Overview of Database Query Auditing Techniques
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 3
Abstract
Government regulations and increased awareness of security issues have increased the auditing requirements of information technology systems. The goal of an auditing system is to determine if security and other policies are being violated. It provides the way to detect intrusions into the system, including privileged users and also provide periodic report of system usage and data modifications. Auditing can also be used to detect and recover database systems in case of system failure or human errors. Thus auditing is a key part of the security infrastructure in a database system. While commercial database systems provide mechanisms such as triggers that can be used to track and log any changes made to “sensitive” data using UPDATE queries, they are not useful for tracking accesses to sensitive data using complex SQL queries, which is important for many applications given recent laws such as HIPAA. This paper focuses on a framework for auditing queries and several different notions of suspiciousness for simple SQL queries. It also focuses on notion of SELECT triggers that extends triggers to work for SELECT queries in order to facilitate data auditing.
Authors and Affiliations
Ms. Vidya Ingle, Prof. Manjusha Deshmukh
Predict the Readmission Patterns of Chronic Diseases Using Machine Learning
Machine learning plays an essential role in predicting presence or obsence of locomotor disorders. The diseases like heart, diabetes, cancer, kidney we collect data and such information if predicted well in advance can p...
Role and Impact of Biomedical Engineering Discipline for Developing Country Perspective
For a developing and largely populated country, it is quite difficult to solve all healthcare related issues using existing technology with affordable cost and desired precision. Moreover, to carry out biomedical researc...
The Future of Decision Making: Augmented Intelligence
Artificial intelligence's protracted objective seems to be to teach robots to learn and think like humans. Due to the general tremendous degrees of accuracy as well as fragility in human existence, as well as the open-en...
Assessing the Performance of an Integrated Health Information Exchange System Using Unstructured Supplementary Service Data
As budding nations gradually adopt the use of IT services to store medical records, several healthcare facilities are still unable to exchange information because of limited access to high speed internet service and high...
A Brief Description on Li-Fi Technology
Li-Fi is the truncation for Light-Fidelity and the procedure is generally novel, having been recommended by German researcher Harald Haas during the 2011 TED Universal Talk on Visible-Light-Communication (VLC). Li-Fi is...