Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Security of Relational Database Management System: Threats and

Security Techniques
ASHOUR A. N. MOSTAFA

Assistant Lecturer at The Higher Institution of Science and Technology - Tobruk

E-mail: eng.ashour.mostafa@gmail.com

Abstract: or accidental [4]. Therefore, most of the

T
firms are taking account of possibility of
he history of database research threats as measures to their database
backs to more than thirty years, in systems. This paper addresses the relational
which created the concept of the database threats and security techniques
relational database system that has become considerations in relation to situations:
the most fundamental change for threats, countermeasures (computer-based
organizations strategy. Technology controls) and database security methods [1,
evolution has produced more powerful 8, 9].
systems that relate to economic impacts in
the recent decade. Introduction:
Organizations must ensure its information As known, in recent years, hardware
and data be secured and confidential. capability and capacity of volumes, in
Therefore, they deploy systems or addition, huge uses of World Wide Web
applications have functions, services, and platforms and information systems have led
tools for data maintenance and management to adopt the relational database systems as
packed into the so-called Relational infrastructure to the data repository. Huge
Database Management System (RDBMS). amounts of data and information has become
Such functions contain services plus prime concern of security challenges
privileges for authorization to keep because the management of information has
legitimate users (authorized) to access the become decentralized.
database. The database must be insecure.
RDBMS refers to relational database CIA triangle of security that refers to
management systems that are using a confidentiality, integrity, and availability
relational model that developed by the often is the basis of relational database
researcher Codd at IBM laboratory. security concept. These factors must be
existed into application processes to
Database protection means disallowing guarantee the data to be in safe [1].
illegitimate users to access the database and
its sensitive information whether intentional

1
Theft and fraud have an influence on the This paper shows some of the
database environment, and hence the whole countermeasures that are computer-control
corporation. It is not rather making changes based such as authorization, access control,
on the data itself, but it may decrease the backup and recovery, encryption. It must
privacy and integrity. Confidentiality refers taking account the encryption process of
to maintain the secrecy of data, usually only sensitive data require high performance of
is critical to the organization. Breaches of the system because it will need decrypting
security resulting in loss of confidentiality of those data. Therefore, the programmer
could lead to loss of privacy and must ensure using optimized security
competitiveness. Failure of integrity means algorithms while coding the application [8,
the data is corrupt and modified.. Many 9].
organizations are seeking the availability,
the so-called 24/7 availability (that is, 24
hours a day, 7 days a week). Loss of 1. What are the Attacks?
availability means the system, or the data, or
both cannot be accessed. Therefore, Rapid evolution of breach methods to the
relational database management system aims SME organizations called to adopt standards
to reduce the losses that are caused by of security measures like CIA. However, it
threats or anticipated events. Threat is a becomes sophisticated due to diversity of
situation or an event that may adversely attacks either direct or indirect.
affect a system, and hence the organization.
The organization should invest time and The unclassified user can have legal access
effort to detect and identify the most serious to the database to use public information,
threats [1, 8, 9]. but he may be able to infer classified
information. There are three levels of attacks
Millions of online operations conduct via to the relational databases: direct, indirect
unreliable Internet connection such as and by tracking. Direct attack is obvious.
electronic commerce and electronic banking. The attacker can easily access to the
Those types of transactions impose a kind of database if it does not have any protection
transferring sensitive assets and information mechanism. Indirect attack is used by
[2]. This is a challenge to the services expecting the desired data from displayed
providers to get user’s trust. Therefore, it data using combinations of queries. The
has a strong protection of data containers tracking attack is executed by suppression of
such a RDBMS. Not all kind of data require the dominant results [3].
being safe and protected, but the most
critical data that relate to users’ information RDBMS threats can be summarized as:
and money transactions. Corporation can  The administrator could be grant the user
specify the nature of information needed to privileges that not required. Abuse of
be encrypted with high level of security such uses of these privileges may lead to
as ministry of defense [8, 9]. create trapdoors of the application.

