Examining Security for Different Data Models*

Vartika Puri, Shelly Sachdeva
{"title":"Examining Security for Different Data Models*","authors":"Vartika Puri, Shelly Sachdeva","doi":"10.1145/3474124.3474195","DOIUrl":null,"url":null,"abstract":"Efficient data storage and retrieval in many sectors led to the development of various modeling techniques such as relational model, Entity Attribute Value model and dynamic tables. The aim of this study is to classify the standard threats of the database according to the violation of security properties followed by the examination of different data models from their security viewpoint. A system is said to be secure if it follows three basic pillars of security i.e. confidentiality, integrity and availability. The current research analyses the security threats in database according to violation of basic pillars of security with detailed analysis of SQL injection attack for three data modeling techniques, namely relational model, Entity Attribute Value (EAV) model and dynamic tables. It presents a comparison of achieving security parameters by performing various experiments on the database stored in MySQL and proposes techniques for the application of mandatory access control in EAV model and dynamic table. After the rigorous survey and experiments performed, it has been found that EAV model is still not a completely secured model. The data leakage in EAV model is more and the application of security properties is relatively more complex than relational model and dynamic tables. Researches have been conducted in the past on these models but very few of them have discussed the security concerns of EAV model and dynamic tables. This paper tries to compare various data models based on security concerns and highlights the security issues in EAV model.","PeriodicalId":144611,"journal":{"name":"2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3474124.3474195","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Efficient data storage and retrieval in many sectors led to the development of various modeling techniques such as relational model, Entity Attribute Value model and dynamic tables. The aim of this study is to classify the standard threats of the database according to the violation of security properties followed by the examination of different data models from their security viewpoint. A system is said to be secure if it follows three basic pillars of security i.e. confidentiality, integrity and availability. The current research analyses the security threats in database according to violation of basic pillars of security with detailed analysis of SQL injection attack for three data modeling techniques, namely relational model, Entity Attribute Value (EAV) model and dynamic tables. It presents a comparison of achieving security parameters by performing various experiments on the database stored in MySQL and proposes techniques for the application of mandatory access control in EAV model and dynamic table. After the rigorous survey and experiments performed, it has been found that EAV model is still not a completely secured model. The data leakage in EAV model is more and the application of security properties is relatively more complex than relational model and dynamic tables. Researches have been conducted in the past on these models but very few of them have discussed the security concerns of EAV model and dynamic tables. This paper tries to compare various data models based on security concerns and highlights the security issues in EAV model.
检查不同数据模型的安全性*
在许多领域,高效的数据存储和检索导致了各种建模技术的发展,如关系模型、实体属性值模型和动态表。本研究的目的是根据违反安全属性对数据库的标准威胁进行分类,然后从不同的数据模型的安全角度对其进行检查。如果一个系统遵循三个基本的安全支柱,即保密性、完整性和可用性,那么这个系统就是安全的。本研究根据数据库安全的基本支柱,对数据库中的安全威胁进行了分析,详细分析了SQL注入攻击的三种数据建模技术,即关系模型、实体属性值(EAV)模型和动态表。通过对MySQL数据库进行各种实验实现安全参数的比较,提出了EAV模型和动态表中强制访问控制的应用技术。经过严格的调查和实验,发现EAV模型仍然不是一个完全安全的模型。相对于关系模型和动态表,EAV模型中的数据泄漏更大,安全属性的应用也相对复杂。过去对这些模型进行了研究,但很少讨论EAV模型和动态表的安全问题。本文试图比较基于安全考虑的各种数据模型,并着重指出EAV模型中的安全问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信