SlideShare a Scribd company logo
1 of 4
Download to read offline
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3290-3293 (2017) ISSN: 0975-0290
3290
SECURE: An Ameliorated SQL Semiotic for
Security
Dr. Ajeet A. Chikkamannur
Department of Computer Science and Engineering, R. L. Jalappa Institute of Technology, Bangalore 561203, India
ac.ajeet@gmail.com
Dr. Shivanand M. Handigund
Department of Information Science and Engineering, Vemana Institute of Technology, Bangalore 560034, India
smhandigund@gmail.com
-------------------------------------------------------------------ABSTRACT--------------------------------------------------------------
The Information Systems, Databases are vital and critical in the arena of Business, Enterprise, Governance
etc., for the decision making. Further, the Information Systems are designed to reach maximum number of people
for interaction with system. This intent of system usage appears to be resourceful but the identification of reliable
users of system has challenged the technocrats
Most of the applications uses relational data base system (RDBMS) for the database support but with
intelligent exploitation of vulnerability in Structured Query Language (SQL) of RDBMS, the dishonest people are
interested in manipulation or processing of the data for business value reduction or damage
This paper attempts to endow with security to a relational database system by the inclusion of newly designed
semiotic to keyword SECURE into a lexicon of SQL. Then the semiotic is articulated in relational algebraic
expression for current query engine execution.
Keywords - Query, Security, Relation, Set Difference, Semiotic
-------------------------------------------------------------------------------------------------------------------------
Date of Submission: June 02, 2017 Date of Acceptance: June 16, 2017
-------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Any business organization keeps a purpose of attracting
the various populaces for their business services. To
support this desirability, the information systems like Web
Technology etc. are used for design a system to reach
maximum number of populace for interaction. This intent
of system usage is admirable but the identification of
reliable users of system has hardened the aptitude of
developers in a development of information systems.
Among the user, the dishonest community exercise, spoil
and ruin the value of information. Hence, the
technological convene we observed is that how to make
available the right information to a right person?
Currently, many contemporary information systems are
designed with a database support. The data of databases
are vital and decisive in the arena of Business, Enterprise,
Governance etc., for various analysis. But, with a smart
exploitation of vulnerability in a database system, the
dishonest people are manipulating or processing the data
for value reduction or damage. This is another technical
apprehensive activity in a database? Hence, it is time to re-
inspect or reengineer the core database system design in
purview of security, which causes the clout to the system.
This paper tries to provide security to a relational database
by the blend of innovatively intended semiotic i.e. syntax,
semantics and pragmatics into a lexicon of Structured
Query Language (SQL). Then the semiotic is translated to
the relational algebraic expression for practical query
engine execution.
II. BACKGROUND
The relational database model is developed by Codd [7, 8].
Most of the applications are using the relational database
for their data storage and retrieval. The Structured Query
Language (SQL) is designed and developed to access the
Relational Database. In relational database, the security to
multiple users is given by the Database Administrator
depending on the access privilege of users i.e. GRANT
privileges. At early stages, the relational model is subject
for a centralized computer system. But over a period of
time the evolution in the technology viz., client-server,
distributed computing, cloud computing etc. have used the
SQL carefully in many applications by several deviation in
the database system.
Currently, the web applications with database are
developed for multi consumers to operate the database.
These multi loggers may belong to legitimate or
illegitimate type. The recognition of reliable and
trustworthy users of web technology is a herculean task for
proviso of accessing the relational database. On ignorance
of recognition, the dishonest populace tries to damage or
use the database to ruin the business value of an
organization.
Though the security is provided by the pragmatic
relational database systems, the hackers of the system are
enjoying with the SQL injection vulnerability [5, 6].
Though many security solutions are provided to a database
but in literature, we have not observed the effort in the
arena of broadening the lexicon of the SQL. Hence, the
semiotic of SQL, has to be reengineered or broaden for
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3290-3293 (2017) ISSN: 0975-0290
3291
security point of view with addition of new word(s).
Further, we have observed that most of the work of
security on relational database is carried in middleware
without ameliorating the basic semiotic of language.
Various ways of broadening the base of SQL can be
referred in [1, 2, 3, 4] where the limitation of language
phrase is broadened or expanded.
III. FRAME WORK
