SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 227 - 229
______________________________________________________________________________________
227
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Safeguarding Data Privacy by Placing Multi-level Access Restrictions
Lakshmi Bhaskarla1
Asst. Professor,
Department of Computer Applications,
V.R.S.E.C, Vijayawada -7,
Andhra Pradesh, India
Abstract: People always tend to protect assets regardless of what they are. For example, a user may keep a memorable picture of his parents in a
safe place. However, the degree of protection he provides is directly based on how much he values the assets. If the user highly value the picture
of his great-grandparents, he might take an extra measure of precaution by copying it and placing it in a fireproof safe where it is guarded from
most natural disasters and from theft, or he may just put it in a frame because he has many similar pictures or because he can reproduce it. Usage
of Database management systems to store information in every aspect of an enterprise is rapidly growing. Every company need to protect all
tangible assets like valuable information stored in a DBMS is often vital to the business interests of the organization and is regarded as a
corporate asset of the company that must be protected. There is no doubt that a password is the key to opening a user account. The Stronger the
password, the longer it takes a hacker to break in. User authentication depends on a password to ensure the user account’s identity. Since
organizations increase their implementation of database systems as the key data management technology for regular operations and decision
making, the security of data managed by these systems is an important task.
Keywords: Database Security Methodology, Data Confidentiality, Data Integrity, Data Secrecy, Password Policies
__________________________________________________*****_________________________________________________
I INTRODUCTION
All organizations, may suffer heavy losses from both
financial and human points of view as a consequence of
unauthorized data observation. Incorrect modifications of
data, either intentional or unintentional, result in an incorrect
database state. Any use of incorrect data may result in heavy
losses for the organization. When data is unavailable,
information crucial for the proper functioning of the
organization is not readily available when needed. Database
security concerns the use of a broad range of information
security controls to protect databases includes the data, the
database applications or stored functions, the database
systems, the database servers against compromises of their
Secrecy, integrity and availability.
II. ASSET TYPES AND THEIR VALUE
Assets are the infrastructure of the company operation.
Depending on the type of asset and how much the company
values it, the company build security policies and
procedures and executes actions to protect these assets.
There are 4 main types of assets.
 Physical Asserts: Also known as tangible assets, these
include buildings, vehicles, hardware, and so on.
 Logical Assets: Logical aspects of an information
system, such as business applications, in-house
programs, purchased software, operating systems,
databases, and data.
 Intangible Assets: Business reputation, quality, and
public confidence.
 Human Assets: Human Skills, knowledge, and
expertise.
III. AUDITING ACTIVITIES
Auditing activities are performed as a part of an audit, audit
process, or audit plan. Some of these activities can be
thought of as the auditor’s responsibilities or they can be
incorporated into an organization’s audit policies.
 Evaluate and appraise the effectiveness and adequacy
of the audited entity according to the auditing
objectives and procedures.
 Ascertain and review the reliability and integrity of the
audited entity
 Ensure the organization being audited is in compliance
with the policies, procedures, regulations, and
standards of the government and the industry.
 Establish plans, policies, and procedures for
conducting audits.
 Act a liaison between the company and the external
audit team.
 Organize and conduct internal audits
Virtual Private Database (VPD) is also called as Tuple -
level Security. It ensures additional security to the database
by masking data so that users only see their private records.
Separate sites for data, departments and individuals are
stored together in a single database exclusively. The users
have no knowledge about it. It works by transparently
modifying requests for data to present a partial view of the
tables to the users based on a set of defined criteria. Fig: 1 In
this, we explain the main endeavor of VPD. These examples
shows the database of health clinic system, it provides both
Tuple – level and Column – level security for sensitive data
of the patients. Each Doctor have access only modify data
of his patients and sensitive information it is kept
confidential from other sections of hospital.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 227 - 229
______________________________________________________________________________________
228
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Figure 1: Tuple- level Access implementation using VPD.
View is used to create a query in a database. It
retrieves the data from the base tables. If a complex query is
to be referred multiple times then it can be stored in the a
temporary table i.e. nothing but a view. For example, the
attribute names may be changed and or various attributes
