IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 2- Issue 4, April 2013 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A Survey on Securing Databases From Unauthorized Users

[Full Text]

 

AUTHOR(S)

Prof. S. S. Asole, Ms. S. M. Mundada

 

KEYWORDS

Index Terms: - Cryptography, Databases, EVCS, Notifications, Security, Stegnography, Visual Cryptography.

 

ABSTRACT

Abstract: - Database and database technologies form a core component of many computing systems and applications which allow data to be stored, retained and shared electronically. As the use of database systems and the amount of data contained in these systems grows continuously and exponentially, database security has become an issue of utmost importance due to an increase in the number of incidents reporting the unauthorized exposure to sensitive data. Hence, the databases should be protected in such a way as to restrict the unauthorized persons from accessing the sensitive contents of database as well as the overall database as a whole. Thus, this paper involves a survey discussing various techniques providing content as well as access security to databases.

 

REFERENCES

[1] Niels Provos and Peter Honeyman, University of Michigan, “Hide and Seek An Introduction to Stegnography”, IEEE Computer Society.

[2] Nagham Hamid, Abid Yahya, R Badlishah Ahmad, Osamah M. Al-Qershi, ”Image Stegnography Techniques: An Overview”, International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (3) : 2012.

[3] Gandharba Swain and Saroj Kumar Lenka, ”A Technique for Secret Communication for New Block Cipher Using Dynamic Stegnography”, International Journal of Security and Its Applications, Vol.6, no.2, April 2012.

[4] Feng Liu and Chuankun Wu, ”Embedded extended visual cryptography scheme” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 2, JUNE 2011.

[5] Kai-Hui Lee and Pei-Ling Chiu, ”An Extended Visual Cryptography Algorithm for General Access Structures”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012.

[6] T Morkel, J H P Eloff, M.S.Olivier”An Overview Of Image stegnogra phy” Information and Computer Security Architecture (ICSA) Research Group. images and videos” IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 8, AUGUST 2000.

[7] Ching-Nung Yang, Hsiang-Wen Shih, Chih-Cheng Wu, and Lein Harn, ”k out of n region incrementing scheme in visual cryptography”, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 22, NO. 5, MAY 2012TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 8, AUGUST 2000.

[8] Meg Coffin Murray Kennesaw State University, Kennesaw, GA, USA” Database Security: What Students Need to Know ” Journal of Information Technology Education: Volume 9, 2010 Innovations in Practice.

[9] Gaurav Sharma, Ajay Kakkar “ Cryptography Algorithms and approaches used for data security” International Journal of Scientific & Engineering Research Volume 3, Issue 6, June-2012 1 ISSN 2229-5518.

[10] Yu-Chi Chen, Gwoboa Horng, and Du-Shiau Tsai, ”Comment on “Cheating Prevention” in Visual cryptography”, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 21, NO. 7, JULY 2012