Database Security and Integrity: Ensuring Reliable and Secure Data Management

Year : 2024 | Volume : 11 | Issue : 03 | Page : 9 19
    By

    Ajish M. Thomas,

  • Blessy Abraham,

  • Azhar Bin Sagar,

  1. Assistant Professor, Computer Science, Musaliar College, Pathanamthitta Mahatma Gandhi University, Kottayam, Kerala, India
  2. Assistant Professor, Computer Science, Catholicate College, Pathanamthitta Mahatma Gandhi University, Kottayam, Kerala, India
  3. Assistant Professor, Computer Science, Musaliar College, Pathanamthitta Mahatma Gandhi University, Kottayam, Kerala, India

Abstract

This paper explores the critical aspects of database security and integrity, addressing major threats and presenting strategies to mitigate these risks. Emphasizing the importance of secure and reliable data management, the paper reviews historical perspectives, current trends, key challenges, and future directions in the field. The research underscores the necessity of robust security measures and integrity controls to maintain the trustworthiness and reliability of databases, which are pivotal in supporting various organizational operations. Key concepts such as access control, encryption, and auditing are discussed, along with integrity measures like constraints and atomicity, consistency, isolation, and durability (ACID) properties. The paper also examines successful case studies and emerging technologies that could revolutionize database security. Through this comprehensive review, the paper aims to provide valuable insights and recommendations for enhancing database security and integrity in contemporary digital environments. The need for ongoing research and development is emphasized to address evolving threats and leverage advancements in technology, ensuring that databases remain secure, reliable, and efficient. By highlighting both theoretical and practical aspects, the paper serves as a crucial resource for professionals and researchers seeking to fortify database systems against potential vulnerabilities.

Keywords: Database security, data integrity, access control, encryption, auditing, ACID properties, blockchain, cybersecurity

[This article belongs to Journal of Advanced Database Management & Systems ]

How to cite this article:
Ajish M. Thomas, Blessy Abraham, Azhar Bin Sagar. Database Security and Integrity: Ensuring Reliable and Secure Data Management. Journal of Advanced Database Management & Systems. 2024; 11(03):9-19.
How to cite this URL:
Ajish M. Thomas, Blessy Abraham, Azhar Bin Sagar. Database Security and Integrity: Ensuring Reliable and Secure Data Management. Journal of Advanced Database Management & Systems. 2024; 11(03):9-19. Available from: https://journals.stmjournals.com/joadms/article=2024/view=168435


References

  1. Elmasri R, Navathe SB. Fundamentals of Database Systems. 7th ed. London: Pearson; 2016.
  2. Korth HF, Silberschatz A, Sudarshan S. Database System Concepts. 6th ed. New York: McGraw-Hill; 2010.
  3. Bertino E, Sandhu R. Database security—Concepts, approaches, and challenges. IEEE Trans Dependable Secure Comput. 2005;2:2–19. DOI: 10.1109/TDSC.2005.9.
  4. Bishop M. Introduction to Computer Security. Reading: Addison-Wesley; 2004.
  5. Lamport L. Password authentication with insecure communication. Commun ACM. 1981;24:
    770–2.
  6. Date CJ. An Introduction to Database Systems. 8th ed. Reading: Addison-Wesley; 2003.
  7. Bonatti PA, Kraus S, Subrahmanian VS. Foundations of secure deductive databases. IEEE Trans Knowl Data Eng. 1995;7:406–22. DOI: 10.1109/69.390247.
  8. Denning DE. Cryptography and Data Security. Reading: Addison-Wesley; 1982.
  9. Gray J, Reuter A. Transaction Processing: Concepts and Techniques. Morgan Kaufmann Publishers; 1993.
  10. Foster E, Godbole S. Database Systems: A Pragmatic Approach. Auerbach Publications; 2022.

Regular Issue Subscription Review Article
Volume 11
Issue 03
Received 18/05/2024
Accepted 11/06/2024
Published 21/08/2024


Login


My IP

PlumX Metrics