A Review on The Database Security Requirements and Guidelines

Authors

  • Yeshwanth Valaboju   Associate Consultant, SAP UI5, Rigved Technologies Pvt. Ltd, India

Keywords:

Database, Database Security, Integrity

Abstract

Protecting data is at the heart of many secure systems, and many users rely on a database management system to manage the protection. Databases are essential to many business and government organizations, holding data that reengineered to make them more effective and more tune with new and revised goals. Database security is a difficult operation that any organization should enhance in order to run its activities smoothly. The various threats pose a challenge to the organization in terms of integrity of the data and access.

References

  1. Khan, K. R. Santiago-Chaparro, M. Chiturri, as well as D. A. Noyce, "Advancement of records selection as well as assimilation frame- help road inventory data," Diary of the Transport Analysis Board, no. 2160, pp. 29-- 39, 2010.
  2. Federal Road Management and also UNITED STATE Department of Transport, Data Combination Guide, Federal Road Management, UNITED STATE Department of Transport, 2001.
  3. K. Dueker and J. A. Head Servant, "GIS-T company records model along with advised implementation choices," Diary of the Urban as well as Regional Relevant Information Systems Organization, vol. 10, no. 1, pp. 12-- 36, 1998.
  4. Sugandhi Maheshwaram, “A Comprehensive Review on the Implementation of Big Data Solutions”, International Journal of Information Technology and Management Vol. XI, Issue No. XVII, November-2016
  5. Sugandhi Maheshwaram, “Architectural Framework of Cloud Computing Environment”, International Journal of Scientific Research in Science, Engineering and Technology, Volume 4, Issue 1, January-February 2018
  6. Sugandhi Maheshwaram, “An Overview of Open Research Issues in Big Data Analytics”, Journal of Advances in Science and Technology, Vol. 14, Issue No. 2, 2017
  7. Sudheer Kumar Shriramoju, "Access Control and Density Based Notion of Clusters", International Journal of Scientific Research in Science and Technology (IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 1 Issue 3, pp. 215-220, July-August 2015.
  8. Sudheer Kumar Shriramoju, “Capabilities and Impact of SharePoint On Business”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, 2017.
  9. Sudheer Kumar Shriramoju, “Security Level Access Error Leading to Inference and Mining Sequential Patterns”, International Journal of Scientific Research in Science, Engineering and Technology, Volume 2, Issue 4, July-August 2016
  10. Sudheer Kumar Shriramoju, “An Overview on Database Vulnerability and Mining Changes from Data Streams”, International Journal of Information Technology and Management, Vol. VII, Issue No. IX, August-2014
  11. Sudheer Kumar Shriramoju, “Integrating Information from Heterogeneous Data Sources and Row Level Security”, Journal of Advances and Scholarly Researches in Allied Education, Vol. IV, Issue No. VIII, October-2012
  12. Sudheer Kumar Shriramoju,, “A Review on Database Security and Advantages of Database Management System”, Journal of Advances in Science and Technology, Vol. V, Issue No. X, August-2013
  13. Sudheer Kumar Shriramoju, “SECURITY ISSUES, THREATS AND CORE CONCEPTS OF CLOUD COMPUTING”, Airo International Research Journal, Volume IX, Feb 2017.
  14. Malyadri. K, “An Overview towards the Different Types of Security Attacks", International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 8, August 2014
  15. Malyadri. K, “Security Threats, Security Vulnerabilities and Advance Network Security Policies”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 2, Issue 9, September 2013
  16. Malyadri. K, “Need for Key Management in Cloud and Comparison of Various Encryption Algorithm”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology , volume 1, issue 1, July-August 2016
  17. Malyadri. K,“A STUDY ON EXPERIENCES ANDLIMITATIONS OF MOBILE COMMUNICATION”, Alochana Chakra Journal, Volume VI, Issue VIII, August 2017

Downloads

Published

2017-08-25

Issue

Section

Research Articles

How to Cite

[1]
Yeshwanth Valaboju , " A Review on The Database Security Requirements and Guidelines, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 3, Issue 6, pp.853-858, July-August-2017.