[{“box”:0,”content”:”[if 992 equals=”Open Access”]n
n
Open Access
nn
n
n[/if 992]n
n
n
n
n

n
Ajish M. Thomas, Blessy Abraham, Azhar Bin Sagar,
n
- n t
n
n
n[/foreach]
n
n[if 2099 not_equal=”Yes”]n
- [foreach 286] [if 1175 not_equal=””]n t
- Assistant Professor, Assistant Professor, Assistant Professor Computer Science, Musaliar College, Pathanamthitta Mahatma Gandhi University, Kottayam, Computer Science, Catholicate College, Pathanamthitta Mahatma Gandhi University, Kottayam, Computer Science, Musaliar College, Pathanamthitta Mahatma Gandhi University, Kottayam Kerala, Kerala, Kerala India, India, India
n[/if 1175][/foreach]
n[/if 2099][if 2099 equals=”Yes”][/if 2099]n
Abstract
nThis paper explores the critical aspects of database security and integrity, addressing major threats and presenting strategies to mitigate these risks. Emphasizing the importance of secure and reliable data management, the paper reviews historical perspectives, current trends, key challenges, and future directions in the field. The research underscores the necessity of robust security measures and integrity controls to maintain the trustworthiness and reliability of databases, which are pivotal in supporting various organizational operations. Key concepts such as access control, encryption, and auditing are discussed, along with integrity measures like constraints and ACID properties. The paper also examines successful case studies and emerging technologies that could revolutionize database security. Through this comprehensive review, the paper aims to provide valuable insights and recommendations for enhancing database security and integrity in contemporary digital environments. The need for ongoing research and development is emphasized to address evolving threats and leverage advancements in technology, ensuring that databases remain secure, reliable, and efficient. By highlighting both theoretical and practical aspects, the paper serves as a crucial resource for professionals and researchers seeking to fortify database systems against potential vulnerabilities.
n
Keywords: Database security, data integrity, access control, encryption, auditing, ACID properties, blockchain, cybersecurity
n[if 424 equals=”Regular Issue”][This article belongs to Journal of Advanced Database Management & Systems(joadms)]
n
n
n
n
n
nn[if 992 equals=”Open Access”] Full Text PDF Download[/if 992] n
nn[if 379 not_equal=””]n
Browse Figures
n
n
n[/if 379]n
References
n[if 1104 equals=””]n
- R. Elmasri and S. B. Navathe, *Fundamentals of Database Systems*, 7th ed., Pearson, 2016.
- H. F. Korth, A. Silberschatz, and S. Sudarshan, *Database System Concepts*, 6th ed., McGraw-Hill, 2010.
- E. Bertino and R. Sandhu, “Database Security—Concepts, Approaches, and Challenges,” *IEEE Transactions on Dependable and Secure Computing*, vol. 2, no. 1, pp. 2-19, 2005.
- M. Bishop, “Introduction to Computer Security,” Addison-Wesley, 2004.
- L. Lamport, “Password Authentication with Insecure Communication,” *Communications of the ACM*, vol. 24, no. 11, pp. 770-772, 1981.
- C. J. Date, *An Introduction to Database Systems*, 8th ed., Addison-Wesley, 2003.
- P. P. Bonatti, S. Kraus, and V. S. Subrahmanian, “Foundations of Secure Deductive Databases,” *IEEE Transactions on Knowledge and Data Engineering*, vol. 7, no. 3, pp. 406-422, 1995.
- D. E. Denning, *Cryptography and Data Security*, Addison-Wesley, 1982.
- J. Gray and A. Reuter, *Transaction Processing: Concepts and Techniques*, Morgan Kaufmann, 1993.
- Foster E, Godbole S. Database systems: a pragmatic approach. Auerbach Publications; 2022 Sep 26.
nn[/if 1104][if 1104 not_equal=””]n
- [foreach 1102]n t
- [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
n[/foreach]
n[/if 1104]
nn
nn[if 1114 equals=”Yes”]n
n[/if 1114]
n
n

n
Journal of Advanced Database Management & Systems
n
n
n
n
nnn
n
| Volume | 11 | |
| [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] | 03 | |
| Received | May 18, 2024 | |
| Accepted | June 11, 2024 | |
| Published | August 21, 2024 |
n
n
n
n
n
n nfunction myFunction2() {nvar x = document.getElementById(“browsefigure”);nif (x.style.display === “block”) {nx.style.display = “none”;n}nelse { x.style.display = “Block”; }n}ndocument.querySelector(“.prevBtn”).addEventListener(“click”, () => {nchangeSlides(-1);n});ndocument.querySelector(“.nextBtn”).addEventListener(“click”, () => {nchangeSlides(1);n});nvar slideIndex = 1;nshowSlides(slideIndex);nfunction changeSlides(n) {nshowSlides((slideIndex += n));n}nfunction currentSlide(n) {nshowSlides((slideIndex = n));n}nfunction showSlides(n) {nvar i;nvar slides = document.getElementsByClassName(“Slide”);nvar dots = document.getElementsByClassName(“Navdot”);nif (n > slides.length) { slideIndex = 1; }nif (n (item.style.display = “none”));nArray.from(dots).forEach(nitem => (item.className = item.className.replace(” selected”, “”))n);nslides[slideIndex – 1].style.display = “block”;ndots[slideIndex – 1].className += ” selected”;n}n”}]