may be displayed as single attribute or single attribute may
be split into two or more attributes. Views isolate
application from the modifications in the table definition.
Thus View are not a good practice for enforcing database
security.
IV. PASSWORD POLICY
A Password Policy is a set of guidelines that enhances the
robustness of password and reduces the likelihood of its
being broken. Most guidelines deal with various aspects of
passwords, such as password complexity, frequency of
password changes, and password reuse. These guidelines not
only enhance password protection, they also establish
standards for institutions to increase employee and public
confidence in their security measures.
 Designing Password Policies: Most companies use a
standard set of guidelines for their password policies.
These guidelines can comprise one or more of the
following:
1. Password Complexity- The purpose of password
complexity is to decrease the chances of a hacker
guessing or breaking a password. A set of
guidelines used when selecting a password. For
example, a company could require that a password
be eight characters in length and contain at least
one digit and a symbol. Password Aging -
Indication of how long a password can be used
before it expires.
2. Password Storage - A method of storing a
password in an encrypted manner.
3. Password Usage - Indication of how many times
the same password can be used.
V. DATABASE SECURITY METHODOLOGY
It is time to put the pieces of the database security jigsaw
puzzle together to compose a process that will assist in
building database security. The following list presents the
definition of each phase of the data security methodology.
The following Fig2 shows the enforcement of database
security.
Figure2: Database Security Enforcement
1. Identification – This phase entails the identification and
investigation of resources required and policies to be
adopted.
2. Assessment - This phase includes analysis of
vulnerabilities, threats, and risks for both aspects of
database security: physical and logical.
3. Design-This phase results in a blueprint of the adopted
security model that is used to enforce security. The
blueprint shows how security measures are implemented
to enforce data integrity and accessibility.
4. Implementation – Code is developed or tools are
purchased to implement the blueprint outlined in the
previous phase.
5. Evaluation - In this phase evaluate the security
implementation by testing the system against typical
software attacks, hardware failures, natural disasters, and
human errors. The result of this phase is a determination
of the system’s degree of security.
6. Auditing – After the system goes into production,
security audits should be performed periodically to
ensure the security of the system.
 Screenshots
Figure3: Home page
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 227 - 229
______________________________________________________________________________________
229
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Figure 4: Patient Details
Figure 5: Doctor’s page
Figure 6: Specific patient details for a Doctor
VI. CONCLUSION
It is easy to think of data masking and data
encryption as the same things, since they are both data-
centric means of protecting sensitive data. However, data
encryption is not all time safeguard for the database
management systems. Many hacker security violations begin
with breaking the password to an account and thereby
opening the door to the network, the system, the system, and
password-protected files. Many companies spend countless
hours training and educating their employees on methods for
selecting passwords that are not easily breakable. This paper
is aimed at password policies for database users, these
password policies can be applied to any account, regardless
of the environment or the platform. Virtual Private Database
provide solution to ensure data secrecy, integrity and
security as is deals with tuple level protection of key data.
Data accessing and response to query is relatively high,
which increase database performance.
REFERENCES
[1]. B. Lakshmi, ―Data Confidentiality and Loss Prevention
using Virtual Private Database.‖
[2]. Elisa Bertino and Ravi Sandhu, ―DatabaseSecurity—
Concepts, Approaches, and Challenges‖, IEEE
TRANSACTIONS ON DEPENDABLE AND SECURE
COMPUTING, JANUARY-MARCH 2005.
[3]. Lakshmi B, Ravindra Babu H and Murali Krishna A
―Preserving Privacy using Column Masking and Data
Encryption Techniques‖, International Journal of Computer
Sciences and Engineering, Volume-4, Issue-6, @2016, pp
136-141.
[4]. R.J. Lauf and B.S. Hoffheins, ―Analysis of Liquid Fuels
Using a Gas Sensor Array,‖ Fuel, vol. 70, pp. 935-940,
1991.
[5]. https://qz.com/1121547/how-smart-is-the-first-robot-
citizen/
[6]. ―Securing Database as a Service‖, COPUBLISHED BY
THE IEEE COMPUTER AND RELIABILITY
SOCIETIES, NOVEMBER 2011.
[7]. Venkat Krishnan, James D. McCalley, Samir Issad and
Sebastien Henry, ―Efficient Database Generation for
Decision Tree Based Power System Security Assessment‖,
NOVEMBER 2011.
[8]. Vrundan R. Parode, ―An analysis on Fine-grained Access
Control in Databases‖, published by International Journal
of Computer Applications, April 2012.
[9]. Wangchao Le and Feifei Li, ―Query Access Assurance in
Outsourced Databases‖ APRIL-JUNE 2012.
[10]. The virtual private database in oracle9ir2: An oracle
technical white paper.
http://www.cgisecurity.com/database/oracle/pdf/VPD9ir2t
wp.pdf
[11]. Kenneth Goldman and Enriquillo Valdez, ―Matchbox:
Secure Data Sharing‖, December 2004 IEEE

