SlideShare a Scribd company logo
1 of 15
NEGATIVE DATABASE
FOR DATA SECURITY
Shivnandan Singh Chauhan
Mtech (CSE)
1201102021
5/27/2014
1
ShivnandanSingh
DATABASE
 A database is an organized collection of data.
The data is typically organized to model relevant
aspects of reality in a way that supports
processes requiring this information.
5/27/2014
2
ShivnandanSingh
NEGATIVE DATABASE
 A negative database can be defined as a
database that contains huge amount of data
which consists of counterfeit data along with the
actual data.
 A few approaches that describe this concept have
been proposed but have not yet been
implemented to work for real world databases.
5/27/2014
3
ShivnandanSingh
DATABASE SECURITY IMPORTANCE
 Database Security has become an important
issue in today’s world. Organizations have
become highly dependent on the database for
their daily operations.
 The objective of database security is to prevent
undesired information disclosure and
modification of data while ensuring the
availability of the necessary service. With the
increase in the use of World Wide Web in recent
years emphasize the web database security.
5/27/2014
4
ShivnandanSingh
CLASSIFICATION SCHEME
In best of my knowledge database security are
classified based on the type of information security and
models.
 Encryption
 Negative Database
 Web-based Database Security
 Authentication and Access Control
 Timeliness and Security in Real-time Database
Systems
 Testing Schemes for SQL Injections
5/27/2014
5
ShivnandanSingh
ENCRYPTION
 This is the process of transforming plain text
information using encryption algorithms (called
cipher) to make it unreadable to anyone except
those possessing special knowledge, usually
referred to as a key.
 The traditional database systems using plain
text have many threats of data corruption and
collapse of database. To avoid these threats, the
data is stored in encrypted form in the database.
5/27/2014
6
ShivnandanSingh
WEB-BASED DATABASE SECURITY
 Some Methods are proposed to establish security
of Web database against illegitimate intrusion.
 The data transmission from server to the client
should be in a secured way (use Secure Socket
Layer).
 Host identity of an end system should be
authenticated.
5/27/2014
7
ShivnandanSingh
TESTING SCHEMES FOR SQL
INJECTIONS
 SQL injection is a code injection technique that
exploits a security vulnerability occurring in the
database layer of an application.
5/27/2014
8
ShivnandanSingh
TESTING SCHEME TO STOP SQL INJECTIONS
IN THE BEGINNING
 Database Security Testing Scheme to detect
potential input points of SQL injection,
automatically generate test cases and find
vulnerability of databases by running these test
cases to make a simulation attack to an
application.
5/27/2014
9
ShivnandanSingh
CONCEPT OF NEGATIVE DATABASE TO
HELP PREVENT DATA THEFT
A framework which manipulates the original
data and stores it in a database. This framework
mainly consists of four modules
 Database catching
 Virtual database encryption
 Database Encryption algorithm
 Negative Database conversion algorithm.
5/27/2014
10
ShivnandanSingh
ARCHITECTURE
5/27/2014
11
ShivnandanSingh
DATABASE CACHING
 In our framework we are using system-derived
timestamps as keys. Thus the complexity of the
database caching algorithm O(n), when the whole
database needs to be searched for a particular
tuple.
5/27/2014
12
ShivnandanSingh
VIRTUAL DATABASE ENCRYPTION
 This layer depends on the timestamp generation
and the conversion of the data into ASCII values.
Thus the computation time is O(n) where n is the
length of the used password.
5/27/2014
13
ShivnandanSingh
AUTHENTICATION AND ACCESS
CONTROL
 Authentication is used to check properly the
identity of the user and Access Control controls
the user actions or operations. Access Control
gives different privileges to different
authenticated users.
5/27/2014
14
ShivnandanSingh
Questions or Comments?
5/27/2014
15
ShivnandanSingh

More Related Content

What's hot

Database Security Management
Database Security Management Database Security Management
Database Security Management
Ahsin Yousaf
 

What's hot (20)

Distributed database
Distributed databaseDistributed database
Distributed database
 
Database security
Database securityDatabase security
Database security
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
 
Database Systems Security
Database Systems SecurityDatabase Systems Security
Database Systems Security
 
Adbms 16 object definition language
Adbms 16 object definition languageAdbms 16 object definition language
Adbms 16 object definition language
 
Database security
Database securityDatabase security
Database security
 
Information Security
Information SecurityInformation Security
Information Security
 
NOSQL- Presentation on NoSQL
NOSQL- Presentation on NoSQLNOSQL- Presentation on NoSQL
NOSQL- Presentation on NoSQL
 
Data warehouse and data mining
Data warehouse and data miningData warehouse and data mining
Data warehouse and data mining
 
Steganography
SteganographySteganography
Steganography
 
Database Security
Database SecurityDatabase Security
Database Security
 
DATA WAREHOUSE IMPLEMENTATION BY SAIKIRAN PANJALA
DATA WAREHOUSE IMPLEMENTATION BY SAIKIRAN PANJALADATA WAREHOUSE IMPLEMENTATION BY SAIKIRAN PANJALA
DATA WAREHOUSE IMPLEMENTATION BY SAIKIRAN PANJALA
 
Database backup & recovery
Database backup & recoveryDatabase backup & recovery
Database backup & recovery
 
Distributed Database
Distributed DatabaseDistributed Database
Distributed Database
 
Database backup and recovery
Database backup and recoveryDatabase backup and recovery
Database backup and recovery
 
Distributed DBMS - Unit 3 - Distributed DBMS Architecture
Distributed DBMS - Unit 3 - Distributed DBMS ArchitectureDistributed DBMS - Unit 3 - Distributed DBMS Architecture
Distributed DBMS - Unit 3 - Distributed DBMS Architecture
 
