Overview of Database Query Auditing Techniques
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 3
Abstract
Government regulations and increased awareness of security issues have increased the auditing requirements of information technology systems. The goal of an auditing system is to determine if security and other policies are being violated. It provides the way to detect intrusions into the system, including privileged users and also provide periodic report of system usage and data modifications. Auditing can also be used to detect and recover database systems in case of system failure or human errors. Thus auditing is a key part of the security infrastructure in a database system. While commercial database systems provide mechanisms such as triggers that can be used to track and log any changes made to “sensitive” data using UPDATE queries, they are not useful for tracking accesses to sensitive data using complex SQL queries, which is important for many applications given recent laws such as HIPAA. This paper focuses on a framework for auditing queries and several different notions of suspiciousness for simple SQL queries. It also focuses on notion of SELECT triggers that extends triggers to work for SELECT queries in order to facilitate data auditing.
Authors and Affiliations
Ms. Vidya Ingle, Prof. Manjusha Deshmukh
A Better Solution Towards Microservices Communication In Web Application: A Survey
Most of the software applications are configured as client-server fashion in the network in order to enable communication among them. But sometimes these applications must be able to communicate or exchange data between...
VANET-OLSR Cooperative Cross-Layer Detection for Black hole Attacks
In this study, we address the issue of detecting hot spot problem targeting Multi Point Relays (MPRs) using Vehicular Ad hoc channels Reactive Routing protocol (VANET-OLSR). To identify network-related threats, a watchdo...
Privacy-Preserving Services for Social Networks: A Review Paper
The popular and frequently used Online Social Networks (OSNs) all have a conceptually centralized design, in which a single organization holds unprecedented amounts of personal information in terms of amount, variety, ge...
Air Quality Monitoring and Disease Prediction Using IoT and Machine Learning
Air quality prediction focuses mainly on these industrial areas. Industrial level usage of this project requires expensive sensors and huge amount of power supply. According to the World Health Organization (WHO), major...
Designing Anonymity Server based on K Optimal Principle for Privacy Preserving Protocol
There is need to secure mobile phones locations by privacy frame work which utilizes K optimal principles. This improves the location position and tracking ability of Cell phones. Most of the time quality of service cann...