SlideShare ist ein Scribd-Unternehmen logo
1 von 15
NEGATIVE DATABASE
FOR DATA SECURITY
Shivnandan Singh Chauhan
Mtech (CSE)
1201102021
5/27/2014
1
ShivnandanSingh
DATABASE
 A database is an organized collection of data.
The data is typically organized to model relevant
aspects of reality in a way that supports
processes requiring this information.
5/27/2014
2
ShivnandanSingh
NEGATIVE DATABASE
 A negative database can be defined as a
database that contains huge amount of data
which consists of counterfeit data along with the
actual data.
 A few approaches that describe this concept have
been proposed but have not yet been
implemented to work for real world databases.
5/27/2014
3
ShivnandanSingh
DATABASE SECURITY IMPORTANCE
 Database Security has become an important
issue in today’s world. Organizations have
become highly dependent on the database for
their daily operations.
 The objective of database security is to prevent
undesired information disclosure and
modification of data while ensuring the
availability of the necessary service. With the
increase in the use of World Wide Web in recent
years emphasize the web database security.
5/27/2014
4
ShivnandanSingh
CLASSIFICATION SCHEME
In best of my knowledge database security are
classified based on the type of information security and
models.
 Encryption
 Negative Database
 Web-based Database Security
 Authentication and Access Control
 Timeliness and Security in Real-time Database
Systems
 Testing Schemes for SQL Injections
5/27/2014
5
ShivnandanSingh
ENCRYPTION
 This is the process of transforming plain text
information using encryption algorithms (called
cipher) to make it unreadable to anyone except
those possessing special knowledge, usually
referred to as a key.
 The traditional database systems using plain
text have many threats of data corruption and
collapse of database. To avoid these threats, the
data is stored in encrypted form in the database.
5/27/2014
6
ShivnandanSingh
WEB-BASED DATABASE SECURITY
 Some Methods are proposed to establish security
of Web database against illegitimate intrusion.
 The data transmission from server to the client
should be in a secured way (use Secure Socket
Layer).
 Host identity of an end system should be
authenticated.
5/27/2014
7
ShivnandanSingh
TESTING SCHEMES FOR SQL
INJECTIONS
 SQL injection is a code injection technique that
exploits a security vulnerability occurring in the
database layer of an application.
5/27/2014
8
ShivnandanSingh
TESTING SCHEME TO STOP SQL INJECTIONS
IN THE BEGINNING
 Database Security Testing Scheme to detect
potential input points of SQL injection,
automatically generate test cases and find
vulnerability of databases by running these test
cases to make a simulation attack to an
application.
5/27/2014
9
ShivnandanSingh
CONCEPT OF NEGATIVE DATABASE TO
HELP PREVENT DATA THEFT
A framework which manipulates the original
data and stores it in a database. This framework
mainly consists of four modules
 Database catching
 Virtual database encryption
 Database Encryption algorithm
 Negative Database conversion algorithm.
5/27/2014
10
ShivnandanSingh
ARCHITECTURE
5/27/2014
11
ShivnandanSingh
DATABASE CACHING
 In our framework we are using system-derived
timestamps as keys. Thus the complexity of the
database caching algorithm O(n), when the whole
database needs to be searched for a particular
tuple.
5/27/2014
12
ShivnandanSingh
VIRTUAL DATABASE ENCRYPTION
 This layer depends on the timestamp generation
and the conversion of the data into ASCII values.
Thus the computation time is O(n) where n is the
length of the used password.
5/27/2014
13
ShivnandanSingh
AUTHENTICATION AND ACCESS
CONTROL
 Authentication is used to check properly the
identity of the user and Access Control controls
the user actions or operations. Access Control
gives different privileges to different
authenticated users.
5/27/2014
14
ShivnandanSingh
Questions or Comments?
5/27/2014
15
ShivnandanSingh

Weitere ähnliche Inhalte

Was ist angesagt?