This paper proposes a formula of securing the relational
database. The formula is underpinned with the second
principle of information technology; “the right
information is given to the right person”. The study on a
statement discloses in a two practical measurements i.e.
“right information’, “right person”. These practical
measurements are to be ensured to facilitate the multi user
systems in an efficient and secured way. Hence, we
consider the quantum of data stipulation to an end user for
security i.e. the quantization is enumerated on the amount
of data retrieval through a SQL query.
The unlawful users’ curiosity is that they use SQL
semiotics for accessing the entire data of a database. This
is our observed trace of vulnerability of unauthorized user
where the user tries to access the irrelevant data. With
superfluous information and/or logical query (ies)
combinations, they exploit the database for gaining the
control of system. The SELECT, FROM and WHERE,
query semiotic of SQL is logically used for accessing the
database. Hence, this semiotic is ameliorated to resolve the
drawback by defining further distinctiveness to a relation.
Hence, to protect a relation of relational database, the
keyword SECURE is proposed to the lexicon of SQL.
Like use of keyword PRIMARYKEY for elimination of
duplication of values in a relation, the keyword SECURE
is added to the Data Definition Language (DDL) of SQL
for the protection of relation in threefold viz., secure at
table level, secure at column level and secure at row level.
The SECURE table name differentiates that the content of
entire table is non-visible i.e. out of sight to user. The
SECURE column name or tuple are designed to protect the
column name contents or row values by the non-display of
data belonging to the specified column or tuple. Since
contents are not put on show, for the reliable users the data
corroboration is ensured by returning the true condition.
Further, the query with convened character ‘*” in SQL
semiotic is blocked to carry out on SECURED relation.
The proposed semiotic for SECURE keyword is given
below
SECURE [table_name | attribute | primary key value];
The semiotic is used to SECURE the table, attribute or
tuple depending on the application requirement. The
secured table_name, attribute or tuple is stored in the
metadata. Before executing the SQL query given by the
user, the table_name, attributes or tuple specified in the
query are verified with the meta data contents. For regular
condition i.e. tables, attributes or tuples without security
are executed with existing process of execution. On secure
condition; the following functionalities are to be carried
out depending on the secure semiotic expression.
CASE 1: User needs to secure the contents of entire
table. The designer has to utilize the below semiotic for a
relation definition in a relational database. This causes the
non-visibility of entire table contents on access. Further
the SQL query with meta character ‘*” is disabled for
execution on the table.
SECURE table_name;
On expression of a query, the table name specified is
appended with word “security”. This is stored in a meta
data for further utilization. Any SQL query expressed in a
relational algebraic form is implemented and executed on
SQL compiler. Hence, on encountering the secured
relation name in the SQL query, the routine semiotic of
SELECT, FROM, WHERE execution is ameliorated to a
following relational algebraic expression.
Result =  <condition> <table name>   1<table name>
CASE 2: User needs to secure the particular column’s
content. The proposed designed semiotic of a query is
given below
SECURE attribute;
The below semiotic is designed to disable the visibility of
the entire column content on access. Again the meta
character ‘*’, expression in SQL is prevented for
execution in query engine. The relational algebraic form of
query execution is;
Result =  <condition> <table name>  2 <attribute> <table
name>
CASE 3: User needs to secure the particular row
content. The designed semiotic of query is given below;
SECURE primary key value;
This semiotic is designed to secure the row of relation for
non access i.e. the particular row is not visible to the user.
In this case the primary key value of particular row is to be
specified. The relational algebraic form of query execution
is given below;
Result =  <condition> <table name>  3 <primary key
attribute = value> <table name>
IV. CASE STUDY
To demonstrate the execution of designed semiotic of
query, the relation MYTABLE is constituted with some
data values. Most of the applications are using this table
for authentication of user in web application.
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3290-3293 (2017) ISSN: 0975-0290
3292
MYTABLE
UID PASSWORD
abc@org.com Abc
lmn@org.com Lmn
ijk@org.com Ijk
xyz@org.com Xyz
The pragmatic SQL semiotic allows routine queries like
SELECT * FROM MYTABLE, SELECT * FROM
MYTABLE WHERE UID= “ “. The unrelated users
access the data values from a table with vulnerability in
such query expression [5, 6]. The exploitation of query
leads to confidentiality destruction of a data. Our approach
works in the following way;
CASE 1: Entire table is secured. The entire table is
secured with execution of following steps.
Step1: The table name MYTABLE is to be secured for
non access. Hence, the following semiotic is used
SECURE MYTABLE;
The table name MYTABLE is appended with secure
keyword and stored in the metadata for executing ensuing