2
 The user has a legitimate privilege  Integrity.
access to the database. He/She may have
bad intention to abuse the utility. Authorization is granting process of a right
or privilege to a subject (a user or a
 One of the threats is vulnerability of the
program) to have legitimate access to a
software or the operating system. This
system or systems’ objects. It involves the
helps the intruder to breach sensitive
authentication of subject requesting access
information as backdoors.
to objects. The administrator usually create
accounts with specific privileges according
to the security level of the user.
1.1. Mechanisms of Attack Control
[3]: Access Controls into a relational database
can allow/disallow the user to access the
 Rejection without any response when the system. RDBMS keeps track the privileges
requests for accessing the database to process.
display the results of sensitive data. Views are consequence of flexible
 Disability of the intruder to guess the operations were being conducted on the
real information or values because the main relation. It is a mechanism of dynamic
system will display the results close to processes of security, in which it shows
the real ones. parts and hide other parts according to the
 When the sensitive data will be detected, users’ privileges.
the system should limit the results to
prevent the attacker to reveal the data. Process of Backup As known, the backup
 Combination of the results will make the means capturing a copy of log files of
attacker to be confused about knowing instance processes plus a copy of the
the sensitive data. relational database periodically and storing
either on external storage or cloud to restore
later.

2. Countermeasures (Computer- Integrity is a process to maintain a secure


based Control): RDBMS by preventing data from becoming
invalid, and hence misleading or incorrect
This type ranges from physical controls to results.
administrative procedures. It can be
categorized into various forms of control as
[1]:
3. Techniques of RDBMS Security:
 Authorization.
Encryption is encoding process of sensitive
 Access controls
data to become unreadable. Most of
 Views.
relational database management systems
 Process of Backup. support this purpose to secure its data [4].

3
The encryption concept has four main encrypted/ decrypted using Encryption
factors that are defined as [5]: algorithms.

 An encryption key to encrypt the data Web-based database security: the


(plaintext). transmitted data from a server to a client
 An encryption algorithm with the must be in a secured way. The client should
encryption key transforms the plaintext be authenticated such as Host Identity
to cipher text. Protocol (HIP). It sets up a trusted
 A decryption key to decrypt the cipher relationship between hosts on the Internet by
text. passing to the web server. The HIP and Web
 A decryption algorithm with the server help in authentication process [2].
decryption key transforms the cipher text
back into the plaintext.
Log file is an important file to monitor the
Two forms of encryption techniques that
processes and operations occurred online. It
called symmetric and asymmetric. The
periodically tracks the status of operations to
symmetric one depends on the safe channel
indicate the modification may occur when
while exchanging the key, in addition, the
the system fails. It also integrates with the
key of encryption is similar to the key of
audit module to track the log file of the users
decryption that is being utilized, for
to guarantee the web database security [1].
instance, IDEA (international data
encryption algorithm) [6, 7]. Symmetric Negative Database: this process depends on
algorithm is much faster than the adding false data to the original to make the
asymmetric algorithm that uses two different malicious users to be confused, and only
keys (private and public keys) such as RSA valid to legal users. It has four modules:
(the name is derived from Ron Rivest, Adi database cache, database encryption
Shamir, and Leonard Adleman). Generally, algorithm, virtual database, and negative
they are often used together, in which public database conversion. The first three
key (asymmetric) encrypts a randomly generates the data for the conversion to
generated encryption key, and the random generate false data [2].
key encrypts the actual message (using a
symmetric algorithm). The database scheme 4. How to develop a relational
of encryption should enhance sharing of data database encryption strategy?
within the database without losing data
privacy [2, 6-9]. It is a mechanism of increasing the strength
of the data protection. Many factors to get
To improve the performance, the data strong encryption into RDBMS:
should be divided into sensitive data and
insensitive data. The insensitive data can be  The encryption should be implemented
retrieved rapidly, and the sensitive data is on the database or the application.
 The accessing to the encryption key.

