to predict the axial strength of FRP-strengthened corroded columns. In addition, the GPR and SVM models obtained an accuracy of 98.26% and 97.99%, respectively.
This presentation outlines testing methods and equipment for evaluating gas-phase air filtration media using flat sheet samples, in accordance with ISO 10121 standards—specifically designed for assessing the performance of media used in general ventilation and indoor air quality applications.
UNIT-5-PPT Computer Control Power of Power SystemSridhar191373
Introduction
Conceptual Model of the EMS
EMS Functions and SCADA Applications.
Time decomposition of the power system operation.
Open Distributed system in EMS
OOPS
Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensi...ManiMaran230751
Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensics Process – Introduction – The
Identification Phase – The Collection Phase – The Examination Phase – The Analysis Phase – The
Presentation Phase.
Tesia Dobrydnia brings her many talents to her career as a chemical engineer in the oil and gas industry. With the same enthusiasm she puts into her work, she engages in hobbies and activities including watching movies and television shows, reading, backpacking, and snowboarding. She is a Relief Senior Engineer for Chevron and has been employed by the company since 2007. Tesia is considered a leader in her industry and is known to for her grasp of relief design standards.
Kevin Corke Spouse Revealed A Deep Dive Into His Private Life.pdfMedicoz Clinic
Kevin Corke, a respected American journalist known for his work with Fox News, has always kept his personal life away from the spotlight. Despite his public presence, details about his spouse remain mostly private. Fans have long speculated about his marital status, but Corke chooses to maintain a clear boundary between his professional and personal life. While he occasionally shares glimpses of his family on social media, he has not publicly disclosed his wife’s identity. This deep dive into his private life reveals a man who values discretion, keeping his loved ones shielded from media attention.
Digital Crime – Substantive Criminal Law – General Conditions – Offenses – In...ManiMaran230751
Digital Crime – Substantive Criminal Law – General Conditions – Offenses – Investigation Methods for
Collecting Digital Evidence – International Cooperation to Collect Digital Evidence.
Module4: Ventilation
Definition, necessity of ventilation, functional requirements, various system & selection criteria.
Air conditioning: Purpose, classification, principles, various systems
Thermal Insulation: General concept, Principles, Materials, Methods, Computation of Heat loss & heat gain in Buildings
Video Games and Artificial-Realities.pptxHadiBadri1
🕹️ #GameDevs, #AIteams, #DesignStudios — I’d love for you to check it out.
This is where play meets precision. Let’s break the fourth wall of slides, together.
Video Games and Artificial-Realities.pptxHadiBadri1
Iaetsd database intrusion detection using
1. DATABASE INTRUSION DETECTION USING
ROLE BASED ACCESS CONTROL
SYSTEM
Mrs. ANTONY VIGIL MRINALINI SHRIDHAR R OVIYA
ASSISTANT PROFESSOR STUDENT STUDENT
SRM UNIVERSITY SRM UNIVERSITY SRM UNIVERSITY
ABSTRACT- In this paper, we propose a different
approach for the database intrusion detection
(IDS). Database Management (DBMS) has
become a key criteria in the information system
(IS) storing valuable information of the system.
We are urged to protect it to the fullest without
losing any bit of information. Intrusion detection,
which gathers and analyses the information
system was one of the methods which protects the
database the fullest with all sorts of rules. In this
paper, we move into the Role based Access
Control (RBAC) system which controls the
administered databases for finding out sensitive
attributes of the system dynamically. Role based
Access Control is a method to restrict system
access by authorized and unauthorized people
directly. The access is based on the roles of the
individual users within the organization.
Important roles like administrator, access
sensitive attributes and if their audit logs are
mined, then some useful information regarding
the attributes can be used. This will help to decide
the sensitivity of the attributes. Since the models
of the database intrusion detection has proposed a
lot of rules , it is time to change the system to
protect it more evidently with less rules and
regulations which would be useful for detecting all
sorts of transactions.
Keywords: Database intrusion detection, Role
based access control system, Administered
database, Audit logs, Sensitive and attributes.
