Open Access Open Access  Restricted Access Subscription Access

SECURE:An Ameliorated SQL Semiotic for Security


Affiliations
1 Department of Computer Science and Engineering, R. L. Jalappa Institute of Technology, Bangalore 561203, India
2 Department of Information Science and Engineering, Vemana Institute of Technology, Bangalore 560034, India
 

The Information Systems, Databases are vital and critical in the arena of Business, Enterprise, Governance etc., for the decision making. Further, the Information Systems are designed to reach maximum number of people for interaction with system. This intent of system usage appears to be resourceful but the identification of reliable users of system has challenged the technocrats

Most of the applications uses relational data base system (RDBMS) for the database support but with intelligent exploitation of vulnerability in Structured Query Language (SQL) of RDBMS, the dishonest people are interested in manipulation or processing of the data for business value reduction or damage

This paper attempts to endow with security to a relational database system by the inclusion of newly designed semiotic to keyword SECURE into a lexicon of SQL. Then the semiotic is articulated in relational algebraic expression for current query engine execution.


Keywords

Query, Security, Relation, Set Difference, Semiotic.
User
Notifications
Font Size

  • Ajeet Chikkamannur, “Design of Fourth Generation Language with Blend of Structured Query Language and Japanese Basic English”, Ph.D. thesis, Visvesvarya Technological University Belgaum, 2013
  • Ajeet Chikkamannur, Shivanand Handigund, “A Concoct Semiotic for Recursion in SQL”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), ISSN: 2278-6856, Vol. 2, Issue 3, page 204-210, June 2013
  • Ajeet Chikkamannur, Shivanand Handigund, “Automated Methodology to Reduce the Redundancy in Relational Database”, Elixir Comp. Science. & Engineering 61, ISSN: 2229-712X, page 16946-16949, August, 2013
  • Ajeet Chikkamannur, Shivanand Handigund, “An Ameliorated Methodology for Ranking the Tuple” International Journal of Computers and Technology(IJCT), Vol 14, No. 4, pp 5616-5620, January 2015
  • Amit Chaturvedi et al, “Analysis of SQL Injections Attacks and Vulnerabilities”, International Journal of Advanced Research in Computer Science and Software Engineering ,Volume 6, Issue 3, 2016
  • Atefeh Tajpour et al, “SQL Injection Detection and Prevention Techniques” International Journal of Advancements in Computing Technology, Vol 3, Issue 7, pp 82-91, DOI: 10.4156/ijact.vol3.issue7.11, 2011
  • C. J. Date, A. Kannan, S. Swaminathan, “An Introduction to Database Systems”, 8th Edition, Pearson Education (Dorling Kindersley (India) Pvt. Ltd.), 2008.
  • E.F. Codd, "A Relational Model of Data for Large Shared Data Banks", Comm. ACM 12 (6), page 377-387, 1970

Abstract Views: 182

PDF Views: 2




  • SECURE:An Ameliorated SQL Semiotic for Security

Abstract Views: 182  |  PDF Views: 2

Authors

Ajeet A. Chikkamannur
Department of Computer Science and Engineering, R. L. Jalappa Institute of Technology, Bangalore 561203, India
Shivanand M. Handigund
Department of Information Science and Engineering, Vemana Institute of Technology, Bangalore 560034, India

Abstract


The Information Systems, Databases are vital and critical in the arena of Business, Enterprise, Governance etc., for the decision making. Further, the Information Systems are designed to reach maximum number of people for interaction with system. This intent of system usage appears to be resourceful but the identification of reliable users of system has challenged the technocrats

Most of the applications uses relational data base system (RDBMS) for the database support but with intelligent exploitation of vulnerability in Structured Query Language (SQL) of RDBMS, the dishonest people are interested in manipulation or processing of the data for business value reduction or damage

This paper attempts to endow with security to a relational database system by the inclusion of newly designed semiotic to keyword SECURE into a lexicon of SQL. Then the semiotic is articulated in relational algebraic expression for current query engine execution.


Keywords


Query, Security, Relation, Set Difference, Semiotic.

References