Overview of Database Query Auditing Techniques

Abstract

Government regulations and increased awareness of security issues have increased the auditing requirements of information technology systems. The goal of an auditing system is to determine if security and other policies are being violated. It provides the way to detect intrusions into the system, including privileged users and also provide periodic report of system usage and data modifications. Auditing can also be used to detect and recover database systems in case of system failure or human errors. Thus auditing is a key part of the security infrastructure in a database system. While commercial database systems provide mechanisms such as triggers that can be used to track and log any changes made to “sensitive” data using UPDATE queries, they are not useful for tracking accesses to sensitive data using complex SQL queries, which is important for many applications given recent laws such as HIPAA. This paper focuses on a framework for auditing queries and several different notions of suspiciousness for simple SQL queries. It also focuses on notion of SELECT triggers that extends triggers to work for SELECT queries in order to facilitate data auditing.

Authors and Affiliations

Ms. Vidya Ingle, Prof. Manjusha Deshmukh

Keywords

Related Articles

A Better Solution Towards Microservices Communication In Web Application: A Survey

Most of the software applications are configured as client-server fashion in the network in order to enable communication among them. But sometimes these applications must be able to communicate or exchange data between...

VANET-OLSR Cooperative Cross-Layer Detection for Black hole Attacks

In this study, we address the issue of detecting hot spot problem targeting Multi Point Relays (MPRs) using Vehicular Ad hoc channels Reactive Routing protocol (VANET-OLSR). To identify network-related threats, a watchdo...

Privacy-Preserving Services for Social Networks: A Review Paper

The popular and frequently used Online Social Networks (OSNs) all have a conceptually centralized design, in which a single organization holds unprecedented amounts of personal information in terms of amount, variety, ge...

Air Quality Monitoring and Disease Prediction Using IoT and Machine Learning

Air quality prediction focuses mainly on these industrial areas. Industrial level usage of this project requires expensive sensors and huge amount of power supply. According to the World Health Organization (WHO), major...

Designing Anonymity Server based on K Optimal Principle for Privacy Preserving Protocol

There is need to secure mobile phones locations by privacy frame work which utilizes K optimal principles. This improves the location position and tracking ability of Cell phones. Most of the time quality of service cann...

Download PDF file
  • EP ID EP749395
  • DOI -
  • Views 33
  • Downloads 0

How To Cite

Ms. Vidya Ingle, Prof. Manjusha Deshmukh (2014). Overview of Database Query Auditing Techniques. International Journal of Innovative Research in Computer Science and Technology, 2(3), -. https://europub.co.uk./articles/-A-749395