Inference Attacks and Information Security in Databases

被引:3
|
作者
Poltavtsev, A. A. [1 ]
Khabarov, A. R. [1 ]
Selyankin, A. O. [1 ]
机构
[1] Tver State Tech Univ, Tver 170026, Russia
关键词
cloud computing; data architecture; information security; data processing security; data storage security; ACCESS-CONTROL; AUTHENTICATION; NETWORKS; SYSTEM;
D O I
10.3103/S0146411620080271
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security of modern data architectures implemented in relational DBMS's is analyzed. The emphasis is placed on inference attacks, which are not prevented by traditional access control methods. Examples of such attacks are given and fundamental approaches to protecting against them are analyzed. The development of special software built and operating on the principles of intellectual data analysis is proposed as a security measure.
引用
收藏
页码:829 / 833
页数:5
相关论文
共 50 条
  • [41] Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference
    Khalid, Faiq
    Hanif, Muhammad Abdullah
    Rehman, Semeen
    Shafique, Muhammad
    2018 INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2018), 2018, : 327 - 332
  • [42] Complexity of Insider Attacks to Databases
    Kul, Gokhan
    Upadhyaya, Shambhu
    Hughes, Andrew
    PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17), 2017, : 25 - 32
  • [43] Application of Dynamic Security Technology Architecture for Advanced Directional Attacks in Power System Information Security
    Shen, Wuqiang
    Liu, Ye
    Wu, Qinqin
    Tian, Yiqing
    Liu, Yuling
    Peng, Huaxi
    2018 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2018, : 3042 - 3047
  • [44] Construct New Graphs using Information Bottleneck Against Property Inference Attacks
    Zhang, Chenhan
    Tian, Zhiyi
    Yu, James J. Q.
    Yu, Shui
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 765 - 770
  • [45] Information attacks and security in wireless sensor networks of industrial SCADA systems
    Finogeev, Alexey G.
    Finogeev, Anton A.
    JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2017, 5 : 6 - 16
  • [46] A REVIEW OF INFORMATION SECURITY LAWS TO COUNTER ONLINE THREATS AND ATTACKS IN FIJI
    Jamnadas, Hermann
    Kumar, Anal
    Sharma, Vishal
    Ali, A. B. M. Shawkat
    2021 IEEE ASIA-PACIFIC CONFERENCE ON COMPUTER SCIENCE AND DATA ENGINEERING (CSDE), 2021,
  • [47] A Study on Information Security Attack based Side-Channel Attacks
    Kang, Young-Jin
    Bruce, Ndibanje
    Park, SuHyun
    Lee, HoonJae
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 61 - 65
  • [48] Research on the Cyber Terrorist Attacks and its Impacts on Information Infrastructure Security
    Yao, Dongliang
    Liu, Xiaoqin
    COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 2108 - 2115
  • [49] Survey and taxonomy of information-centric vehicular networking security attacks
    Safwat, Mena
    Elgammal, Ali
    AbdAllah, Eslam G.
    Azer, Marianne A.
    AD HOC NETWORKS, 2022, 124
  • [50] Sharing of Attacks Information across Clouds for Improving Security: A Conceptual Framework
    Waqas, Ahmad
    Yusof, Zulkefli Muhammed
    Shah, Asadullah
    Mahmood, Nadeem
    2014 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014, : 255 - 260