steps. Any retrieval access on table initially execute the
below relational algebraic expression query.
 1<MYTABLE>;
Step2: The result of the step1 execution is
UID PASSWORD
abc@org.com Abc
lmn@org.com Lmn
ijk@org.com Ijk
xyz@org.com Xyz
Step 3: The unauthorized user of this table attempts the
following query
SELECT * FROM MYTABLE:
The relational algebraic form this query is;
 <MYTABLE>;
Step 4: The result of step 3 execution is;
UID PASSWORD
abc@org.com Abc
lmn@org.com Lmn
ijk@org.com Ijk
xyz@org.com Xyz
Step 5: Here the ameliorated relational algebraic
expression is executed on the table
Result =  <condition> <table name>   1<table name>
This is executed with set difference operation among the
results of step 2 and 4.
Result = {step 4 values} – {Step 2 values}
= NULL
Hence, the content of table is displayed as NULL.
CASE 2: The attribute of table is secured. The attribute
of a table is secured by the execution of following steps.
Step 1: The PASSWORD attribute of a table is secured by
the following semiotic
SECURE PASSWORD;
Step 2: On encountering the secure tag with PASSWORD
attribute the following relational algebraic operation is
executed
 1<PASSWORD> <MYTABLE>
The result of this step is given below
PASSWORD
Abc
Lmn
Ijk
Xyz
Step 3: Suppose the following is attempted to execute
SELECT UID, PASSWORD
FROM MYTABLE;
The result of this step will yield the following on regular
query
UID PASSWORD
abc@org.com Abc
lmn@org.com Lmn
ijk@org.com Ijk
xyz@org.com Xyz
Step 4: Since the attribute PASSWORD is designated as
secured attribute the following algebraic expression is
executed.
Result =  <MYTABLE>  2 <PASSWORD>
<MYTABLE>
This is executed with a set difference operation on
resulting values of step 3 and step2. The order is strictly
tracked to shun the confusion. On completion of this step
gives the following result
UID
abc@org.com
lmn@org.com
ijk@org.com
xyz@org.com
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3290-3293 (2017) ISSN: 0975-0290
3293
The column PASSWORD contents are unseen by the users
CASE 3: The particular row value is secured. The
following steps are executed.
Step1: The relation is constituted with one of its attribute
value as primary key. Here, we will consider the
PASSWORD attribute as primary key attribute. Now the
row pertaining to “Abc” is to be secured. So the following
semiotic is used to define it as secured.
SECURE “Abc”;
Step 2: On encountering the SECURE tag with
PASSWORD attribute’s value “Abc”, the following
relational algebraic expression is executed
3 <PASSWORD = “Abc”> <MYTABLE>
The resulting values are depicted below;
UID PASSWORD
abc@org.com Abc
Step 3: Suppose the following routine query is executed
by the user
SELECT *
FROM MYTABLE
WHERE PASSWORD =”Abc”;
This step will yield the following
UID PASSWORD
abc@org.com Abc
Step 4: since the primary key value “Abc” is appended
with SECURE keyword the following ameliorated
algebraic expression is executed for the final result
Result =  <MYTABLE>  3 <PASSWORD = “Abc” >
<MYTABLE>
Here the set difference operator is applied among values
of step 3 and step 2. This order is strictly followed for
avoid the ambiguity. This step results in following values.
UID PASSWORD
lmn@org.com Lmn
ijk@org.com Ijk
xyz@org.com Xyz
The row with primary key value “Abc” is unseen by the
user.
V. CONCLUSION
The work carried out in this paper is including the
semiotic for the new keyword SECURE at the level of
table, attribute and tuple of the relation in Relational
Database Management System. The designed semiotic
appends the keyword “secure” with table, attribute or tuple
depending on semiotic use and stores in metadata.
On encountering the appended keyword, the semiotic
is disabling the execution of meta character ‘*” from SQL
query and only the specific information is provided
depending on the level of security on relation i.e.
irrelevant data is made invisible
Further, the work is to be extended for the provision
of data for reliable users.
REFERENCE
[1] Ajeet Chikkamannur, “Design of Fourth Generation
Language with Blend of Structured Query Language
and Japanese Basic English”, Ph.D. thesis,
Visvesvarya Technological University Belgaum, 2013
[2] Ajeet Chikkamannur, Shivanand Handigund, “A
Concoct Semiotic for Recursion in SQL”,
International Journal of Emerging Trends &
Technology in Computer Science (IJETTCS), ISSN:
2278-6856, Vol. 2, Issue 3, page 204-210, June 2013
[3] Ajeet Chikkamannur, Shivanand Handigund,
“Automated Methodology to Reduce the Redundancy
in Relational Database”, Elixir Comp. Science. &
Engineering 61, ISSN: 2229-712X, page 16946-
16949, August, 2013
[4] Ajeet Chikkamannur, Shivanand Handigund, “An
Ameliorated Methodology for Ranking the Tuple”
International Journal of Computers and
Technology(IJCT), Vol 14, No. 4, pp 5616-5620,
January 2015
[5] Amit Chaturvedi et al, “Analysis of SQL Injections
Attacks and Vulnerabilities”, International Journal of
Advanced Research in Computer Science and
Software Engineering ,Volume 6, Issue 3, 2016
[6] Atefeh Tajpour et al, “SQL Injection Detection and
Prevention Techniques” International Journal of
Advancements in Computing Technology, Vol 3, Issue
7, pp 82-91, DOI: 10.4156/ijact.vol3.issue7.11, 2011
[7] C. J. Date, A. Kannan, S. Swaminathan, “An
Introduction to Database Systems”, 8th
Edition,
Pearson Education (Dorling Kindersley (India) Pvt.
Ltd.), 2008.
[8] E.F. Codd, "A Relational Model of Data for Large
Shared Data Banks", Comm. ACM 12 (6), page 377-
387, 1970