03 cia
03 cia03 cia
03 cia
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
 

Viewers also liked

Data and database security and controls
Data and database security and controlsData and database security and controls
Data and database security and controls
FITSFSd
 

Viewers also liked (7)

Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
 
Database & Data Security
Database & Data SecurityDatabase & Data Security
Database & Data Security
 
Data and database security and controls
Data and database security and controlsData and database security and controls
Data and database security and controls
 
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL DatabaseModern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
 
Weka project - DataMining
Weka project  - DataMiningWeka project  - DataMining
Weka project - DataMining
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
Database Security
Database SecurityDatabase Security
Database Security
 

Similar to Database security

Ijeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web applicationIjeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web application
Kumar Goud
 

Similar to Database security (20)

SQL INJECTION ATTACKS.pptx
SQL INJECTION ATTACKS.pptxSQL INJECTION ATTACKS.pptx
SQL INJECTION ATTACKS.pptx
 
DBMS SECURITY
DBMS SECURITYDBMS SECURITY
DBMS SECURITY
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security Framework
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORK
 
Securing and Managing the Oracle HTTP Server - White Paper
Securing and Managing the Oracle HTTP Server - White PaperSecuring and Managing the Oracle HTTP Server - White Paper
Securing and Managing the Oracle HTTP Server - White Paper
 
Sub1582
Sub1582Sub1582
Sub1582
 
Ijeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web applicationIjeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web application
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
Ld3420072014
Ld3420072014Ld3420072014
Ld3420072014
 
Dbms_class _14
Dbms_class _14Dbms_class _14
Dbms_class _14
 
Veritas 360 data management
Veritas 360 data managementVeritas 360 data management
Veritas 360 data management
 
SQL Injection: Unraveling the Threats
SQL Injection: Unraveling the ThreatsSQL Injection: Unraveling the Threats
SQL Injection: Unraveling the Threats
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Settle the Score
Settle the ScoreSettle the Score
Settle the Score
 
Presentation1
Presentation1Presentation1
Presentation1
 
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
 
DATABASE SECURITY - ATTACKS AND CONTROL METHODS
DATABASE SECURITY - ATTACKS AND CONTROL METHODSDATABASE SECURITY - ATTACKS AND CONTROL METHODS
DATABASE SECURITY - ATTACKS AND CONTROL METHODS
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Database security

  • 1. NEGATIVE DATABASE FOR DATA SECURITY Shivnandan Singh Chauhan Mtech (CSE) 1201102021 5/27/2014 1 ShivnandanSingh
  • 2. DATABASE  A database is an organized collection of data. The data is typically organized to model relevant aspects of reality in a way that supports processes requiring this information. 5/27/2014 2 ShivnandanSingh
  • 3. NEGATIVE DATABASE  A negative database can be defined as a database that contains huge amount of data which consists of counterfeit data along with the actual data.  A few approaches that describe this concept have been proposed but have not yet been implemented to work for real world databases. 5/27/2014 3 ShivnandanSingh
  • 4. DATABASE SECURITY IMPORTANCE  Database Security has become an important issue in today’s world. Organizations have become highly dependent on the database for their daily operations.  The objective of database security is to prevent undesired information disclosure and modification of data while ensuring the availability of the necessary service. With the increase in the use of World Wide Web in recent years emphasize the web database security. 5/27/2014 4 ShivnandanSingh
  • 5. CLASSIFICATION SCHEME In best of my knowledge database security are classified based on the type of information security and models.  Encryption  Negative Database  Web-based Database Security  Authentication and Access Control  Timeliness and Security in Real-time Database Systems  Testing Schemes for SQL Injections 5/27/2014 5 ShivnandanSingh
  • 6. ENCRYPTION  This is the process of transforming plain text information using encryption algorithms (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.  The traditional database systems using plain text have many threats of data corruption and collapse of database. To avoid these threats, the data is stored in encrypted form in the database. 5/27/2014 6 ShivnandanSingh
  • 7. WEB-BASED DATABASE SECURITY  Some Methods are proposed to establish security of Web database against illegitimate intrusion.  The data transmission from server to the client should be in a secured way (use Secure Socket Layer).  Host identity of an end system should be authenticated. 5/27/2014 7 ShivnandanSingh
  • 8. TESTING SCHEMES FOR SQL INJECTIONS  SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. 5/27/2014 8 ShivnandanSingh
  • 9. TESTING SCHEME TO STOP SQL INJECTIONS IN THE BEGINNING  Database Security Testing Scheme to detect potential input points of SQL injection, automatically generate test cases and find vulnerability of databases by running these test cases to make a simulation attack to an application. 5/27/2014 9 ShivnandanSingh
  • 10. CONCEPT OF NEGATIVE DATABASE TO HELP PREVENT DATA THEFT A framework which manipulates the original data and stores it in a database. This framework mainly consists of four modules  Database catching  Virtual database encryption  Database Encryption algorithm  Negative Database conversion algorithm. 5/27/2014 10 ShivnandanSingh
  • 12. DATABASE CACHING  In our framework we are using system-derived timestamps as keys. Thus the complexity of the database caching algorithm O(n), when the whole database needs to be searched for a particular tuple. 5/27/2014 12 ShivnandanSingh
  • 13. VIRTUAL DATABASE ENCRYPTION  This layer depends on the timestamp generation and the conversion of the data into ASCII values. Thus the computation time is O(n) where n is the length of the used password. 5/27/2014 13 ShivnandanSingh
  • 14. AUTHENTICATION AND ACCESS CONTROL  Authentication is used to check properly the identity of the user and Access Control controls the user actions or operations. Access Control gives different privileges to different authenticated users. 5/27/2014 14 ShivnandanSingh