More Related Content

What's hot

IYeste - Nova - ISEC695 - Final
IYeste - Nova - ISEC695 - FinalIYeste - Nova - ISEC695 - Final
IYeste - Nova - ISEC695 - Final
Ivonne Yeste
 

What's hot (19)

IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
 
Cst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.comCst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.com
 
CIS 349 Enhance teaching / snaptutorial.com
CIS 349 Enhance teaching / snaptutorial.com CIS 349 Enhance teaching / snaptutorial.com
CIS 349 Enhance teaching / snaptutorial.com
 
Cis 349 Exceptional Education-snaptutorial.com
Cis 349 Exceptional Education-snaptutorial.comCis 349 Exceptional Education-snaptutorial.com
Cis 349 Exceptional Education-snaptutorial.com
 
Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com  Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com
 
Cis 349 Effective Communication-snaptutorial.com
Cis 349 Effective Communication-snaptutorial.comCis 349 Effective Communication-snaptutorial.com
Cis 349 Effective Communication-snaptutorial.com
 
CIS 349 Effective Communication/tutorialrank.com
 CIS 349 Effective Communication/tutorialrank.com CIS 349 Effective Communication/tutorialrank.com
CIS 349 Effective Communication/tutorialrank.com
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
 
IYeste - Nova - ISEC695 - Final
IYeste - Nova - ISEC695 - FinalIYeste - Nova - ISEC695 - Final
IYeste - Nova - ISEC695 - Final
 
Cis 349 Teaching Effectively--tutorialrank.com
Cis 349 Teaching Effectively--tutorialrank.comCis 349 Teaching Effectively--tutorialrank.com
Cis 349 Teaching Effectively--tutorialrank.com
 
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comCyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.com
 
Cyb 610 Believe Possibilities / snaptutorial.com
Cyb 610  Believe Possibilities / snaptutorial.comCyb 610  Believe Possibilities / snaptutorial.com
Cyb 610 Believe Possibilities / snaptutorial.com
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.com
 
CYB 610 Exceptional Education - snaptutorial.com
CYB 610   Exceptional Education - snaptutorial.comCYB 610   Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.com
 
CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   
 
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comCYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.com
 
CIS 349 Entire Course NEW
CIS 349 Entire Course NEWCIS 349 Entire Course NEW
CIS 349 Entire Course NEW
 
IRJET -User Behaviour Analysis
IRJET -User Behaviour AnalysisIRJET -User Behaviour Analysis
IRJET -User Behaviour Analysis
 
CIS 349 RANK Lessons in Excellence--cis349rank.com
CIS 349 RANK Lessons in Excellence--cis349rank.comCIS 349 RANK Lessons in Excellence--cis349rank.com
CIS 349 RANK Lessons in Excellence--cis349rank.com
 

Similar to Safeguarding Data Privacy by Placing Multi-level Access Restrictions

Data discrimination prevention in customer relationship managment
Data discrimination prevention in customer relationship managmentData discrimination prevention in customer relationship managment
Data discrimination prevention in customer relationship managment
eSAT Publishing House
 