More Related Content

What's hot

Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...IRJET Journal
 
Sensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaSSensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaSKAMLESH HINGWE
 
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...IJCERT JOURNAL
 
MicroStrategy interoperability with Greenplum
MicroStrategy interoperability with GreenplumMicroStrategy interoperability with Greenplum
MicroStrategy interoperability with GreenplumBiBoard.Org
 
Expert Systems
Expert SystemsExpert Systems
Expert Systemsnvtagle
 
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...1crore projects
 
TECHNIQUES FOR COMPONENT REUSABLE APPROACH
TECHNIQUES FOR COMPONENT REUSABLE APPROACHTECHNIQUES FOR COMPONENT REUSABLE APPROACH
TECHNIQUES FOR COMPONENT REUSABLE APPROACHcscpconf
 
Approximating Source Accuracy Using Dublicate Records in Da-ta Integration
Approximating Source Accuracy Using Dublicate Records in Da-ta IntegrationApproximating Source Accuracy Using Dublicate Records in Da-ta Integration
Approximating Source Accuracy Using Dublicate Records in Da-ta IntegrationIOSR Journals
 
Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Editor IJCATR
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous databaseeSAT Publishing House
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous databaseeSAT Journals
 
Case Study 1 (Autosaved)
Case Study 1 (Autosaved)Case Study 1 (Autosaved)
Case Study 1 (Autosaved)Makia Lucas
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET Journal
 
Study on Theoretical Aspects of Virtual Data Integration and its Applications
Study on Theoretical Aspects of Virtual Data Integration and its ApplicationsStudy on Theoretical Aspects of Virtual Data Integration and its Applications
Study on Theoretical Aspects of Virtual Data Integration and its ApplicationsIJERA Editor
 
Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...
Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...
Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...ijcsta
 

What's hot (19)

Bq36404412
Bq36404412Bq36404412
Bq36404412
 
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
 
Sensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaSSensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaS
 
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
 
MicroStrategy interoperability with Greenplum
MicroStrategy interoperability with GreenplumMicroStrategy interoperability with Greenplum
MicroStrategy interoperability with Greenplum
 
Expert Systems
Expert SystemsExpert Systems
Expert Systems
 
[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi
[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi
[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi
 
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
 
B045041114
B045041114B045041114
B045041114
 
TECHNIQUES FOR COMPONENT REUSABLE APPROACH
TECHNIQUES FOR COMPONENT REUSABLE APPROACHTECHNIQUES FOR COMPONENT REUSABLE APPROACH
TECHNIQUES FOR COMPONENT REUSABLE APPROACH
 
Approximating Source Accuracy Using Dublicate Records in Da-ta Integration
Approximating Source Accuracy Using Dublicate Records in Da-ta IntegrationApproximating Source Accuracy Using Dublicate Records in Da-ta Integration
Approximating Source Accuracy Using Dublicate Records in Da-ta Integration
 
Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous database
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous database
 
Case Study 1 (Autosaved)
Case Study 1 (Autosaved)Case Study 1 (Autosaved)
Case Study 1 (Autosaved)
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
 
Study on Theoretical Aspects of Virtual Data Integration and its Applications
Study on Theoretical Aspects of Virtual Data Integration and its ApplicationsStudy on Theoretical Aspects of Virtual Data Integration and its Applications
Study on Theoretical Aspects of Virtual Data Integration and its Applications
 
Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...
Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...
Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...
 
