Advanced Database Security and Encryption IJERTCONV4IS21016
Advanced Database Security and Encryption IJERTCONV4IS21016
ISSN: 2278-0181
ICRET - 2016 Conference Proceedings
Abstract: Data is more or less part of today’s life of an II. LITERATURE SURVEY
Organization, Enterprise, State and Country. Top of agenda is
to safeguard the data from getting into wrong hands. Choosing As discussed previously confidentiality imposes limits while
database for an entity is an important decision that could save retrieving the secure data and therefore averting the illegal
from future embarrassments and loss - be it socially or
access to the data. Integrity means that the data will not be
commercially. Open source and Commercial databases are
available in the market wherein the latter is not viable tainted in any way. Availability of data on time is the
commercially. This survey paper describes about the property of secure databases. [1][5]
database security threats, various ploys and suitable
techniques to counter them. There are many threats in There are four types of controls mentioned by Denning [1]
database which leaks the information for prohibited purpose. to obtain the database protection, those includes: access
The main threats in database security are Excessive Privilege control, information flow control, cryptographic flow
Abuse, Legitimate Privilege Abuse, Privilege Elevation, control and inference control.
Database Platform Vulnerabilities, SQL Injection, Weak
Audit Trail, Denial of Service, Database Communication
Protocol Vulnerabilities, Weak Authentication and Backup
Data Exposure. The main important method to secure database
from attackers/intruders are Cryptography, Steganography
and Access Control.
I. INTRODUCTION
These policies ensure the security features, privacy, document. This list is taken from a white paper presented by
confidentiality and integrity. This study mainly focuses on Imperva’s Application Defense Center. [3]
issues in databases security and measures taken to solve
those issues. Securing sensitive data from illegal access, Excessive Privilege Abuse - When users are specified with
theft and forging becomes a big challenge for different the access rights that allow them to perform other tasks not
organizations, like government, no-government and privates included in their job, harmful intent can be discovered
sectors. Encryption of data in client or server side where through such tasks thus leading to misuse of such privileges.
data is shared between different parties is not sufficient. When we talk of such abuse, an example of university can
Basically the problem is to ensure that semi trusted database be quoted in which an administrator who is given access to
is secure or not. [6] all databases and holds the privilege to change the records
A new hypothesis for database encryption is proposed in of any student. This may lead to misuse such as changing of
which database encryption can be provided as a service to grades, marks of students or change in the amount of fine
applications with unified access to encrypted database. charged to any student. As a result, all users who perform
Using such an encrypted data management model, different tasks are given default level of privileges that
applications can concentrate on their core businesses and grants access in excess.
protect data privacy against both malicious outsiders and the
untrusted database service users without need to know
encryption details. [12]
The initiative database organization is subject to prodigious Database Platform Vulnerabilities - Vulnerabilities in the
variety of threats. Some serious threats are envisioned in this previous operating systems such as Windows 98, Windows
2000, etc. may create data loss from a database, data
corruption or service denial conditions. For instance, the
blaster worm created denial of service conditions from a Access Control - Access control ensures all communications
vulnerability found in Windows 2000. with the databases and other system objects are according to
the policies and controls defined. This makes sure that no
SQL Injection - Random SQL queries are executed on server interference occurs by any attacker neither internally nor
by some spiteful attacker. In this attack SQL statement is externally and thus, protects the databases from potential
followed by a string identifier as an input. That is validated errors-errors that can make impact as big as stopping firm’s
by the server. If it does not get validated it might get operations. Access control also helps in minimizing the risks
executed. Through these unobstructed rights may gain by that may directly impact the security of the database on the
the attackers to the whole database. main servers. For example, if any table is accidentally
deleted or access is modified the results can be roll backed
Weak Audit Trail - A database audit policy ensures or for certain files, access control can restrict their deletion.
automated, timely and proper recording of database
transactions. Such a policy should be a part of the database Inference Policy - Inference policy is required to protect the
security considerations since all the sensitive database data at a certain level. It occurs when the interpretations
transactions have an automated record and the absence of from certain data in the form of analysis or facts are required
which poses a serious risk to the organization’s databases to be protected at a certain higher security level. It also
and may cause instability in operations. determines how to protect the information from being
disclosed.
Denial of Service - It is the attack that prevents the legitimate
users of a program/application/data to use or access that
specific service. DOS can take place using different
technique. Attacker may get access to database and tries to
crash the server or resource overloading, network flooding
and data corruption can be the techniques for creating
conditions of DOS attack. It is a serious threat for any
organization.