1.INTRODUCTION
In past years, Database Management System
(DBMS) have become an indispensible part of the
life of the organizers and the users using it. Hence it
was the primary priority to safeguard the DBMS, no
matter how easy or difficult it was. The motive of the
researches was first based on these ideas of
protecting the DBMS and to prevent the leakage of
data. The past years, Authentication user privileges ,
Auditing, Encryption and lots of methods have been
used to protect the data and the system. Amending all
the above methods, newer methods have come up to
protect the same for daily operations and decision
making in organizations. Database is a group or
collection of data's which may contain valuable and
sensitive information about the institution and
organization, which is accessed by the people of the
organization internally and externally every day.
Any leak of information in these systems
will devastate the whole database system and the
data's, leading to a great loss. Hence the data need to
be protected and secured. The recent models of
protection of DBMS were the dynamic threshold
method and the data mining method of Intrusion
detection system. Intrusion detection method is a
process which analyses the unauthorized access and
malicious behaviors and finds intrusion behaviors
and attempts by detecting the state and activity of an
operating system to provide an effective means for
intrusion defend. In this paper, we will see how
RBAC will help us to protect the database along with
the intrusion detection with limited rules.
RBAC- Role based access control, also
known as role based security is a method to restrict
access of just one user, and also many users
depending on the role of the users. The roles are
prioritized like Example: Administrators access
sensitive attributes and the DBMS and its attributes
can be used. RBAC is a rich technology for
authentication privileges and controlling the access of
the information and data. It makes the administration
of the security (work) much easier and simpler,
though the process may be tedious and little vast. The
possibility of adding newer application inside the
secured system is much easier with the different
access control mechanism. Extracting the data from
the protected information system is much easier only
by an authorized person. Talking about the sensitivity
of the attributes we will have to refine the audit log
to extract the data attributes.
In the past few years computer crime and
security survey conducted by the Computer Security
Institute(CSI) have seen a lot of drastic improvement
73
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
ISBN : 378 - 26 - 138420 - 6
www.iaetsd.in
2. in both the aspects ,but only thing was that there need
to be a lot of adjustments in the rules given by each
model. We are in the scoop of improving the
database system and protecting it. In 2005, about
45% of the inquired entities have reported increased
unauthorized access to information due to the poor
system management. In 2007, financial application
fraud was the leading cause and found it double as
compared to the previous year also 59% of the
respondents outlined insider abuse as the security
problem. In 2013, survey the number has dropped
down and the security was much more than the past
few years. The statistics being, the percentage threats
due to insiders has been dropped to 20% and the
financial fraud which was a cause before were
eliminated in the upcoming years. Now only 10-20%
are reported as unauthorized users. This shows that
the database security has been improving day to day
and researches have been conducted every time a
model is proposed before implementing to action.
2.ROLE BASED ACCESS CONTROL MODEL
The Role based access control model
proposes 3 relationships between the attributes given.
They are:
a) USER-JOB: Which defines the relationship
between the user and the task defined in that system.
b) JOB-ACCESS: Which defines the relationship
between the job or the task of the person and the
access to that particular work.
c) JOB-JOB: Which defines the job to job
relationship between the users.
Now defining each attribute of the model we
have the users of an organization represents an
organizer or an agent of that field. The task or the job
represents the responsibility or the functioning of the
user within the organization. The access represents
the approval or a permission to that particular task or
event of that organization. The sessions box
represents the overall relationship between the user
and the task the contribution both has in the RBAC
model. It does not point towards the access field as
the access field is directed only by the task the user
performs. Constraints represent the limitations or the
boundary of each entity of that data that is, the user,
task or job, access as well as the relationship between
them is also restricted. The sessions represent the
Divide and rule mechanism of the RBAC model. The
fig 2 and 1 are interlinked process and each step of
the data flow diagram will implement the following
attributes of the user.
