Aravindharamanan et al., 2019

Legitimate Privilege Abuse and Data Security in Database

Type

Article

Year

2019

Authors

Aravindharamanan, S., Ramasubbareddy, S., Govinda, K.

Identifiers

Publication

Pages

175-181

Abstract

Data is fundamental in today’s digital life. Therefore, the essential need is to protect data from unauthorized users. Choosing a database application depends on cost. Business database is expensive to a great degree. This paper delineates database security utilizing true blue benefit manhandle and cryptography. There are numerous dangers in the database, which releases the data for the denied purpose. Among the fundamental dangers in database security, this paper will portray the true blue benefit abuse. Among the approaches to secure data from gatecrashers/assailants is by using cryptography techniques, the access-control approach is the primary imperative technique to secure database by using cryptography and row-level security.

Links

Citation

Aravindharamanan, S., Ramasubbareddy, S., Govinda, K., 2019. Legitimate Privilege Abuse and Data Security in Database. Saini H., Sayal R., Govardhan A., Buyya R. (eds) Innovations in Computer Science and Engineering. Lecture Notes in Networks and Systems 74, 14. https://doi.org/DOI: https://doi.org/10.1007/978-981-13-7082-3_22


Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.