Title :
Implementation model for access control using log based security: Practical approach
Author_Institution :
Dept. of Comput. Sci., Lovely Prof. Univ., Phagwara, India
Abstract :
This paper proposes an implementation for access control in SQL Server, and the technique is to improve security of the data masking technique devised for secure data warehouse since it stores the sensitive information which needs to be secure from attackers. A large number of techniques have been proposed for the same but based on analysis those techniques produce large overheads. This technique can be implemented in database management system of any kind. By the help of proposed technique, it will get to know the behavior of access strongly based on mining process on intelligently recorded log and other metadata of respective access.
Keywords :
SQL; authorisation; data mining; data warehouses; meta data; relational databases; SQL server; access control; data masking technique; database management system; intelligently recorded log; log based security; metadata; mining process; secure data warehouse; Computers; Data warehouses; Database systems; Encryption; Intrusion detection; Data Encryption; Data Masking; DataWarehouse; Intrusion Detection;
Conference_Titel :
Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in
Conference_Location :
Ghaziabad
DOI :
10.1109/ICACEA.2015.7164717