Paper2
Paper2Paper2
Paper2
 

Similar to SECURE: An Ameliorated SQL Semiotic for Security

Major relational database platforms available at the moment microsoft
Major relational database platforms available at the moment microsoftMajor relational database platforms available at the moment microsoft
Major relational database platforms available at the moment microsoftMy-Writing-Expert.org
 
Prevention of SQL injection in E- Commerce
Prevention of SQL injection in E- CommercePrevention of SQL injection in E- Commerce
Prevention of SQL injection in E- Commerceijceronline
 
Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksAuthentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksEditor IJCATR
 
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET Journal
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET Journal
 
Sql interview question part 12
Sql interview question part 12Sql interview question part 12
Sql interview question part 12kaashiv1
 
Sql interview question part 12
Sql interview question part 12Sql interview question part 12
Sql interview question part 12kaashiv1
 
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...IRJET Journal
 
IRJET- Priviledge Level Attribute Based Encryption Policy for Big Data Ac...
IRJET-  	  Priviledge Level Attribute Based Encryption Policy for Big Data Ac...IRJET-  	  Priviledge Level Attribute Based Encryption Policy for Big Data Ac...
IRJET- Priviledge Level Attribute Based Encryption Policy for Big Data Ac...IRJET Journal
 
Multikeyword Hunt on Progressive Graphs
Multikeyword Hunt on Progressive GraphsMultikeyword Hunt on Progressive Graphs
Multikeyword Hunt on Progressive GraphsIRJET Journal
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.pptCNSHacking
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.pptLokeshK66
 
Database security
Database securityDatabase security
Database securityCAS
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
 
Security vulnerabilities related to web-based data
Security vulnerabilities related to web-based dataSecurity vulnerabilities related to web-based data
Security vulnerabilities related to web-based dataTELKOMNIKA JOURNAL
 

Similar to SECURE: An Ameliorated SQL Semiotic for Security (20)

Major relational database platforms available at the moment microsoft
Major relational database platforms available at the moment microsoftMajor relational database platforms available at the moment microsoft
Major relational database platforms available at the moment microsoft
 
Prevention of SQL injection in E- Commerce
Prevention of SQL injection in E- CommercePrevention of SQL injection in E- Commerce
Prevention of SQL injection in E- Commerce
 
SQL Injection - Newsletter
SQL Injection - NewsletterSQL Injection - Newsletter
SQL Injection - Newsletter
 
Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksAuthentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
 
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
 
Sql interview question part 12
Sql interview question part 12Sql interview question part 12
Sql interview question part 12
 
Ebook12
Ebook12Ebook12
Ebook12
 
Sql interview question part 12
Sql interview question part 12Sql interview question part 12
Sql interview question part 12
 
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
 
IRJET- Priviledge Level Attribute Based Encryption Policy for Big Data Ac...
IRJET-  	  Priviledge Level Attribute Based Encryption Policy for Big Data Ac...IRJET-  	  Priviledge Level Attribute Based Encryption Policy for Big Data Ac...
IRJET- Priviledge Level Attribute Based Encryption Policy for Big Data Ac...
 
Multikeyword Hunt on Progressive Graphs
Multikeyword Hunt on Progressive GraphsMultikeyword Hunt on Progressive Graphs
Multikeyword Hunt on Progressive Graphs
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.ppt
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.ppt
 
Database security
Database securityDatabase security
Database security
 
Sql security
Sql securitySql security
Sql security
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
Security vulnerabilities related to web-based data
Security vulnerabilities related to web-based dataSecurity vulnerabilities related to web-based data
Security vulnerabilities related to web-based data
 
Database concepts
Database conceptsDatabase concepts
Database concepts
 
Web application security
Web application securityWeb application security
Web application security
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiRaviKumarDaparthi
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 

Recently uploaded (20)