FIG 1. MODEL OF RBAC
3.RELATED WORKS
RBAC supports three well known principles and
hence we work out our plan in 3 steps:
1. Principle of minimal authority
2. Divide and rule method of duties
3. Data abstraction
Data secured
Authorization access
FIG 2. DATA FLOW DIAGRAM
The sensitivity of an attribute is based on
the database application. We have to divide the
attributes into 3 divisions so as to protect the
attributes according to the sensitivity or the position
order they hold. Sensitivity refers to the position
order a data has to be protected. If the data are least
sensitive we can give it minimal protection. If the
data are highly sensitive in the attribute set we need
Principle of minimal authority
User
Divide and rule method
Data abstraction
Data
USERS TASK /JOB ACCESS
SESSIONS
CONSTRAINTS
74
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
ISBN : 378 - 26 - 138420 - 6
www.iaetsd.in
3. to protect it to the fullest. In some schematics we are
not able to tell whether the data is sensitive or not. To
give a clear picture of the attributes we have taken
the Student Database Schema.
TABLE 1.TEACHER'S SALARY DATABASE
SCHEMA
TABLE NAME ATTRIBUTE NAME
STAFF
Name [i], Staff-id [j], Address
[d], Phone no [a]
ACCOUNT
Account-id [b], Staff-id [c],
Status [g], Month [e], Year [f],
Amount [h]
SALARY TYPE
Salary-type [k], LOP and
Deductions [l]
TABLE 2. TYPES OF SENSITIVE ATTRIBUTES
SENSITIVITY ATTRIBUTE WEIGHTS
Light
sensitivity
a, b, c, d, i, ,j ,k I
Medium
sensitivity
e, f II
High sensitivity g, h, l III
The sensitivity of the attributes can also be
given by the entity-relationship model [E-R]. But
with relation to the RBAC model , an administrator is
required to control the database for its sensitivity. It
is a perception of the real world. It is the
diagrammatic representation of how the attributes are
considered. The * represents if the attributes are
sensitive or not. The model represents a collection of
entities or data's and the contribution to the system.
To maintain the account and the staff system we need
a main administrator. Hence the RBAC system
proposed in this E-R model .Thus E-R model is
modified as:
GETS
FIG 3.RBAC MODEL USING E-R MODEL
a) Principal of minimal authority- Also known as
the principle of least privilege means that the access
to the information system or its resources for only its
own legitimate purpose by every user or the module.
In simple words, we can say that an authorized user
can access that information system or the resource
only for their own privileged purpose. Privileged/
Authority refers to the right a user has or granting
access to the user to use a particular system. For
example, the user defined in its domain can access
only its domain and its attributes. The person
accessing a bank account can go through only their
bank procedures and account. The system does not
access or grant permission to access other accounts.
Similarly an admin user accessing a computer can go
into only the admin user account all other password
accounts are blocked for the admin user.
b)Divide and rule method of duties- it can also be
termed as the separation of duties among the users. It
helps the task to be completed faster. A mutual
exclusive role is achieved to complete a particular set
of task. RBAC brings this advantage of time
management. the database is secured as well as the
data are given to the authorized people easily with
security.
c)Data abstraction- Data abstraction is a simple
concept of accessing the data whenever we want to
but with the permission of authorized people. It has
different modes to it.
STAFF + ACCOUNT + SALARY TYPE =
ACCOUNTS ADMINISTRATOR
NAME* STAFF ID* ADDRESS*
STAFF
ACCOUNT
ACC ID* AMT DEPOSIT*** STATUS**
ACCOUNTS
Administrator
75
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
ISBN : 378 - 26 - 138420 - 6
www.iaetsd.in
4. i)Public Mode- The access to the data by
any user of the domain, but limited to a particular
organization. This requires a common security where
only the users of the organization can access it.
ii)Private Mode- The access of the data is
limited only to the key user of that particular search
of interest. That is only the accountants can handle
the accounts of the organization and hence access to
that particular class is given only to that particular
user. A manager accessing the accounts of the
company will be denied from accessing it.
iii)Protected Mode- The user in that
particular domain and the senior user that is one or
maximum two users who has to write to access that
domain can access it with ease. Example only the
accountants and the chief of the company can check
the accounts of hat particular institution and make
changes in that. The others have no right to access
these without their permission. For the others the
domain remains in blocked state.