Similar to Safeguarding Data Privacy by Placing Multi-level Access Restrictions (20)

Review on Multimodal Biometric
Review on Multimodal BiometricReview on Multimodal Biometric
Review on Multimodal Biometric
 
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
 
Smart Manufacturing using IOT
Smart Manufacturing using IOTSmart Manufacturing using IOT
Smart Manufacturing using IOT
 
Smart Manufacturing using IOT
Smart Manufacturing using IOTSmart Manufacturing using IOT
Smart Manufacturing using IOT
 
A Survey: Privacy Preserving Using Obfuscated Attribute In e-Health Cloud
A Survey: Privacy Preserving Using Obfuscated Attribute In e-Health CloudA Survey: Privacy Preserving Using Obfuscated Attribute In e-Health Cloud
A Survey: Privacy Preserving Using Obfuscated Attribute In e-Health Cloud
 
Smart Health Guide App
Smart Health Guide AppSmart Health Guide App
Smart Health Guide App
 
Application of Elliptical Curve Cryptography in Empowering Cloud Data Security
Application of Elliptical Curve Cryptography in Empowering Cloud Data SecurityApplication of Elliptical Curve Cryptography in Empowering Cloud Data Security
Application of Elliptical Curve Cryptography in Empowering Cloud Data Security
 
Big Data: Review, Classification and Analysis Survey
Big Data: Review, Classification and Analysis  SurveyBig Data: Review, Classification and Analysis  Survey
Big Data: Review, Classification and Analysis Survey
 
Predictive Modelling Analytics through Data Mining
Predictive Modelling Analytics through Data MiningPredictive Modelling Analytics through Data Mining
Predictive Modelling Analytics through Data Mining
 
An Overview Of Predictive Analysis Techniques And Applications
An Overview Of Predictive Analysis  Techniques And ApplicationsAn Overview Of Predictive Analysis  Techniques And Applications
An Overview Of Predictive Analysis Techniques And Applications
 
Finger Gesture Based Rating System
Finger Gesture Based Rating SystemFinger Gesture Based Rating System
Finger Gesture Based Rating System
 
IRJET- Analysis of Big Data Technology and its Challenges
IRJET- Analysis of Big Data Technology and its ChallengesIRJET- Analysis of Big Data Technology and its Challenges
IRJET- Analysis of Big Data Technology and its Challenges
 
Data discrimination prevention in customer relationship managment
Data discrimination prevention in customer relationship managmentData discrimination prevention in customer relationship managment
Data discrimination prevention in customer relationship managment
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cst 610 Your world/newtonhelp.com
Cst 610 Your world/newtonhelp.comCst 610 Your world/newtonhelp.com
Cst 610 Your world/newtonhelp.com
 
Cst 610 Education is Power/newtonhelp.com
Cst 610 Education is Power/newtonhelp.comCst 610 Education is Power/newtonhelp.com
Cst 610 Education is Power/newtonhelp.com
 
Study of Data Mining Methods and its Applications
Study of  Data Mining Methods and its ApplicationsStudy of  Data Mining Methods and its Applications
Study of Data Mining Methods and its Applications
 
IRJET- Healthchannel - A Health Care Support App
IRJET- Healthchannel - A Health Care Support AppIRJET- Healthchannel - A Health Care Support App
IRJET- Healthchannel - A Health Care Support App
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
 
J017325660
J017325660J017325660
J017325660
 

More from rahulmonikasharma

Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
rahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 

Recently uploaded

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
dannyijwest
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 

Recently uploaded (20)

