Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Reactive and Proactive Methods for Database Protection against Logical Inference Attacks

Reactive and Proactive Methods for Database Protection against Logical Inference Attacks If data is not available to the outside world, it is useless. It must be available so that it can be processed and planned. Regulating and monitoring user access to a database is an important task for the database security community. Protecting a database against logical inference attacks is part of information security to prevent the disclosure of sensitive data through available information (tables and individual records). It is necessary to have methods capable of maintaining a balance between the use of information and the protection of data. The purpose of this work is to compare different inference control methods in order to evaluate the results of methods to minimize both the loss of information and the risk of information disclosure. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Automatic Control and Computer Sciences Springer Journals

Reactive and Proactive Methods for Database Protection against Logical Inference Attacks

Loading next page...
 
/lp/springer-journals/reactive-and-proactive-methods-for-database-protection-against-logical-d7RkjtsIqL
Publisher
Springer Journals
Copyright
Copyright © Allerton Press, Inc. 2022. ISSN 0146-4116, Automatic Control and Computer Sciences, 2022, Vol. 56, No. 8, pp. 888–897. © Allerton Press, Inc., 2022. Russian Text © The Author(s), 2022, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.
ISSN
0146-4116
eISSN
1558-108X
DOI
10.3103/s014641162208017x
Publisher site
See Article on Publisher Site

Abstract

If data is not available to the outside world, it is useless. It must be available so that it can be processed and planned. Regulating and monitoring user access to a database is an important task for the database security community. Protecting a database against logical inference attacks is part of information security to prevent the disclosure of sensitive data through available information (tables and individual records). It is necessary to have methods capable of maintaining a balance between the use of information and the protection of data. The purpose of this work is to compare different inference control methods in order to evaluate the results of methods to minimize both the loss of information and the risk of information disclosure.

Journal

Automatic Control and Computer SciencesSpringer Journals

Published: Dec 1, 2022

Keywords: cyber security; security monitoring; security management; data structuring; data management

References