4. IMPLEMENTATION
RBAC is a complex system that involves a
strategic process prepared by an expertise. RBAC is
best implemented by applying a structured and
detailed procedure. The use of divide and rule
method is very essential to implement these process.
Each task or step is broken down into sub tasks for
the work and implementation to be easier and more
efficient. The steps involved are:
FIG 4.PROCESS
a)Develop Plans- To make best use of RBAC we can
develop and plan for the RBAC system into best
work in an organization or for a project's security of
data. Example to extract the maximum security from
RBAC a development plan including a project, etc.
should be developed along with the deadline , budget
etc.
b)Compile- This step involves the collection and
putting together of all data , files , projects, etc. so as
to identify the level of security needed to implement
it. Sensitivity of the attributes should be determined
so as to segregate and compile the system to one to
provide the highest security possible.
c)Define Roles- As we have discussed that operation
of database system is first best used only by the key
user or the important user of that organizer or a
system. Hence assigning a particular role to that
person for the easy access of the software to access
the data with ease and implement any kind of proper
change within the system.
d)Analyze- this is a main step for any kind of system
to know and to formulate RBAC. This would bring
about the betterment of the system so that the next
stage of implementation would be easier to execute.
Any changes needed in the system should be done in
this stage so that no further disputes arise at the later
stage.
e)Integrate- Before any problem occurs in the system
like system failure, we need to transfer each
application's security system to a centralized security
system so as to provide a secured companywide
information access. this would be the last step of the
process and would be the final stage without making
any changes.
e)Implement- To put forth whatever we have
executed these many steps without any errors or any
types of problems. These are the best ways to protect
a data from the external user.
Thus refining the system and protecting it
according to the steps followed would give a better
result. Always the principle of divide and rule
method is followed in RBAC which is the key
principle of the system.
5.PROCESS USING A FORMULAE
Each datum is a process streamline flow of
information which is guarded by security. These
syntaxes along with the formula help in the security
purpose. This formula was implemented in the Web
Based technology, now it is time to implement it in
Database to ensure its safety.
DEVELOP PLANS
COMPILE
DEFINE ROLES
ANALYSE
INTERGRATE
IMPLEMENT
76
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
ISBN : 378 - 26 - 138420 - 6
www.iaetsd.in
5. Syntax:
For the above E-R diagram of the process ,the
interaction between the staff salary and the account
we can create a formula based on the process.
The other way of representing it is to split the
process:
Where staff and the account have no
sensitivity and hence it's just an attribute of the
system, where as the other attribute- name, staff id,
phone, account, account id, amount deposited are the
inputs and the output is the status.
The two processes can be divided and then
later combined to form a single equation. If the
process needs to be changed or read or any other kind
of operations, they can be done by the given formula
which would be useful for the later run.
To calculate the sensitivity or to know the
sensitivity of the attributes, automatic capitalization
would be invoked to represent the highest sensitive
attributes in the given set of data or the formula
generated at the end of the process typed. The least
sensitive are given in small letters. The medium
sensitive might be in italic letters. The ones inside
brackets represents that it is a secured data and hence
it is the start of the process and that the data must be
protected fully. Hence we cannot find the sensitivity
of the attribute at the mid stage of the process. The
same process with a change to denote the sensitivity
is represented as :
The other way is:
P1=>| (staff)P| name(P).X | staff id(P).X | phone(P).X
P2=>| (account)P | account id(P).X | AMOUNT
DEPOSITED(P).X|STATUS(P).Y
P=>| P1||P2
Thus this formula would be easy for the
generation of large sets of data and to secure the data
and hence even if there is a small change in the
capitalization or the attributes or the brackets or any
syntax mistake there would be an error generated in
the system which would spoil the whole set of data.
This is done for just a small set of data. We can
proceed this for a huge one. An outsider seeing this
would not understand the type of data or the
importance of the data and hence would hesitate to
meddle with it.
6.CONCLUSION
Intrusion detection mechanism helps to
secure the data in an organization. In this paper we
have discussed in detail how the database could be
secured by using Role Based Access Control System.