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 

SECURE: An Ameliorated SQL Semiotic for Security

  • 1. Int. J. Advanced Networking and Applications Volume: 08 Issue: 06 Pages: 3290-3293 (2017) ISSN: 0975-0290 3290 SECURE: An Ameliorated SQL Semiotic for Security Dr. Ajeet A. Chikkamannur Department of Computer Science and Engineering, R. L. Jalappa Institute of Technology, Bangalore 561203, India ac.ajeet@gmail.com Dr. Shivanand M. Handigund Department of Information Science and Engineering, Vemana Institute of Technology, Bangalore 560034, India smhandigund@gmail.com -------------------------------------------------------------------ABSTRACT-------------------------------------------------------------- The Information Systems, Databases are vital and critical in the arena of Business, Enterprise, Governance etc., for the decision making. Further, the Information Systems are designed to reach maximum number of people for interaction with system. This intent of system usage appears to be resourceful but the identification of reliable users of system has challenged the technocrats Most of the applications uses relational data base system (RDBMS) for the database support but with intelligent exploitation of vulnerability in Structured Query Language (SQL) of RDBMS, the dishonest people are interested in manipulation or processing of the data for business value reduction or damage This paper attempts to endow with security to a relational database system by the inclusion of newly designed semiotic to keyword SECURE into a lexicon of SQL. Then the semiotic is articulated in relational algebraic expression for current query engine execution. Keywords - Query, Security, Relation, Set Difference, Semiotic ------------------------------------------------------------------------------------------------------------------------- Date of Submission: June 02, 2017 Date of Acceptance: June 16, 2017 ------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Any business organization keeps a purpose of attracting the various populaces for their business services. To support this desirability, the information systems like Web Technology etc. are used for design a system to reach maximum number of populace for interaction. This intent of system usage is admirable but the identification of reliable users of system has hardened the aptitude of developers in a development of information systems. Among the user, the dishonest community exercise, spoil and ruin the value of information. Hence, the technological convene we observed is that how to make available the right information to a right person? Currently, many contemporary information systems are designed with a database support. The data of databases are vital and decisive in the arena of Business, Enterprise, Governance etc., for various analysis. But, with a smart exploitation of vulnerability in a database system, the dishonest people are manipulating or processing the data for value reduction or damage. This is another technical apprehensive activity in a database? Hence, it is time to re- inspect or reengineer the core database system design in purview of security, which causes the clout to the system. This paper tries to provide security to a relational database by the blend of innovatively intended semiotic i.e. syntax, semantics and pragmatics into a lexicon of Structured Query Language (SQL). Then the semiotic is translated to the relational algebraic expression for practical query engine execution. II. BACKGROUND The relational database model is developed by Codd [7, 8]. Most of the applications are using the relational database for their data storage and retrieval. The Structured Query Language (SQL) is designed and developed to access the Relational Database. In relational database, the security to multiple users is given by the Database Administrator depending on the access privilege of users i.e. GRANT privileges. At early stages, the relational model is subject for a centralized computer system. But over a period of time the evolution in the technology viz., client-server, distributed computing, cloud computing etc. have used the SQL carefully in many applications by several deviation in the database system. Currently, the web applications with database are developed for multi consumers to operate the database. These multi loggers may belong to legitimate or illegitimate type. The recognition of reliable and trustworthy users of web technology is a herculean task for proviso of accessing the relational database. On ignorance of recognition, the dishonest populace tries to damage or use the database to ruin the business value of an organization. Though the security is provided by the pragmatic relational database systems, the hackers of the system are enjoying with the SQL injection vulnerability [5, 6]. Though many security solutions are provided to a database but in literature, we have not observed the effort in the arena of broadening the lexicon of the SQL. Hence, the semiotic of SQL, has to be reengineered or broaden for