4
 The amount of data that should be It relates to how to manage the key that
encrypted. is used into RDBMS in terms of number
 Is there any influencing on the of keys, the location of keys and the
performance? protection of the accessing of the
 For the programmer and the developer encrypted keys.
most of the responsibilities through
creating or developing the database 4.1. Solutions of implementing
management system. encryption:
The programmers should be aware from
creating trapdoors that can be formed i. Inside the Relational Database
through setting the policies and procedures. Management System (RDBMS):

Two strategies for encrypting the database It is a simple way using the
and both have advantages and encryption/decryption method by
disadvantages: RDBMS. It is a transparent to the
application. When the data inserts
 Encryption the RDBMS.
inside the RDBMS, the data will be
 Performing the encryption outside the
encrypted, or decrypted to the
database.
original when display.
A disadvantage of encryption inside
1. Fundamentals of Encryption:
the RDBMS is an extra processing
Algorithm and key size are factors to
load and decreasing in performance.
encrypt data within RDBMS.
Administrator of the application may
ii. Outside the Relational Database
grant legitimate access to authorized
Management System (RDBMS):
users for need.
Using the client/server security
2. Data encryption effect on RDBMS:
protocol (SSL) helps the data to be
Encrypting the data needs high process
encrypted in the application whether
operations. This drives to increase the
in the source or to the destination.
size of RDBMS, then deceasing the
The protection differs from
utility or the performance. Consequently,
application to another.
sensitive data must be encrypted.
The solution is using the Encryption
Server to provide a centralized
3. Data stream into the application:
encryption services for the whole
Data usually flows over Internet and an
database. The drawbacks include
internal network. Therefore, the potential
communication overhead,
of risk is high.
administering more servers and
changing the applications.
4. The key management:

5
Conclusion:
[6] Shaefer, E. F. (1996). A Simplified Data
Encryption Standard Algorithm. Journal of
This report is to explain different methods of Cryptologia, 20 (1), 77-84.

database security. Database risks are [7] Chang, H. S. (2004). International Data
increasing by the risks of disclosure data. Encryption Algorithm. Retrieved from
http://scholar.googleusercontent.com/scholar?
The programmers of RDBMS have q=cache:WXJPT0eEM7EJ:scholar.google.com/
responsibilities to increase and improve the +International+Data+Encryption+Algorithm&hl=en
security techniques of the databases without &as_sdt=0,5 on 15 February 2013.
affecting on the performance. In addition, [8] Almasri, O., & Jani, H. M. Introducing an
the user has responsibilities especially the Encryption Algorithm based on IDEA.
ethics of using the sensitive data. We have
[9] Almasri, O., Jani, H. M., Ibrahim, Z., & Zughoul,
described the types of Attacks and threat O. (2013). Improving Security Measures of E-
that the database could face them. Then, it Learning Database. International Organization of
Scientific Research-Journal of Computer
has explained some mechanisms of attack
Engineering (IOSR-JCE), 10(4), 55-62.
control. It has explained about the
countermeasures that are computer-based [10] Muntjir, M., Aljahdali, S., Asadullah, M., &
Haq, J. (2014). Security Issues and Their Techniques
and has concentrated on the encryption in DBMS-A Novel Survey. International Journal of
method. In the same approach, it has Computer Applications, 85(13).
described the database security techniques
[11] Thuraisingham, M. B. (1987). Security checking
or method. The last part is about the benefits in relational database management systems
and drawbacks of using either encryption augmented with inference engines. Computers &
Security, 6(6), 479-492.
inside RDBMS or outer.
[12] Bertino, E., & Ferrari, E. (2018). Big data
security and privacy. In A Comprehensive Guide
Through the Italian Database Research Over the Last
References: 25 Years (pp. 425-439). Springer, Cham.

[1] T.Connolly, C. Begg. “Database Systems


A Practical Approach to Design, Implementation, and
Management”, 4th ed., Ed. England: Person Education
Limited, 2005, pp. 542-547, 550-551.

[2] Burtescu, E. (2009). Database Security-Attacks


and Control Methods. Journal of Applied
Quantitative Methods, 4(4), 449-454.

[3] Kayarkar, H. (2012). Classification of Various


Security Techniques in Databases and their
Comparative Analysis. arXiv preprint
arXiv:1206.4124.

[4] Kahate, A. (2013). Cryptography and network


security. Tata McGraw-Hill Education.

[5] Stallings, W., & Brown, L. (2008). Computer


security. Principles and Practice.

You might also like