SECURITY CHALLENGES AND SOLUTIONS IN DBMS: A THEORETICAL ANALYSIS
ავტორი: Hassan Shah Khan, Abeer Mustufa, Asif Irshad
ორგანიზაცია: Ziauddin University
კატეგორია:
საკვანძო სიტყვები: Database, Database Management System, SQL Injection, Security, Vulnerabilities, Access Control, SIEM, Threats
აბსტრაქტი. Introduction Contemporary information systems such as Database Management Systems (DBMS) have become a need of an hour for managing and securing massive volume data which contains confidential, and valuable propositions. This paper provides a forensic discussion regarding various security issues and solutions but these will be focused on DBMS theoretically. It covers concerns hiding unauthorized access, avoiding data tampering and providing availability of your data focusing on the importance with robust security approaches like authentication, authorization encryption and auditing. These measures can be quite complex, with different DBMS platforms implementing them in their own ways to create a unique set of security challenges requiring targeted responses by organizations. This study therefore determines vulnerabilities being currently utilized and offers strong measures to heighten the security level of DBMS which is invaluably enriching considering advanced levels of safety techniques and models. The paper highlights the critical need to address these challenges in order to secure data assets, manage regulatory requirements and sustain organizational strength and continuity due to a digitally complexed interconnected environment.
ბიბლიოგრაფია
Wang, H. (2012) Security and Privacy for Database Systems. Proceedings of the Twenty-Third Australasian Database Conference (ADC 2012), Melbourne, 31 January-3 February 2012, 5-6. https://dl.acm.org/doi/10.5555/2483739.2483741
Thuraisingham, B. (2007) Security and Privacy for Multimedia Database Management Systems. Multimedia Tools and Applications, 33, 13-29. https://doi.org/10.1007/s11042-006-0096-1
Ferrari, E. and Thuraisingham, B. Security and Privacy for Web Databases and Services. https://www.researchgate.net/publication/221103213_Security_and_Privacy_for_Web_Databases_and_Services
Xueying Pan, Analysis of Database Security. https://www.scirp.org/pdf/oalibj_2024041214533910.pdf
Rivest, R.L., Shamir, A. and Adleman, L. (1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21, 120-126. https://doi.org/10.1145/359340.359342
He, J. and Wang, M. (2001) Cryptography and Relational Database Management Systems. Proceedings 2001 International Database Engineering and Applications Symposium, Washington DC, 16-18 July 2001, 273-284. https://dl.acm.org/doi/10.5555/646290.687060
Uma Maheswari, S. and Vasanthanayaki, C. (2019) Secure Medical Health Care Content Protection System (SMCPS) with Watermark Detection for Multi Cloud Computing Environment. Multimedia Tools and Applications, 79, 4075-4097. https://doi.org/10.1007/s11042-019-7724-z
Wang, H. (2020) - "The Role of AI in DBMS Security." A comprehensive analysis of AI's application in detecting and responding to database vulnerabilities. Source: ACM Digital Library. https://www.researchgate.net/publication/381004546_The_Role_of_Artificial_Intelligence_in_Enhancing_Data_Security
Karamacoski, J., Paunkoska, N., Marina, N. and Punčeva, M. (2019) Blockchain for Reliable and Secure Distributed Communication Channel. 2019 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology, Bali, 1-3 July 2019, 91-97. https://doi.org/10.1109/ICIAICT.2019.8784853
Sabrina Sicari, Alessandra Rizzardi. " Security&privacy issues and challenges in NoSQL databases”. http://www.dista.uninsubria.it/~alessandra.rizzardi/public/documents/2022_nosql.pdf
Lim, A. - "An Executive View of Key Cybersecurity Trends and Challenges Source: ISACA Journal. https://www.isaca.org/resources/news-and-trends/industry-news/2023/an-executive-view-of-key-cybersecurity-trends-and-challenges-in-2023
Zhang, Q. & Wang, L. (2023) - "Cryptography-based Security Mechanisms for Relational Databases." Focuses on encryption strategies to secure sensitive data in distributed DBMS environments. Source: IEEE Security & Privacy. https://www.researchgate.net/publication/355072594_Using_Blockchain_in_Cloud_Computing_to_Enhance_Relational_Database_Security
Bertino, E. (2006) Database Security in the Era of the Internet. Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, 2006, 670-671. https://www.researchgate.net/publication/3449351_Database_Security_-_Concepts_Approaches
Lunt, T.F. (1991) Database Security: A Survey. Proceedings of the 1991 ACM SIGMOD International Conference on Management of Data. https://www.researchgate.net/publication/220415483_Database_Security
Sandhu, R. "Security Architectures for Modern DBMS." A theoretical analysis of access control models and their applications in secure database systems. Source: ACM Computing Surveys16. https://profsandhu.com/journals/ieee-depend-dbsec-05.pdf
https://en.wikipedia.org/wiki/2017_Equifax_data_breach
https://digitalcommons.wcl.american.edu/aulr/vol66/iss5/3/
https://www.nist.gov/cyberframework/success-stories
Menu