Data warehouse architecture
Data warehouse architectureData warehouse architecture
Data warehouse architecture
pcherukumalla
 
Data Warehouse Architectures
Data Warehouse ArchitecturesData Warehouse Architectures
Data Warehouse Architectures
Theju Paul
 
Introduction to data warehousing
Introduction to data warehousing   Introduction to data warehousing
Introduction to data warehousing
Girish Dhareshwar
 
Database administrator
Database administratorDatabase administrator
Database administrator
Tech_MX
 
Database , 4 Data Integration
Database , 4 Data IntegrationDatabase , 4 Data Integration
Database , 4 Data Integration
Ali Usman
 

Was ist angesagt? (20)

Data warehouse architecture
Data warehouse architectureData warehouse architecture
Data warehouse architecture
 
Distributed database management system
Distributed database management  systemDistributed database management  system
Distributed database management system
 
Temporal databases
Temporal databasesTemporal databases
Temporal databases
 
Database security
Database securityDatabase security
Database security
 
Database security
Database securityDatabase security
Database security
 
Data Mining & Data Warehousing Lecture Notes
Data Mining & Data Warehousing Lecture NotesData Mining & Data Warehousing Lecture Notes
Data Mining & Data Warehousing Lecture Notes
 
Data warehouse
Data warehouseData warehouse
Data warehouse
 
Data Warehouse Architectures
Data Warehouse ArchitecturesData Warehouse Architectures
Data Warehouse Architectures
 
Introduction to data warehousing
Introduction to data warehousing   Introduction to data warehousing
Introduction to data warehousing
 
Fundamentals of Database system
Fundamentals of Database systemFundamentals of Database system
Fundamentals of Database system
 
Database security
Database securityDatabase security
Database security
 
Introduction to distributed database
Introduction to distributed databaseIntroduction to distributed database
Introduction to distributed database
 
Database administrator
Database administratorDatabase administrator
Database administrator
 
Database , 4 Data Integration
Database , 4 Data IntegrationDatabase , 4 Data Integration
Database , 4 Data Integration
 
Database security
Database securityDatabase security
Database security
 
OLAP & DATA WAREHOUSE
OLAP & DATA WAREHOUSEOLAP & DATA WAREHOUSE
OLAP & DATA WAREHOUSE
 
Data Modeling PPT
Data Modeling PPTData Modeling PPT
Data Modeling PPT
 
Database fragmentation
Database fragmentationDatabase fragmentation
Database fragmentation
 
Database security issues
Database security issuesDatabase security issues
Database security issues
 
3 tier data warehouse
3 tier data warehouse3 tier data warehouse
3 tier data warehouse
 

Andere mochten auch

Data and database security and controls
Data and database security and controlsData and database security and controls
Data and database security and controls
FITSFSd
 

Andere mochten auch (6)

Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
 
Database & Data Security
Database & Data SecurityDatabase & Data Security
Database & Data Security
 
Data and database security and controls
Data and database security and controlsData and database security and controls
Data and database security and controls
 
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL DatabaseModern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
 
Weka project - DataMining
Weka project  - DataMiningWeka project  - DataMining
Weka project - DataMining
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 

Ähnlich wie Database security

Ijeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web applicationIjeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web application
Kumar Goud
 

Ähnlich wie Database security (20)

Database security
Database securityDatabase security
Database security
 
SQL INJECTION ATTACKS.pptx
SQL INJECTION ATTACKS.pptxSQL INJECTION ATTACKS.pptx
SQL INJECTION ATTACKS.pptx
 
DBMS SECURITY
DBMS SECURITYDBMS SECURITY
DBMS SECURITY
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security Framework
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORK
 
Securing and Managing the Oracle HTTP Server - White Paper
Securing and Managing the Oracle HTTP Server - White PaperSecuring and Managing the Oracle HTTP Server - White Paper
Securing and Managing the Oracle HTTP Server - White Paper
 
Sub1582
Sub1582Sub1582
Sub1582
 
Ijeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web applicationIjeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web application
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
Ld3420072014
Ld3420072014Ld3420072014
Ld3420072014
 
Dbms_class _14
Dbms_class _14Dbms_class _14
Dbms_class _14
 
Veritas 360 data management
Veritas 360 data managementVeritas 360 data management
Veritas 360 data management
 
