Security is gaining importance once computers became indispensable in every organization. As the new concepts like E-Governance in Government and E-Commerce in business circles etc are heading towards reality, security issues penetrated even into the legal framework of every country. Database security acts as the last line of defence to withstand insider attacks and attacks from outside even if all the security controls like perimeter, OS controls have been compromised. Data protection laws such as HIPAA (Health Insurance Portability and Accountability Act), Gramm-Leach-Bliley Act of 1999, Data protection Act, Sarbanes Oxleys Act are demanding for the privacy and integrity of the data to an extent that the critical information should be seen only by the authorized users which means the integrity of the database must be properly accommodated. Hence, we aim at providing an interface service in between enterprise applications and enterprise database that ensures the integrity of the data. This service acts as a security wrapper around any enterprise database.
[1]
Einar Mykletun,et al.
Providing Authentication and Integrity in Outsourced Databases using Merkle Hash Tree ’ s
,
2022
.
[2]
Richard D. Graubart,et al.
The Integrity-Lock Approach to Secure Database Management
,
1984,
1984 IEEE Symposium on Security and Privacy.
[3]
Chang Nian Zhang,et al.
An integrated approach for database security and fault tolerance
,
2004,
International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[4]
Gene Tsudik,et al.
Authentication and integrity in outsourced databases
,
2006,
TOS.
[5]
Hakan Hacigümüs,et al.
Encrypted Database Integrity in Database Service Provider Model
,
2002,
Certification and Security in E-Services.