Security Policies for Securing Cloud Databases

Abstract

Databases are an important and almost mandatory means for storing information for later use. Databases require effective security to protect the information stored within them. In particular access control measures are especially important for cloud databases, because they can be accessed from anywhere in the world at any time via the Internet. The internet has provided a plethora of advantages by increasing accessibility to various services, education, information and communication. The internet also presents challenges and disadvantages, which include securing services, information and communication. Naturally, the internet is being used for good but also to carry out malicious attacks on cloud databases. In this paper we discuss approaches and techniques to protect cloud databases, including security policies which can realized as security patterns.

Authors and Affiliations

Ingrid Buckley, Fan Wu

Keywords

Related Articles

Measuring Term Specificity Information for Assessing Sentiment Orientation of Documents in a Bayesian Learning Framework

The assessment of document sentiment orientation using term specificity information is advocated in this study. An interpretation of the mathematical meaning of term specificity information is given based on Shannon’s en...

Sperm Motility Algorithm for Solving Fractional Programming Problems under Uncertainty

This paper investigated solving Fractional Programming Problems under Uncertainty (FPPU) using Sperm Motility Algorithm. Sperm Motility Algorithm (SMA) is a novel metaheuristic algorithm inspired by fertilization process...

Formal Method to Derive Interoperability Requirements and Guarantees

Interoperability among telecommunications systems, possibly by different vendors, is essential for both the development of many telecommunications networks, and today's civilization development. Interoperability testing...

Automatic Optic Disc Boundary Extraction from Color Fundus Images

Efficient optic disc segmentation is an important task in automated retinal screening. For the same reason optic disc detection is fundamental for medical references and is important for the retinal image analysis applic...

Implementation of Winnowing Algorithm with Dictionary English-Indonesia Technique to Detect Plagiarism

The ease of obtaining information that is easy, fast, and cheap from all over the world through the internet network can encourage someone to take action plagiarism. Plagiarism is an intellectual crime that often occurs...

Download PDF file
  • EP ID EP110583
  • DOI 10.14569/IJACSA.2014.050607
  • Views 102
  • Downloads 0

How To Cite

Ingrid Buckley, Fan Wu (2014). Security Policies for Securing Cloud Databases. International Journal of Advanced Computer Science & Applications, 5(6), 33-36. https://europub.co.uk./articles/-A-110583