The key benefits of RBAC are high efficiency and
low maintenance cost for any type of organization be
it big or small. Also RBAC system could be designed
and used to improve the operational performance and
strategic business value. This system could
streamline and automate any business procedures,
thus providing high/ better/ faster benefits to the user.
It also helps to maintain privacy and confidentially of
the employees in any organization. Thus we can
conclude that mission to protect any key business
process is a main vision of RBAC system in database
intrusion detection.
P=>0 no process
| P | P composition of the process
| O(P).X output value of the process, X is the
outcome.
| I(P).Y input value/ getting input from the
user of the process, Y is the input variable.
| !!I(P).Y repetition of the input variables.
P=> run the process
| D(P) main data or the attributes
| read(P) read the data or the attributes
| change(P) change the data or the attributes
P=>enable(R).D gives permission to R to
access a data
P=>disable(R)>D gives permission to R to
disable the data or remove or stop the process till R.
P=>| {(staff)P | name(P).X | staff id(P).X |
phone(P).X} || {(account)P | account id(P).X |
amount deposited(P).X | status(P).Y}
P1=>| (staff)P| name(P).X | staff id(P).X | phone(P).X
P2=>| (account)P | account id(P).X | amount
deposited(P).X | status(P) .Y
P=>| P1||P2
P=>| {(staff)P | name(P).X | staff id(P).X |
phone(P).X} || {(account)P | account id(P).X |
AMOUNT DEPOSITED(P).X | STATUS(P).Y}
77
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
ISBN : 378 - 26 - 138420 - 6
www.iaetsd.in
6. REFERENCES
[1] Intrusion detection database system with dynamic
threshold value By Khomlal sinha and Tripti Sharma
[2] Database Intrusion Detection using Weighted
Sequence Mining Abhinav Srivastava1, Shamik Sural1 and
A.K. Majumdar2
[3] J. Han, M. Kamber, Data Mining: Concepts and
Techniques, Morgan Kaufmann Publishers (2001).
[4] U. Fayyad, G. P. Shapiro, P. Smyth, The KDD Process
for Extracting Useful Knowledge from Volumes of Data,
Communications of the ACM, pp. 27-34 (1996).
[5] R. Bace, P. Mell, Intrusion Detection System, NIST
Special Publication on Intrusion Detection System (2001).
[6] A. Srivastava, S. Sural, A.K. Majumdar, Weighted
Intratransactional Rule Mining for Database Intrusion
Detection, Lecture Notes in Artificial Intelligence, Springer
Verlag, Proceedings of Pacific-Asia Conference in
Knowledge Discovery and Data Mining, pp. 611-620
(2006).
[7] W. Lee, S.J. Stolfo, Data Mining Approaches for
Intrusion Detection, Proceedings of the USENIX Security
Symposium, pp. 79-94 (1998).
[8] D. Barbara, J. Couto, S. Jajodia, N. Wu, ADAM: A
Testbed for Exploring the Use of Data Mining in Intrusion
Detection, ACM SIGMOD, pp. 15-24 (2001).
[7] C. Y. Chung, M. Gertz, K. Levitt, DEMIDS: A Misuse
Detection System for Database Systems, IFIP TC-11 WG
11.5 Working Conference on Integrity and Internal Control
in Information System, pp. 159-178 (1999).
[8] V.C.S. Lee, J.A. Stankovic, S.H. Son, Intrusion
Detection in Real-time Database Systems Via Time
Signatures, Real Time Technology and Application
Symposium, pp. 124 (2000).
[9] Intrusion detection database system with dynamic
threshold value By Khomlal sinha and Tripti Sharma
[10] Database Intrusion Detection using Weighted
Sequence Mining Abhinav Srivastava1, Shamik Sural1 and
A.K. Majumdar2
[11] S.Y. Lee, W.L. Low, P.Y. Wong, Learning
Fingerprints for a Database Intrusion Detection System,
Proceedings of the European Symposium on Research in
Computer Security,
pp. 264-280 (2002).
78
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
ISBN : 378 - 26 - 138420 - 6
www.iaetsd.in