JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Study on the Technical Security Factor for the Implementation of Secure DB System
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Study on the Technical Security Factor for the Implementation of Secure DB System
Yoon, Sun-Hee;
  PDF(new window)
 Abstract
This paper introduces Database security to prevent the rapidly increasing issue of private information leakage. The Database security examined in the paper separates into DB access control area and DB encryption area which further leads the paper to analyze the factors of the two areas and suggest necessary elements for creating stable Database security. In addition, the paper examines previous DB security programs by areas and analyzes pros and cons from the tested result. The experiment indicated that while DB access control presents less degradation and reduced the need to modify the existing DBMS since the access control operates at the end point of the network, DB encryption presented strength in protecting the data from unauthorized access. On the other hand, DB access control is less useful in preventing the attack in advance which leaves the log to enable tracking afterward while DB encryption can only be operated by limited types of Database and causes degradation due to system load and shows higher percentage of failure when creating the system. This paper examines characteristics of Database security areas in order to be used as a reference for institutions or companies seeking stable Database security.
 Keywords
Technical Security Factor;DB access control;DB Encryption;
 Language
Korean
 Cited by
 References
1.
http://www.dbguide.net/db.db?cmd=view&boardUid=152806&boardConfigUid=9&categoryUid=216&boardIdx=146&boardStep=1

2.
Eong-Jun Kang, "Sucessful DB Security System Implmentation Method", Technical paper, Softforum,, 2012

3.
Joo Kyung-Soo, Woo Jung-Woong, "An Object-Oriented Analysis and Design Methodology for Secure Database Design-focused on Role Based Access Control", Journal of the Korea Society of Computer and Information, vol.18, no. 6, pp.63-70, June. 2013. crossref(new window)

4.
DatabaseSecurity(Common-sensePrinciples), http://www.governmentsecurity. org/articles/DatabaseSecurityCommon-sensePrinciples.php

5.
http://www.kdb.or.kr/info/info_05_.php

6.
http://cafe.naver.com/volthee/120

7.
http://redkite777.tistory.com/315

8.
Jong-Il, Pak, Dae-Woo Park, "A Study on DB Security Problem Improvement of DB Masking by Security Grade", Journal of the Korea Society of Computer and Information, vol.14, no. 4, pp.101-109, April. 2009.

9.
Analysis Report of New Trend of DB Encryption and Security Technology, Financial Security Agency, September, 2012.

10.
Tae-Hee Park, "Database Encryption Police-Introduction of DataSecure", KSCI Review, vol.16, no 1, pp.61-72, Jan. 2008.

11.
Young-Dae Ko, Sang-Jin Lee, "Proposal of Personal Information DB Encryption Assurance Framework", Journal of the Korea Institute of Information Security and Cryptology, vol.24, no. 2, pp.397-409, April, 2014 crossref(new window)

12.
Seong-Yoon Shin, "A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis ", Journal of the Korea Society of Computer and Information, vol.19, no. 7, pp.87-93, July. 2014. crossref(new window)

13.
Joo Kyung-Soo, Woo Jung-Woong, "An Object-Oriented Analysis and Design Methodology for Secure Database Design -focused on Role Based Access Control", Journal of the Korea Society of Computer and Information, vol.18, no. 6, pp.63-70, June. 2013. crossref(new window)

14.
Woo Seok Seo, Jung Oh Park, Moon Seog Jun, "A Design of Policy Treatment Techniques of Access Control Inference based Convergence Security System", Korea Information Science Society Journal:Information Communication, vol.38, no. 6, pp.422-430, June. 2011.

15.
Eui-Kil Lee, "Encrption Solution for Personal Information Security, Vometric Data Security Introduction", Technical Paper, COMAS, 2013

16.
Hyun-A Park, Dong-Hoon Lee, Taek-Young Jeong, Young-Taek, Jeong, "Comprehensive Study on Security and Privacy Requirements for Retrieval System over Encrypted Database", Journal of the Korea Institute of Information Security and Cryptology, vol.22, no. 3, pp.621-635, June, 2012