Database Security Model Using Access Control Mechanism in Student Data Management
Database Security Model Using Access Control Mechanism in Student Data Management
Volume: 3 | Issue: 3 | Mar-Apr 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Paper ID – IJTSRD22820 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 529
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
access control, students may be given the ability to browse retrieve their records. In this paper the following functions
course offerings but not to peruse grades assigned to their are defined in relation to the student data management
classmates. Limiting access to database objects can be environment:
demonstrated through the Grant/Revoke access control
mechanism. Generally, access control is defined in three An administrator roles: These role includes multiple
ways: Mandatory Access Control (MAC), Discretionary function, within the administrator one can define first the
Access Control (DAC), and Role Based Access Control name and user’s types, second assign privileges to users. He
(RBAC). can assign a permission to a user, and authorizes or defines a
password for users.
I. Discretionary access control (DAC)
Discretionary access control (DAC) is a type of security The head of department roles: In this model, the
access control that grants or restricts object access via an administrator give to the head of department all privileges of
access policy determined byan object's owner group and/or the access right.
subjects. DAC mechanism controls are defined by user
identification with supplied credentials during A professor roles: In this system, an administrator give to a
authentication, such as username and password. DACs are professor all permission of student performance
discretionary because the subject (owner) can transfer information. He can give all or restrict access right to
authenticated objects or information access to other users. lecturer or can revoke his permission.
In other words, the owner determines object access
The clerk role: In the student data management system, the
privileges.
head of department give to the clerk insert permission. He
II. Mandatory access control (MAC) has for privilege to register a new student. He has to fill the
This policy allows a data user to access a certain data item information such as name, DOB, Father Name, age, gender,
only when his authority level matches the security level of etc.… according to the role.
the data item. MAC was mainly used and implemented in the
A student role:
military environments. The most common model of MAC is
He or She can read only his/ her students records and cannot
the multilevel security policy where access from subjects to
other access to the records.
objects is based on classes or clearance levels assigned to
subjects and labels assigned to Objects User roles and permissions
are enforcing security in the system, access control policies
III. Role-based access control (RBAC)
define the user’s rights on objects. It also defines the
Role-based-access-control (RBAC) is a policy neutral access
identification and authentication of each role. In this model,
control mechanism defined around roles and privileges. The
policies define which permissions are established to roles
components of RBAC such as role-permissions, user-role and
figure 1 in the student data management.
role-role relationships make it simple to perform user
assignments. RBAC can be used to facilitate administration of
security in large organizations with hundreds of users and
thousands of permissions. Although RBAC is different from
MAC and DAC access control frameworks, it can enforce
these policies without any complication.
@ IJTSRD | Unique Paper ID - IJTSRD22820 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 530
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
TABLE II: Subject table important constructs confidentiality, integrity and
S_code Name availability. Access control maintains a separation between
CST-201 Java users on one hand and various data and computing
CST-202 Mathematics resources on the other. In student data management
CST-203 Digital Fundamentals environment have unique specific security and privacy
CST-204 Database System requirements. If management would like to apply access
CS-206 Software Engineering control mechanism in this information system to reduce the
administrative tasks and manage the smooth running of the
TABLE III: Stu_performance table student performance, then several context awareness, strong
Sid S_code Category personalization of access control policies that is efficient,
1 CST-201 Good flexible and fairly generic must be adopted. The adoption of
database systems as the key data management technology
1 CST-202 Excellent
for day-to-day operations and decision making has
1 CST-203 Good
overwhelmingly increased which makes the security of data
1 CST-204 Good
managed by these systems becomes crucial Role. It is widely
1 CS-206 Good
used in different areas to provide efficient and flexible access
2 CST-203 Poor to databases.
2 CST-204 good
G. References
E. Acess control Grant and Revok [1] https://en.wikipedia.org/wiki/Access_control
In the database security model, the ability to grant
authorization to perform actions on objects resides with the [2] https://searchsecurity.techtarget.com/definition/acce
authorize user of the object. A security policy specifies who ss-control
is authorized to do what and based on the privileges for [3] Surajit Chaudhuri, Raghav Kaushik, Ravi Ramamurthy
objects and views. “Database Access Control & Privacy: Is There A
Common Ground?”
AUTHORIZE IN SQL: THE GRANT COMMAND. If a user has a
privilege with the GRANT OPTION, can pass privilege on to [4] Meg Coffin Murray -Kennesaw State University,
other users with or without passing on the GRANT OPTION Kennesaw, GA, USA “Database Security: What Students
Syntax: GRANT privileges ON object TO users [WITH GRANT Need to Know”.
OPTION] [5] “KalpeshV.Chaudri A Survey on Secure Access Control
Privileges of authorized persons: Mechanism of Geospatial Data”.
For head of department: create user ‘department
head’@’locaclhost’ identified by ‘secure1’; [6] Tresa F Lunt “Access Control Policies”
Grant all on student_info.* to ‘department head’ with grant [7] Akshay Patil* and Prof. B. B. Meshram “Database Access
option; Control Policies”
For professor: create user ‘professor’@’locaclhost’ identified
by ‘secure2’; [8] Kriti, Indu Kashyap “Database Security & Access
Grant all on student_info. stu_performance to ‘professor’ Control Models: A Brief Overview”
with grant option; [9] cj date “Introduction to database system”.
For lecturer: create user ‘lecturer’@’locaclhost’ identified by
‘secure3’; [10] Ji-Young Lim, Woo-Cheol Kim, Hongchan Roh,
Grant select, insert on student_info. stu_performance to Sanghyun Park “A Practical Database Security Model
‘lecturer’; Using Purpose-Based Database Access Control and
For clerk: create user ‘clerk’@’locaclhost’ identified by Group Concept”.
‘secure4’;
[11] Gregory Saunders1, Michael Hitchens2, and Vijay
Grant insert on student_info.student to ‘clerk’;
Varadharajan2 “Role-Based Access Control and the
Check the user professor is update permission,
Access Control Matrix”.
ERROR 1142(42000): UPDATE command denied to user
‘professor’ @ ‘localhost’ for table stu_performance. [12] Elisa Bertino, Fellow, IEEE, and Ravi Sandhu, Fellow,
REVOKE privileges from lecturer: IEEE “Database Security—Concepts,Approaches, and
REVOKE all on student_info form ‘lecturer’ @ ‘localhost’; Challenges?”
In student data management of database security system,
[13] Avik Chaudhuri “Foundations of Access Control for
grant command is used to provide access on the student
Secure Storage”
database objects to the different users. The revoke removes
user access rights to the database object. [14] Pierangela Samarati1 and Sabrina De Capitani di
Vimercati2 “Access Control: Policies, Models, and
F. Conclusion Mechanisms”
Database security is an important goal of any data
[15] Chia-Chu Chiang and Coskun Bayrak “Modeling Role-
management system. Database security is based on three
Based Access Control Using a Relational Database Tool”
@ IJTSRD | Unique Paper ID - IJTSRD22820 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 531