  • 2. Int. J. Advanced Networking and Applications Volume: 08 Issue: 06 Pages: 3290-3293 (2017) ISSN: 0975-0290 3291 security point of view with addition of new word(s). Further, we have observed that most of the work of security on relational database is carried in middleware without ameliorating the basic semiotic of language. Various ways of broadening the base of SQL can be referred in [1, 2, 3, 4] where the limitation of language phrase is broadened or expanded. III. FRAME WORK This paper proposes a formula of securing the relational database. The formula is underpinned with the second principle of information technology; “the right information is given to the right person”. The study on a statement discloses in a two practical measurements i.e. “right information’, “right person”. These practical measurements are to be ensured to facilitate the multi user systems in an efficient and secured way. Hence, we consider the quantum of data stipulation to an end user for security i.e. the quantization is enumerated on the amount of data retrieval through a SQL query. The unlawful users’ curiosity is that they use SQL semiotics for accessing the entire data of a database. This is our observed trace of vulnerability of unauthorized user where the user tries to access the irrelevant data. With superfluous information and/or logical query (ies) combinations, they exploit the database for gaining the control of system. The SELECT, FROM and WHERE, query semiotic of SQL is logically used for accessing the database. Hence, this semiotic is ameliorated to resolve the drawback by defining further distinctiveness to a relation. Hence, to protect a relation of relational database, the keyword SECURE is proposed to the lexicon of SQL. Like use of keyword PRIMARYKEY for elimination of duplication of values in a relation, the keyword SECURE is added to the Data Definition Language (DDL) of SQL for the protection of relation in threefold viz., secure at table level, secure at column level and secure at row level. The SECURE table name differentiates that the content of entire table is non-visible i.e. out of sight to user. The SECURE column name or tuple are designed to protect the column name contents or row values by the non-display of data belonging to the specified column or tuple. Since contents are not put on show, for the reliable users the data corroboration is ensured by returning the true condition. Further, the query with convened character ‘*” in SQL semiotic is blocked to carry out on SECURED relation. The proposed semiotic for SECURE keyword is given below SECURE [table_name | attribute | primary key value]; The semiotic is used to SECURE the table, attribute or tuple depending on the application requirement. The secured table_name, attribute or tuple is stored in the metadata. Before executing the SQL query given by the user, the table_name, attributes or tuple specified in the query are verified with the meta data contents. For regular condition i.e. tables, attributes or tuples without security are executed with existing process of execution. On secure condition; the following functionalities are to be carried out depending on the secure semiotic expression. CASE 1: User needs to secure the contents of entire table. The designer has to utilize the below semiotic for a relation definition in a relational database. This causes the non-visibility of entire table contents on access. Further the SQL query with meta character ‘*” is disabled for execution on the table. SECURE table_name; On expression of a query, the table name specified is appended with word “security”. This is stored in a meta data for further utilization. Any SQL query expressed in a relational algebraic form is implemented and executed on SQL compiler. Hence, on encountering the secured relation name in the SQL query, the routine semiotic of SELECT, FROM, WHERE execution is ameliorated to a following relational algebraic expression. Result =  <condition> <table name>   1<table name> CASE 2: User needs to secure the particular column’s content. The proposed designed semiotic of a query is given below SECURE attribute; The below semiotic is designed to disable the visibility of the entire column content on access. Again the meta character ‘*’, expression in SQL is prevented for execution in query engine. The relational algebraic form of query execution is; Result =  <condition> <table name>  2 <attribute> <table name> CASE 3: User needs to secure the particular row content. The designed semiotic of query is given below; SECURE primary key value; This semiotic is designed to secure the row of relation for non access i.e. the particular row is not visible to the user. In this case the primary key value of particular row is to be specified. The relational algebraic form of query execution is given below; Result =  <condition> <table name>  3 <primary key attribute = value> <table name> IV. CASE STUDY To demonstrate the execution of designed semiotic of query, the relation MYTABLE is constituted with some data values. Most of the applications are using this table for authentication of user in web application.