Weak Authentication - A weak authentication strategy User Identification/Authentication - User identification and
renders the databases more vulnerable to attackers. The authentication is the basic necessity to ensure security since
identity of database users are stolen or the login credentials the identification method defines a set of people that are
are obtained through some source which then helps in allowed to access data and provides a complete mechanism
modification of data or obtaining sensitive information and of accessibility. To ensure security, the identity is
if authentication is not properly implemented and is weak, it authenticated and it keeps the sensitive data safe and from
helps the attacker to steal data. being modified by any ordinary user.
Backup Data Exposure - Backup data exposure is an Accountability and auditing - Accountability and audit
important threat that needs to be taken care of. Since checks are required to ensure physical integrity of the data
backups on tapes, DVD’s or any external media are exposed which requires defined access to the databases and that is
to high risks, they need to be protected from attack such as managed through auditing and record keeping. It also helps
theft or destruction. So far we he discussed some important in analysis of information held on servers for authentication,
threats to database security. accounting and access of a user.
Now we shall see what can be done to limit these risks and
threats. Encryption - Encryption is the process of concealing or
transforming information by means of a cipher or a code so
Database Security Considerations that it becomes unreadable to all other people except those
who hold a key to the information. The resulting encoded
To eliminate the security threats every organization must information is called as encrypted information.
define a security policy. And that security policy should be
strictly enforced. A strong security policy must contain well Data is valuable assets of an organization. So its security is
defined security features. Figure 2 shows some critical areas always a big challenge for an organization. In recent times
that need to be considered are explained below. [1][3][4] security of shared databases was studied through
cryptographic viewpoint. A new framework was proposed
in which different keys are used by different parties to any change in existing application. In storage level
encrypt the databases in assorted form that was named as encryption it has to be guaranteed that there should be no
Mixed Cryptography Database (MCDB). [6] copy left unencrypted so it is risky to selectively encrypt the
files e.g., in temporary files,, log files etc. When the data is
Different governmental, non-governmental, and private and saved or recovered from the database then database level
many other organizations have sensitive data on web servers encryption is performed. It is part of the database design.
that really need to be protected from attacker or intruders. Here encryption can be done at selective granularities, like
To make the databases secure different security techniques on row or column or tables. For both storage level and
were developed. One of them is encryption techniques. database level encryption strategies, the encryption keys
Though encryption improves the protection but its must be available ate server side to decrypt the data. The
implementation decisions are also very important. Like third application level encryption is performed within the
what, how, when and where is to be encrypted. . Following application. When selection of keys and encryption
figure 4 shows where encryption takes place. Developing the granularity is made on application logic it provides highest
encryption strategies arises some important questions also, flexibility.
like how, when and where the encryption will be performed.
Encryption algorithm, key size and keys protection are the
parameters that ensure the security. The better the
encryption algorithm is used the better will be the security.
And with strong encryption algorithm, appropriate operation
mode is also very important. To overcome the problem of
unauthorized access of keys, two solutions were proposed.
HSM and Security server approach. After the addition of
security server or HSM that lessen the disclosure of
encryption keys, database is still vulnerable to threats.
and ways to set the database to use in Microsoft SQL Server Comparative Analysis
encryption. This study investigates what Microsoft SQL In this section comparative analysis is performed by taking
Server configurable environment has to offer in terms of three factors from each paper discussed in above literature
data safety, security and application development for survey.
developers. [10]
Encryption in Databases
In [11], a new light weight encryption method is proposed Following table 1 explains how encryption is performed in
that is used for columns stored in data ware houses with databases, what methods, and algorithms are used and where
trusted servers. The new method is called Fats Comparison it is implemented. Different techniques or methods are
Encryption (FCE). Its overhead makes the comparison fats identified in the table 1 below that is used to encrypt the data.
and efficient. So far we have discussed the work done on The table 2 then gives the comparison of those
database security using Encryption. Now the next section methods/techniques.
will present the comparison of the study done so far.
The following section will give an empirical analysis. Medium, Moderate, High and Very High. The percentage
range for criticality is defined below:
Empirical Analysis
CONCLUSION
The Percentage out of 5 papers, frequency and criticality has
Data to any organization is a most valuable property.
been shown in Table 3.
Security of sensitive data is always a big challenge for an
organization at any level. In today’s technological world,
Criticality - To find the measure of frequency of occurrence
database is vulnerable to hosts of attacks. In this study major
of an issue the Criticality factor is divided into four parts i.e.
security issues faced databases are identified and some
encryption methods are discussed that can help to reduce
the attacks risks and protect the sensitive data. It has been
concluded that encryption provides confidentiality but give
no assurance of integrity unless we use some digital
signature or Hash function. Using strong encryption
algorithms reduces the performance. The future work could
be carried out make encryption more effective and efficient.
REFERENCES