Harshita R. Jhurani, P. Chandana, Yarram Vijay Kumar Reddy, M. Sharada
{"title":"Comparing the Access Control Mechanism in Database, Cloud and Femtocells","authors":"Harshita R. Jhurani, P. Chandana, Yarram Vijay Kumar Reddy, M. Sharada","doi":"10.1109/ICECA.2018.8474933","DOIUrl":null,"url":null,"abstract":"Security has been a major issue since the evolution of mankind. Access control refers to providing access to data only to specified users. In the present time, various mechanisms are used and many policies have been implemented to secure the confidential data. These mechanisms are not always easy to be implemented. Many challenges are met during the execution and various devices have been designed in an ad-hoc fashion to meet the present day requirements. The deployment of these devices and methods in various fields has solved the protection issue to a large extent. This paper represents the SQLIA and XSS attacks, the techniques that are compared to few mechanisms used to restrict unethical access to database, cloud and femtocells that followed in day-to-day life, and the challenges met to obtain them.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECA.2018.8474933","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Security has been a major issue since the evolution of mankind. Access control refers to providing access to data only to specified users. In the present time, various mechanisms are used and many policies have been implemented to secure the confidential data. These mechanisms are not always easy to be implemented. Many challenges are met during the execution and various devices have been designed in an ad-hoc fashion to meet the present day requirements. The deployment of these devices and methods in various fields has solved the protection issue to a large extent. This paper represents the SQLIA and XSS attacks, the techniques that are compared to few mechanisms used to restrict unethical access to database, cloud and femtocells that followed in day-to-day life, and the challenges met to obtain them.