Flat role based access control and encryption scheme for database security

Encryption is one way that can be used to secure database. In the use of encryption to secure database it is important to determine where the location of encryption to be performed. In database encryption, one location to perform the encryption is in application level, where the data has been produc...

Full description

Saved in:
Bibliographic Details
Main Author: Al Farissi, Al Farissi
Format: Thesis
Published: 2013
Subjects:
Online Access:http://eprints.utm.my/id/eprint/41635/
http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:78170?queryType=vitalDismax&query=Flat+role+based+access+control+and+encryption+scheme&public=true
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.41635
record_format eprints
spelling my.utm.416352020-06-23T04:16:18Z http://eprints.utm.my/id/eprint/41635/ Flat role based access control and encryption scheme for database security Al Farissi, Al Farissi QA76 Computer software Encryption is one way that can be used to secure database. In the use of encryption to secure database it is important to determine where the location of encryption to be performed. In database encryption, one location to perform the encryption is in application level, where the data has been produced. In this approach, the encryption infrastructure is located outside the database. Implementing encryption at the application level would require a secure mechanism to protect applications that are used to access the database. Roughly speaking, the confidentiality property enforces predefined restrictions while accessing the protected data, thus preventing disclosure to unauthorized persons. To preserve the data confidentiality in database, one way is by implementing access control policies on the database. An access control policy is a set of authorizations. This study implemented an access control on application level using Flat Role Based Access Control (FRBAC). Hence, with the flexibility, security of encryption and access control on application level, this study combines these two levels of security to secure database. In term of functionality, experimental results showed implementation of FRBAC is able to authenticate users and prevent unauthorized users to access the application in order to protect data on database by separating access for each user based on role. The implementation of encryption managed to secure the transmission of queries and query results as long as both are in the network by encrypting them using XTEA algorithm. Performance test showed, to encrypt the query and the query results directly affect the execution time of the query and size of file 2013 Thesis NonPeerReviewed Al Farissi, Al Farissi (2013) Flat role based access control and encryption scheme for database security. Masters thesis, Universiti Teknologi Malaysia, Faculty of Computing. http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:78170?queryType=vitalDismax&query=Flat+role+based+access+control+and+encryption+scheme&public=true
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA76 Computer software
spellingShingle QA76 Computer software
Al Farissi, Al Farissi
Flat role based access control and encryption scheme for database security
description Encryption is one way that can be used to secure database. In the use of encryption to secure database it is important to determine where the location of encryption to be performed. In database encryption, one location to perform the encryption is in application level, where the data has been produced. In this approach, the encryption infrastructure is located outside the database. Implementing encryption at the application level would require a secure mechanism to protect applications that are used to access the database. Roughly speaking, the confidentiality property enforces predefined restrictions while accessing the protected data, thus preventing disclosure to unauthorized persons. To preserve the data confidentiality in database, one way is by implementing access control policies on the database. An access control policy is a set of authorizations. This study implemented an access control on application level using Flat Role Based Access Control (FRBAC). Hence, with the flexibility, security of encryption and access control on application level, this study combines these two levels of security to secure database. In term of functionality, experimental results showed implementation of FRBAC is able to authenticate users and prevent unauthorized users to access the application in order to protect data on database by separating access for each user based on role. The implementation of encryption managed to secure the transmission of queries and query results as long as both are in the network by encrypting them using XTEA algorithm. Performance test showed, to encrypt the query and the query results directly affect the execution time of the query and size of file
format Thesis
author Al Farissi, Al Farissi
author_facet Al Farissi, Al Farissi
author_sort Al Farissi, Al Farissi
title Flat role based access control and encryption scheme for database security
title_short Flat role based access control and encryption scheme for database security
title_full Flat role based access control and encryption scheme for database security
title_fullStr Flat role based access control and encryption scheme for database security
title_full_unstemmed Flat role based access control and encryption scheme for database security
title_sort flat role based access control and encryption scheme for database security
publishDate 2013
url http://eprints.utm.my/id/eprint/41635/
http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:78170?queryType=vitalDismax&query=Flat+role+based+access+control+and+encryption+scheme&public=true
_version_ 1672610432590807040
score 13.149126