We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Study of Students� Database Security Practices and Perceptions

Published on February 2019 by Ajay Rai, Aishwarya Ram, Rafiya Siddiqui, Sonu Gupta
Leveraging Information Technology for Inter-Sectoral Research
Foundation of Computer Science USA
ICAIM2017 - Number 1
February 2019
Authors: Ajay Rai, Aishwarya Ram, Rafiya Siddiqui, Sonu Gupta
022dbff7-1601-4b5d-bcf0-7b8f93a42a7d

Ajay Rai, Aishwarya Ram, Rafiya Siddiqui, Sonu Gupta . Study of Students� Database Security Practices and Perceptions. Leveraging Information Technology for Inter-Sectoral Research. ICAIM2017, 1 (February 2019), 20-22.

@article{
author = { Ajay Rai, Aishwarya Ram, Rafiya Siddiqui, Sonu Gupta },
title = { Study of Students� Database Security Practices and Perceptions },
journal = { Leveraging Information Technology for Inter-Sectoral Research },
issue_date = { February 2019 },
volume = { ICAIM2017 },
number = { 1 },
month = { February },
year = { 2019 },
issn = 0975-8887,
pages = { 20-22 },
numpages = 3,
url = { /proceedings/icaim2017/number1/30386-1713/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Leveraging Information Technology for Inter-Sectoral Research
%A Ajay Rai
%A Aishwarya Ram
%A Rafiya Siddiqui
%A Sonu Gupta
%T Study of Students� Database Security Practices and Perceptions
%J Leveraging Information Technology for Inter-Sectoral Research
%@ 0975-8887
%V ICAIM2017
%N 1
%P 20-22
%D 2019
%I International Journal of Computer Applications
Abstract

Data is the most main asset in today's world as it is used in day-to-day life from a single individual to large organizations. To access the historic or current data it is stored in database. Database involves storing vital and confidential information related to various organizations and is prone to security threats. The violation of database security can lead to the exposure of confidential data, loss of data integrity etc. the organization need to set up various security levels for the access of information according to the organization hierarchy. Database security is concerned with the protection of databases against its confidentiality, integrity and availability. Database access control deals with controlling i. e. who is allowed to access which data in the database. In this paper, the students'perspection of securing their database and the type of database which they use is explored.

References
  1. Date C. J. 1981. An Introduction to Database Systems. Addison-Wesley Publishing. Reading, MA. 574 pages
  2. KorthSilberschatz, Sudarshan, "Database System Concepts", McGraw Hill,2006
  3. Shmueli, Erez, Vaisenberg, Ronen, Elovici, Yuval and Glezer, Chanan(2009)Database Encryption- An Overview of Contemporary Challenges and Design Considerations SIGMOD Record vol38, No 3.
  4. H. M. Sneed, B. Demuth and B. Freitag, "A Process for Assessing Data Quality," 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops, Luxembourg, 2013, pp. 114-119.
  5. Kadhem, H. ; Amagasa, T. ; Kitagawa, H. ; A Novel Framework for Database Security based on Mixed Cryptography; Internet and Web Applications and Services, 2009. ICIW '09. Fourth International Conference Publication Year: 2009, Page(s): 163 – 170
  6. Luc Bouganim; Yanli GUO; Database Encryption; Encyclopedia of Cryptography and Security, S. Jajodia and H. van Tilborg (Ed. ) 2009, page(s): 1-9
  7. Khaleel Ahmad; JayantShekhar; Nitesh Kumar; K. P. Yadav; Policy Levels Concerning Database Security; International Journal of Computer Science & Emerging Technologies (E-ISSN: 2044-6004) 368 Volume 2, Issue 3, June 2011, page(s); 368-372
  8. IqraBasharat, FarooqueAzam and Abdul Wahab Muzaffar. Article: Database Security and Encryption: A Survey Study. International Journal of Computer Applications 47(12):28-34, June 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Database Security Confidentiality Integrity access Control