Browse > Article
http://dx.doi.org/10.9708/jksci.2014.19.12.143

Study on the Technical Security Factor for the Implementation of Secure DB System  

Yoon, Sun-Hee (Major in Digital Media, Soong Eui Women's College)
Abstract
This paper introduces Database security to prevent the rapidly increasing issue of private information leakage. The Database security examined in the paper separates into DB access control area and DB encryption area which further leads the paper to analyze the factors of the two areas and suggest necessary elements for creating stable Database security. In addition, the paper examines previous DB security programs by areas and analyzes pros and cons from the tested result. The experiment indicated that while DB access control presents less degradation and reduced the need to modify the existing DBMS since the access control operates at the end point of the network, DB encryption presented strength in protecting the data from unauthorized access. On the other hand, DB access control is less useful in preventing the attack in advance which leaves the log to enable tracking afterward while DB encryption can only be operated by limited types of Database and causes degradation due to system load and shows higher percentage of failure when creating the system. This paper examines characteristics of Database security areas in order to be used as a reference for institutions or companies seeking stable Database security.
Keywords
Technical Security Factor; DB access control; DB Encryption;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 http://www.dbguide.net/db.db?cmd=view&boardUid=152806&boardConfigUid=9&categoryUid=216&boardIdx=146&boardStep=1
2 Eong-Jun Kang, "Sucessful DB Security System Implmentation Method", Technical paper, Softforum,, 2012
3 Joo Kyung-Soo, Woo Jung-Woong, "An Object-Oriented Analysis and Design Methodology for Secure Database Design-focused on Role Based Access Control", Journal of the Korea Society of Computer and Information, vol.18, no. 6, pp.63-70, June. 2013.   과학기술학회마을   DOI   ScienceOn
4 DatabaseSecurity(Common-sensePrinciples), http://www.governmentsecurity. org/articles/DatabaseSecurityCommon-sensePrinciples.php
5 http://www.kdb.or.kr/info/info_05_.php
6 http://cafe.naver.com/volthee/120
7 http://redkite777.tistory.com/315
8 Jong-Il, Pak, Dae-Woo Park, "A Study on DB Security Problem Improvement of DB Masking by Security Grade", Journal of the Korea Society of Computer and Information, vol.14, no. 4, pp.101-109, April. 2009.   과학기술학회마을
9 Analysis Report of New Trend of DB Encryption and Security Technology, Financial Security Agency, September, 2012.
10 Tae-Hee Park, "Database Encryption Police-Introduction of DataSecure", KSCI Review, vol.16, no 1, pp.61-72, Jan. 2008.
11 Young-Dae Ko, Sang-Jin Lee, "Proposal of Personal Information DB Encryption Assurance Framework", Journal of the Korea Institute of Information Security and Cryptology, vol.24, no. 2, pp.397-409, April, 2014   과학기술학회마을   DOI   ScienceOn
12 Seong-Yoon Shin, "A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis ", Journal of the Korea Society of Computer and Information, vol.19, no. 7, pp.87-93, July. 2014.   과학기술학회마을   DOI   ScienceOn
13 Joo Kyung-Soo, Woo Jung-Woong, "An Object-Oriented Analysis and Design Methodology for Secure Database Design -focused on Role Based Access Control", Journal of the Korea Society of Computer and Information, vol.18, no. 6, pp.63-70, June. 2013.   과학기술학회마을   DOI   ScienceOn
14 Woo Seok Seo, Jung Oh Park, Moon Seog Jun, "A Design of Policy Treatment Techniques of Access Control Inference based Convergence Security System", Korea Information Science Society Journal:Information Communication, vol.38, no. 6, pp.422-430, June. 2011.
15 Eui-Kil Lee, "Encrption Solution for Personal Information Security, Vometric Data Security Introduction", Technical Paper, COMAS, 2013
16 Hyun-A Park, Dong-Hoon Lee, Taek-Young Jeong, Young-Taek, Jeong, "Comprehensive Study on Security and Privacy Requirements for Retrieval System over Encrypted Database", Journal of the Korea Institute of Information Security and Cryptology, vol.22, no. 3, pp.621-635, June, 2012   과학기술학회마을