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 

Safeguarding Data Privacy by Placing Multi-level Access Restrictions

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 227 - 229 ______________________________________________________________________________________ 227 IJRITCC | June 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Safeguarding Data Privacy by Placing Multi-level Access Restrictions Lakshmi Bhaskarla1 Asst. Professor, Department of Computer Applications, V.R.S.E.C, Vijayawada -7, Andhra Pradesh, India Abstract: People always tend to protect assets regardless of what they are. For example, a user may keep a memorable picture of his parents in a safe place. However, the degree of protection he provides is directly based on how much he values the assets. If the user highly value the picture of his great-grandparents, he might take an extra measure of precaution by copying it and placing it in a fireproof safe where it is guarded from most natural disasters and from theft, or he may just put it in a frame because he has many similar pictures or because he can reproduce it. Usage of Database management systems to store information in every aspect of an enterprise is rapidly growing. Every company need to protect all tangible assets like valuable information stored in a DBMS is often vital to the business interests of the organization and is regarded as a corporate asset of the company that must be protected. There is no doubt that a password is the key to opening a user account. The Stronger the password, the longer it takes a hacker to break in. User authentication depends on a password to ensure the user account’s identity. Since organizations increase their implementation of database systems as the key data management technology for regular operations and decision making, the security of data managed by these systems is an important task. Keywords: Database Security Methodology, Data Confidentiality, Data Integrity, Data Secrecy, Password Policies __________________________________________________*****_________________________________________________ I INTRODUCTION All organizations, may suffer heavy losses from both financial and human points of view as a consequence of unauthorized data observation. Incorrect modifications of data, either intentional or unintentional, result in an incorrect database state. Any use of incorrect data may result in heavy losses for the organization. When data is unavailable, information crucial for the proper functioning of the organization is not readily available when needed. Database security concerns the use of a broad range of information security controls to protect databases includes the data, the database applications or stored functions, the database systems, the database servers against compromises of their Secrecy, integrity and availability. II. ASSET TYPES AND THEIR VALUE Assets are the infrastructure of the company operation. Depending on the type of asset and how much the company values it, the company build security policies and procedures and executes actions to protect these assets. There are 4 main types of assets.  Physical Asserts: Also known as tangible assets, these include buildings, vehicles, hardware, and so on.  Logical Assets: Logical aspects of an information system, such as business applications, in-house programs, purchased software, operating systems, databases, and data.  Intangible Assets: Business reputation, quality, and public confidence.  Human Assets: Human Skills, knowledge, and expertise. III. AUDITING ACTIVITIES Auditing activities are performed as a part of an audit, audit process, or audit plan. Some of these activities can be thought of as the auditor’s responsibilities or they can be incorporated into an organization’s audit policies.  Evaluate and appraise the effectiveness and adequacy of the audited entity according to the auditing objectives and procedures.  Ascertain and review the reliability and integrity of the audited entity  Ensure the organization being audited is in compliance with the policies, procedures, regulations, and standards of the government and the industry.  Establish plans, policies, and procedures for conducting audits.  Act a liaison between the company and the external audit team.  Organize and conduct internal audits Virtual Private Database (VPD) is also called as Tuple - level Security. It ensures additional security to the database by masking data so that users only see their private records. Separate sites for data, departments and individuals are stored together in a single database exclusively. The users have no knowledge about it. It works by transparently modifying requests for data to present a partial view of the tables to the users based on a set of defined criteria. Fig: 1 In this, we explain the main endeavor of VPD. These examples shows the database of health clinic system, it provides both Tuple – level and Column – level security for sensitive data of the patients. Each Doctor have access only modify data of his patients and sensitive information it is kept confidential from other sections of hospital.