  • 3. Int. J. Advanced Networking and Applications Volume: 08 Issue: 06 Pages: 3290-3293 (2017) ISSN: 0975-0290 3292 MYTABLE UID PASSWORD abc@org.com Abc lmn@org.com Lmn ijk@org.com Ijk xyz@org.com Xyz The pragmatic SQL semiotic allows routine queries like SELECT * FROM MYTABLE, SELECT * FROM MYTABLE WHERE UID= “ “. The unrelated users access the data values from a table with vulnerability in such query expression [5, 6]. The exploitation of query leads to confidentiality destruction of a data. Our approach works in the following way; CASE 1: Entire table is secured. The entire table is secured with execution of following steps. Step1: The table name MYTABLE is to be secured for non access. Hence, the following semiotic is used SECURE MYTABLE; The table name MYTABLE is appended with secure keyword and stored in the metadata for executing ensuing steps. Any retrieval access on table initially execute the below relational algebraic expression query.  1<MYTABLE>; Step2: The result of the step1 execution is UID PASSWORD abc@org.com Abc lmn@org.com Lmn ijk@org.com Ijk xyz@org.com Xyz Step 3: The unauthorized user of this table attempts the following query SELECT * FROM MYTABLE: The relational algebraic form this query is;  <MYTABLE>; Step 4: The result of step 3 execution is; UID PASSWORD abc@org.com Abc lmn@org.com Lmn ijk@org.com Ijk xyz@org.com Xyz Step 5: Here the ameliorated relational algebraic expression is executed on the table Result =  <condition> <table name>   1<table name> This is executed with set difference operation among the results of step 2 and 4. Result = {step 4 values} – {Step 2 values} = NULL Hence, the content of table is displayed as NULL. CASE 2: The attribute of table is secured. The attribute of a table is secured by the execution of following steps. Step 1: The PASSWORD attribute of a table is secured by the following semiotic SECURE PASSWORD; Step 2: On encountering the secure tag with PASSWORD attribute the following relational algebraic operation is executed  1<PASSWORD> <MYTABLE> The result of this step is given below PASSWORD Abc Lmn Ijk Xyz Step 3: Suppose the following is attempted to execute SELECT UID, PASSWORD FROM MYTABLE; The result of this step will yield the following on regular query UID PASSWORD abc@org.com Abc lmn@org.com Lmn ijk@org.com Ijk xyz@org.com Xyz Step 4: Since the attribute PASSWORD is designated as secured attribute the following algebraic expression is executed. Result =  <MYTABLE>  2 <PASSWORD> <MYTABLE> This is executed with a set difference operation on resulting values of step 3 and step2. The order is strictly tracked to shun the confusion. On completion of this step gives the following result UID abc@org.com lmn@org.com ijk@org.com xyz@org.com
  • 4. Int. J. Advanced Networking and Applications Volume: 08 Issue: 06 Pages: 3290-3293 (2017) ISSN: 0975-0290 3293 The column PASSWORD contents are unseen by the users CASE 3: The particular row value is secured. The following steps are executed. Step1: The relation is constituted with one of its attribute value as primary key. Here, we will consider the PASSWORD attribute as primary key attribute. Now the row pertaining to “Abc” is to be secured. So the following semiotic is used to define it as secured. SECURE “Abc”; Step 2: On encountering the SECURE tag with PASSWORD attribute’s value “Abc”, the following relational algebraic expression is executed 3 <PASSWORD = “Abc”> <MYTABLE> The resulting values are depicted below; UID PASSWORD abc@org.com Abc Step 3: Suppose the following routine query is executed by the user SELECT * FROM MYTABLE WHERE PASSWORD =”Abc”; This step will yield the following UID PASSWORD abc@org.com Abc Step 4: since the primary key value “Abc” is appended with SECURE keyword the following ameliorated algebraic expression is executed for the final result Result =  <MYTABLE>  3 <PASSWORD = “Abc” > <MYTABLE> Here the set difference operator is applied among values of step 3 and step 2. This order is strictly followed for avoid the ambiguity. This step results in following values. UID PASSWORD lmn@org.com Lmn ijk@org.com Ijk xyz@org.com Xyz The row with primary key value “Abc” is unseen by the user. V. CONCLUSION The work carried out in this paper is including the semiotic for the new keyword SECURE at the level of table, attribute and tuple of the relation in Relational Database Management System. The designed semiotic appends the keyword “secure” with table, attribute or tuple depending on semiotic use and stores in metadata. On encountering the appended keyword, the semiotic is disabling the execution of meta character ‘*” from SQL query and only the specific information is provided depending on the level of security on relation i.e. irrelevant data is made invisible Further, the work is to be extended for the provision of data for reliable users. REFERENCE [1] Ajeet Chikkamannur, “Design of Fourth Generation Language with Blend of Structured Query Language and Japanese Basic English”, Ph.D. thesis, Visvesvarya Technological University Belgaum, 2013 [2] Ajeet Chikkamannur, Shivanand Handigund, “A Concoct Semiotic for Recursion in SQL”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), ISSN: 2278-6856, Vol. 2, Issue 3, page 204-210, June 2013 [3] Ajeet Chikkamannur, Shivanand Handigund, “Automated Methodology to Reduce the Redundancy in Relational Database”, Elixir Comp. Science. & Engineering 61, ISSN: 2229-712X, page 16946- 16949, August, 2013 [4] Ajeet Chikkamannur, Shivanand Handigund, “An Ameliorated Methodology for Ranking the Tuple” International Journal of Computers and Technology(IJCT), Vol 14, No. 4, pp 5616-5620, January 2015 [5] Amit Chaturvedi et al, “Analysis of SQL Injections Attacks and Vulnerabilities”, International Journal of Advanced Research in Computer Science and Software Engineering ,Volume 6, Issue 3, 2016 [6] Atefeh Tajpour et al, “SQL Injection Detection and Prevention Techniques” International Journal of Advancements in Computing Technology, Vol 3, Issue 7, pp 82-91, DOI: 10.4156/ijact.vol3.issue7.11, 2011 [7] C. J. Date, A. Kannan, S. Swaminathan, “An Introduction to Database Systems”, 8th Edition, Pearson Education (Dorling Kindersley (India) Pvt. Ltd.), 2008. [8] E.F. Codd, "A Relational Model of Data for Large Shared Data Banks", Comm. ACM 12 (6), page 377- 387, 1970