On October 23rd, 2014, we updated our
By continuing to use LinkedIn’s SlideShare service, you agree to the revised terms, so please take a few minutes to review them.
FOR DATA SECURITY
Shivnandan Singh Chauhan
A database is an organized collection of data.
The data is typically organized to model relevant
aspects of reality in a way that supports
processes requiring this information.
A negative database can be defined as a
database that contains huge amount of data
which consists of counterfeit data along with the
A few approaches that describe this concept have
been proposed but have not yet been
implemented to work for real world databases.
DATABASE SECURITY IMPORTANCE
Database Security has become an important
issue in today’s world. Organizations have
become highly dependent on the database for
their daily operations.
The objective of database security is to prevent
undesired information disclosure and
modification of data while ensuring the
availability of the necessary service. With the
increase in the use of World Wide Web in recent
years emphasize the web database security.
In best of my knowledge database security are
classified based on the type of information security and
Web-based Database Security
Authentication and Access Control
Timeliness and Security in Real-time Database
Testing Schemes for SQL Injections
This is the process of transforming plain text
information using encryption algorithms (called
cipher) to make it unreadable to anyone except
those possessing special knowledge, usually
referred to as a key.
The traditional database systems using plain
text have many threats of data corruption and
collapse of database. To avoid these threats, the
data is stored in encrypted form in the database.
WEB-BASED DATABASE SECURITY
Some Methods are proposed to establish security
of Web database against illegitimate intrusion.
The data transmission from server to the client
should be in a secured way (use Secure Socket
Host identity of an end system should be
TESTING SCHEMES FOR SQL
SQL injection is a code injection technique that
exploits a security vulnerability occurring in the
database layer of an application.
TESTING SCHEME TO STOP SQL INJECTIONS
IN THE BEGINNING
Database Security Testing Scheme to detect
potential input points of SQL injection,
automatically generate test cases and find
vulnerability of databases by running these test
cases to make a simulation attack to an
CONCEPT OF NEGATIVE DATABASE TO
HELP PREVENT DATA THEFT
A framework which manipulates the original
data and stores it in a database. This framework
mainly consists of four modules
Virtual database encryption
Database Encryption algorithm
Negative Database conversion algorithm.
In our framework we are using system-derived
timestamps as keys. Thus the complexity of the
database caching algorithm O(n), when the whole
database needs to be searched for a particular
VIRTUAL DATABASE ENCRYPTION
This layer depends on the timestamp generation
and the conversion of the data into ASCII values.
Thus the computation time is O(n) where n is the
length of the used password.
AUTHENTICATION AND ACCESS
Authentication is used to check properly the
identity of the user and Access Control controls
the user actions or operations. Access Control
gives different privileges to different
Questions or Comments?