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 227 - 229 ______________________________________________________________________________________ 228 IJRITCC | June 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Figure 1: Tuple- level Access implementation using VPD. View is used to create a query in a database. It retrieves the data from the base tables. If a complex query is to be referred multiple times then it can be stored in the a temporary table i.e. nothing but a view. For example, the attribute names may be changed and or various attributes may be displayed as single attribute or single attribute may be split into two or more attributes. Views isolate application from the modifications in the table definition. Thus View are not a good practice for enforcing database security. IV. PASSWORD POLICY A Password Policy is a set of guidelines that enhances the robustness of password and reduces the likelihood of its being broken. Most guidelines deal with various aspects of passwords, such as password complexity, frequency of password changes, and password reuse. These guidelines not only enhance password protection, they also establish standards for institutions to increase employee and public confidence in their security measures.  Designing Password Policies: Most companies use a standard set of guidelines for their password policies. These guidelines can comprise one or more of the following: 1. Password Complexity- The purpose of password complexity is to decrease the chances of a hacker guessing or breaking a password. A set of guidelines used when selecting a password. For example, a company could require that a password be eight characters in length and contain at least one digit and a symbol. Password Aging - Indication of how long a password can be used before it expires. 2. Password Storage - A method of storing a password in an encrypted manner. 3. Password Usage - Indication of how many times the same password can be used. V. DATABASE SECURITY METHODOLOGY It is time to put the pieces of the database security jigsaw puzzle together to compose a process that will assist in building database security. The following list presents the definition of each phase of the data security methodology. The following Fig2 shows the enforcement of database security. Figure2: Database Security Enforcement 1. Identification – This phase entails the identification and investigation of resources required and policies to be adopted. 2. Assessment - This phase includes analysis of vulnerabilities, threats, and risks for both aspects of database security: physical and logical. 3. Design-This phase results in a blueprint of the adopted security model that is used to enforce security. The blueprint shows how security measures are implemented to enforce data integrity and accessibility. 4. Implementation – Code is developed or tools are purchased to implement the blueprint outlined in the previous phase. 5. Evaluation - In this phase evaluate the security implementation by testing the system against typical software attacks, hardware failures, natural disasters, and human errors. The result of this phase is a determination of the system’s degree of security. 6. Auditing – After the system goes into production, security audits should be performed periodically to ensure the security of the system.  Screenshots Figure3: Home page
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 227 - 229 ______________________________________________________________________________________ 229 IJRITCC | June 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Figure 4: Patient Details Figure 5: Doctor’s page Figure 6: Specific patient details for a Doctor VI. CONCLUSION It is easy to think of data masking and data encryption as the same things, since they are both data- centric means of protecting sensitive data. However, data encryption is not all time safeguard for the database management systems. Many hacker security violations begin with breaking the password to an account and thereby opening the door to the network, the system, the system, and password-protected files. Many companies spend countless hours training and educating their employees on methods for selecting passwords that are not easily breakable. This paper is aimed at password policies for database users, these password policies can be applied to any account, regardless of the environment or the platform. Virtual Private Database provide solution to ensure data secrecy, integrity and security as is deals with tuple level protection of key data. Data accessing and response to query is relatively high, which increase database performance. REFERENCES [1]. B. Lakshmi, ―Data Confidentiality and Loss Prevention using Virtual Private Database.‖ [2]. Elisa Bertino and Ravi Sandhu, ―DatabaseSecurity— Concepts, Approaches, and Challenges‖, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, JANUARY-MARCH 2005. [3]. Lakshmi B, Ravindra Babu H and Murali Krishna A ―Preserving Privacy using Column Masking and Data Encryption Techniques‖, International Journal of Computer Sciences and Engineering, Volume-4, Issue-6, @2016, pp 136-141. [4]. R.J. Lauf and B.S. Hoffheins, ―Analysis of Liquid Fuels Using a Gas Sensor Array,‖ Fuel, vol. 70, pp. 935-940, 1991. [5]. https://qz.com/1121547/how-smart-is-the-first-robot- citizen/ [6]. ―Securing Database as a Service‖, COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES, NOVEMBER 2011. [7]. Venkat Krishnan, James D. McCalley, Samir Issad and Sebastien Henry, ―Efficient Database Generation for Decision Tree Based Power System Security Assessment‖, NOVEMBER 2011. [8]. Vrundan R. Parode, ―An analysis on Fine-grained Access Control in Databases‖, published by International Journal of Computer Applications, April 2012. [9]. Wangchao Le and Feifei Li, ―Query Access Assurance in Outsourced Databases‖ APRIL-JUNE 2012. [10]. The virtual private database in oracle9ir2: An oracle technical white paper. http://www.cgisecurity.com/database/oracle/pdf/VPD9ir2t wp.pdf [11]. Kenneth Goldman and Enriquillo Valdez, ―Matchbox: Secure Data Sharing‖, December 2004 IEEE