SQL Injection: Unraveling the Threats
SQL Injection: Unraveling the ThreatsSQL Injection: Unraveling the Threats
SQL Injection: Unraveling the Threats
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Settle the Score
Settle the ScoreSettle the Score
Settle the Score
 
Presentation1
Presentation1Presentation1
Presentation1
 
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
 
DATABASE SECURITY - ATTACKS AND CONTROL METHODS
DATABASE SECURITY - ATTACKS AND CONTROL METHODSDATABASE SECURITY - ATTACKS AND CONTROL METHODS
DATABASE SECURITY - ATTACKS AND CONTROL METHODS
 

Kürzlich hochgeladen

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 

Database security

  • 1. NEGATIVE DATABASE FOR DATA SECURITY Shivnandan Singh Chauhan Mtech (CSE) 1201102021 5/27/2014 1 ShivnandanSingh
  • 2. DATABASE  A database is an organized collection of data. The data is typically organized to model relevant aspects of reality in a way that supports processes requiring this information. 5/27/2014 2 ShivnandanSingh
  • 3. NEGATIVE DATABASE  A negative database can be defined as a database that contains huge amount of data which consists of counterfeit data along with the actual data.  A few approaches that describe this concept have been proposed but have not yet been implemented to work for real world databases. 5/27/2014 3 ShivnandanSingh
  • 4. DATABASE SECURITY IMPORTANCE  Database Security has become an important issue in today’s world. Organizations have become highly dependent on the database for their daily operations.  The objective of database security is to prevent undesired information disclosure and modification of data while ensuring the availability of the necessary service. With the increase in the use of World Wide Web in recent years emphasize the web database security. 5/27/2014 4 ShivnandanSingh
  • 5. CLASSIFICATION SCHEME In best of my knowledge database security are classified based on the type of information security and models.  Encryption  Negative Database  Web-based Database Security  Authentication and Access Control  Timeliness and Security in Real-time Database Systems  Testing Schemes for SQL Injections 5/27/2014 5 ShivnandanSingh
  • 6. ENCRYPTION  This is the process of transforming plain text information using encryption algorithms (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.  The traditional database systems using plain text have many threats of data corruption and collapse of database. To avoid these threats, the data is stored in encrypted form in the database. 5/27/2014 6 ShivnandanSingh
  • 7. WEB-BASED DATABASE SECURITY  Some Methods are proposed to establish security of Web database against illegitimate intrusion.  The data transmission from server to the client should be in a secured way (use Secure Socket Layer).  Host identity of an end system should be authenticated. 5/27/2014 7 ShivnandanSingh
  • 8. TESTING SCHEMES FOR SQL INJECTIONS  SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. 5/27/2014 8 ShivnandanSingh
  • 9. TESTING SCHEME TO STOP SQL INJECTIONS IN THE BEGINNING  Database Security Testing Scheme to detect potential input points of SQL injection, automatically generate test cases and find vulnerability of databases by running these test cases to make a simulation attack to an application. 5/27/2014 9 ShivnandanSingh
  • 10. CONCEPT OF NEGATIVE DATABASE TO HELP PREVENT DATA THEFT A framework which manipulates the original data and stores it in a database. This framework mainly consists of four modules  Database catching  Virtual database encryption  Database Encryption algorithm  Negative Database conversion algorithm. 5/27/2014 10 ShivnandanSingh
  • 12. DATABASE CACHING  In our framework we are using system-derived timestamps as keys. Thus the complexity of the database caching algorithm O(n), when the whole database needs to be searched for a particular tuple. 5/27/2014 12 ShivnandanSingh
  • 13. VIRTUAL DATABASE ENCRYPTION  This layer depends on the timestamp generation and the conversion of the data into ASCII values. Thus the computation time is O(n) where n is the length of the used password. 5/27/2014 13 ShivnandanSingh
  • 14. AUTHENTICATION AND ACCESS CONTROL  Authentication is used to check properly the identity of the user and Access Control controls the user actions or operations. Access Control gives different privileges to different authenticated users. 5/27/2014 14 ShivnandanSingh