Please use the attached bibliography to create a research outline from the sources provided in the bibliography. Please see instructions attach for more info
Please use the attached bibliography to create a research outline from the sources provided in the bibliography. Please see instructions attach for more information.
Research Bibliography: Database Security
Orlando Sterling
Dr. Matthew Gonzalez
INFO620
American Public University
1 Dec 2024
Omotunde, H., & Ahmed, M. (2023). A comprehensive review of security measures in database systems: Assessing authentication, access control, and beyond. Mesopotamian Journal of Cybersecurity, 2023(2), 115–133. https://doi.org/10.58496/MJCSC/2023/016
According to the author, the main security measures for database systems should integrate authentication, access control, encryption, auditing, intrusion detection, and privacy-enhancing techniques. Secondly, they must integrate the latest models and security frameworks by using the latest cloud protection technologies, computing, and the Internet of Things (Omotunde & Ahmed, 2023). This study also proposes the use of at least three of the above methods.
Zhou, L., Varadharajan, V., & Hitchens, M. (2013). Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage. IEEE Transactions on Information Forensics and Security, 8(12), 1947–1960. https://doi.org/10.1109/tifs.2013.2286456
This study proposes the use of role-based access control (RBAC) and role-based encryption (RBE) as one of the most strategic ways to encrypt and protect cloud data and storage systems. This method is also ideal for protecting hybrid systems, especially public and private clouds. The method is also significant in encryption and establishing hierarchy, which is ideal for access authority and protection (Zhou et al., 2013). With such, the system can operate seamlessly without any complexities.
Ali, I., Sabir, S., & Ullah, Z. (2019). Internet of Things Security, Device Authentication and Access Control: A Review. Cornell University, 4(4). https://doi.org/10.48550/arxiv.1901.07309
According to this article, any security glitches and impact on the Internet of Things directly affect humans hence the need for proper security systems. The study suggests that device authentication, access controls, and traditional solutions like cryptography are essential for device protection (Ali et al., 2019). Therefore, there is a need to establish traditional and cloud-driven measures to protect, devices related to IoT and cloud computing.
Chennam, K. K., Aluvalu, R., & Shitharth, S. (2021). An Authentication Model with High Security for Cloud Database. Architectural Wireless Networks Solutions and Security Issues, 4(12), 13–25. https://doi.org/10.1007/978-981-16-0386-0_2
In the era of cloud computing, service providers are likely to experience security challenges that significantly affect cloud data and storage. Due to the challenge of trusting third parties to secure data, consumers need a security method they trust and control (Chennam et al., 2021). Therefore, cryptography measures that integrate Cryptographically enforced access control for securing electronic pathological records (CEASE), ciphertext-based attribute-based encryption (CP-ABE), and advanced encryption standard (AES).
Nour, B., Khelifi, H., Hussain, R., Mastorakis, S., & Moungla, H. (2021). Access Control Mechanisms in Named Data Networks. ACM Computing Surveys, 54(3), 1–35. https://doi.org/10.1145/3442150
According to this article, access control should be the key and primary strategy to secure networks. Therefore, security measures can integrate Access control (AC) methods like Encryption-based AC and Encryption-independent AC (Nour et al., 2021). The choice of one should depend on the nature of the data and the system to protect it. Additionally, it should include protocols like Attribute-based AC, Name-based AC, Identity-based AC
Seth, B., Dalal, S., Jaglan, V., Le, D., Mohan, S., & Srivastava, G. (2020). Integrating encryption techniques for secure data storage in the cloud. Transactions on Emerging Telecommunications Technologies, 33(4). https://doi.org/10.1002/ett.4108
This study proposes the use of encryption techniques to protect cloud data and storage systems. To ensure more secure cloud computing technologies, double encryption can be one of the most formidable security strategies (Seth et al., 2020). This strategy can address challenges associated with challenges of integrity, security, confidentiality, and authentication. It is also suitable for protecting multiple cloud systems.
Gudala, L., Reddy, A. K., Sadhu, A. K. R., & Venkataramanan, S. (2022). Leveraging Biometric Authentication and Blockchain Technology for Enhanced Security in Identity and Access Management Systems. Journal of Artificial Intelligence Research, 2(2), 21-50.
The combination of biometric authentication and blockchain technology offers a perfect strategy to secure database and management systems and overcome the existing security loopholes and challenges. The use of biometrics is critical to overcoming common issues associated with passwords while blockchain covers and protects all the major challenges associated with major security frameworks (Gudala et al., 2022). The combination is strategic for access control mechanisms and application security.
Patwary, A. A.-N., Naha, R. K., Garg, S., Battula, S. K., Patwary, M. A. K., Aghasian, E., Amin, M. B., Mahanti, A., & Gong, M. (2021). Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control. Electronics, 10(10), 1171. https://doi.org/10.3390/electronics10101171
This article proposes that the need to protect fog devices should integrate appropriate levels of trust, authentication, privacy, and access control mechanisms. One of the solutions that covers all these five aspects is the block-chain solutions. With such an approach, the system can overcome traditional and evolving threats mainly on cloud computing issues.
,
Using the attached Research Paper Bibliography information with the sources provided, create a Research Paper Outline Using APA format that has headers for each source with 3-4 sentence description of the content) for your paper. Make sure you pull information from the sources in the bibliography citations.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.