Review on Database Models and Security Breach


Authors : Abhilash B., Amrutha M., Charitha U. M., Chiranth B. K., D. Khasim Vali.

Volume/Issue : Volume 4 - 2019, Issue 2 - February

Nowadays, there is ample growth in data which is generated in discrete fields. The authoritative operations like updating, deleting, altering, etc. are handled using the database. The operations like alteration of data and its maintenance are fulfilled using the Database Management System. This method of storing data is an effortless and efficient way to manage it. By taking into consideration the value of data, it is truly essential to secure the assorted data present in the system. The data must be secured in such a way that, it has to reciprocate all types of possible database attacks. In order to provide security in such a manner, many types of security models which are in concern with different issues of the database security has to be designed. They might be different because of their various assumptions about what constitutes a secure database. So, it becomes very hectic for database security aspirants to select a pertinent model for securing their database. Securing database is an important approach for the routing of explicit and directive-based database security requirements. As the complexity of the database increases, it is likely to have security issues.

Keywords : Database Models, Database Security Issues, Database User Privileges, Database Security Models, Privileges Exaltation.

CALL FOR PAPERS


Paper Submission Last Date
31 - March - 2024

Paper Review Notification
In 1-2 Days

Paper Publishing
In 2-3 Days

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe