This action might not be possible to undo. Are you sure you want to continue?
DATABASE SECURITY VIA COLLABRATIVE DETECTION
would make the entire organization free from the concerns of database breaches. INTRODUCTION . both from inside and outside the organization. once installed. we intend to develop a system wherein complete measures to maintain database security will be implemented. But if the technological side of this context is considered then databases are of very much importance to companies owning the portals. and depending upon the query. Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. through a connection if in case of accessing it from a GUI interface. The access to database generally includes firing of a query to the database. This could lead to losses to the company and even to the shutting down of a company. So.Almost every web-portal today has a back-end database which is used upto million times in a day to access the information. the detection system will examine the user’s past query log and calculate the probability of inferring sensitive information. the database produces the desired output. The system would strive to achieve such a level of efficiency that if such a system. To be precise. the more serious concern is to manage and protect the database from security breaches. based upon this behind-the-scene problem being faced by almost all the companies. This means that apart from trivial database access. The query request will be denied if the inference probability exceeds the pre specified threshold. This was just in layman’s terms.
Facilitate a company to search for best candidates available. User can down load different forms. would serve as the required security cover for the company:- . We will assume that the job portal company has various departments of employees whose task is to provide the right jobs to the right job-seekers. So. • These are just the highlighted features that will be possessed by the system. Only after having large amount of data.As per the concept explained in the abstract. the first and foremost requirement of our project would be to collect large chunks of data in our database. Depending upon the need and demand of the project. which would be very much similar to any other job portal in the market. User can search for different options available. Once. the intended job portal module will have the following features:• • • • • User can apply for jobs online after creating an account. For this purpose. we would be able to implement the security feature and explain it in the best of manner. when implemented. So. Now. then would start the next big task of providing the security measure to the database. User can do online resume posting. to collect data first we will be developing a complete portal in its sense. those employees would be regularly searching the database for more updates on new entries of job-seekers or job-providers. So. some features would be implicitly added or deleted from it. the following constraints. This portal will allow users to enter their records in the databases and the administrator would also have specific interfaces to access and manipulate the data. Facilitate the admin to share important information with the users and company. This is further elaborated. the company wants that a particular section of employees posses the access rights to a particular set of database only. we are through this stage of collecting the data and storing it in the database.
P. from which the access is being made by the employee.• Any employee would be able to access the company’s large database only from the I. then an automatic E-Mail will be generated both to the company that security is being breached and to the employee as well that he is violating the policies of the company. • Any employee would be able to access data of his particular domain only. Any changes felt necessary at the time of implementation will be duly incorporated. If it’s not the assigned I. then it would be a violation of company’s policies. • The administrator will have the facility to generate reports of all the accesses made by it’s employees during a specified period of time. assigned to him by the company. If he does so then again an automatic E-Mail will be generated to both the parties. These again are only the highlights of the security cover being provided to the portal.P. TECHNOLOGY USED . we will track the I. If he tries to access this data from any other I. So.P.. If that limit is exceeded the again an automatic E-Mail will be generated to both the parties.P. Like a person employed to track B.Tech jobs cannot track or access MBA jobs. • Any employee is permitted to make only a fixed number of database accesses in a day/month.
User friendly GUIs to enable even a layman to use the complete system. add and access information about jobs. . Option of report generation to enable the company to review the performance of it’s employees.The platform being used to develop this dynamic system includes the following:• • • • • • Java Server Pages(JSPs) Servlets MySQL Database SQLyog (connection to the database) Eclipse (Integrated Development Environment – Editor) Tomcat Server ADVANTAGES • • • • Complete solution to the prospective job-seekers and job providers to search. Complete security cover for the company hosting the portal by implementing the mentioned constraints.