Preventing Insider Attacks in Databases Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.56831/psen-02-060
Many web applications that rely on centralized databases face vulnerabilities to insider attacks.While these systems implement multiple layers of security measures against external hackers, they may overlook the threat posed by employees who are already within these security layers and have access to privileged information.Users with administrative privileges in the database system can potentially access, modify, or delete data, while also manipulating corresponding log entries to erase any evidence of tampering, making detection nearly impossible.While one approach could involve developing methods to detect and trace such attacks, along with recovering the original data, this report takes a different perspective.Instead of focusing on detection and recovery, we explore a new direction: ensuring that attacks do not occur in the first place.By establishing a system that comprehensively safeguards data integrity, the need for detection, tracing, and recovery can be minimized or eliminated.This report investigates the prevention of insider attacks on databases by utilizing Bluzelle, a NoSQL database that offers decentralized database solutions for decentralized applications.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- http://doi.org/10.56831/psen-02-060
- https://doi.org/10.56831/psen-02-060
- OA Status
- gold
- Cited By
- 1
- References
- 3
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4379390576
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4379390576Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.56831/psen-02-060Digital Object Identifier
- Title
-
Preventing Insider Attacks in DatabasesWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-06-05Full publication date if available
- Authors
-
Sourav Mishra, Vijay Kumar ChaurasiyaList of authors in order
- Landing page
-
https://doi.org/10.56831/psen-02-060Publisher landing page
- PDF URL
-
https://doi.org/10.56831/psen-02-060Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.56831/psen-02-060Direct OA link when available
- Concepts
-
Insider, Insider threat, Database, Computer security, Computer science, Business, Political science, LawTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2024: 1Per-year citation counts (last 5 years)
- References (count)
-
3Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4379390576 |
|---|---|
| doi | https://doi.org/10.56831/psen-02-060 |
| ids.doi | https://doi.org/10.56831/psen-02-060 |
| ids.openalex | https://openalex.org/W4379390576 |
| fwci | 0.43955229 |
| type | article |
| title | Preventing Insider Attacks in Databases |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9975000023841858 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T10734 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.994700014591217 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | Information and Cyber Security |
| topics[2].id | https://openalex.org/T12034 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9930999875068665 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Digital and Cyber Forensics |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C2778971194 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8559374809265137 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q1664551 |
| concepts[0].display_name | Insider |
| concepts[1].id | https://openalex.org/C2776633304 |
| concepts[1].level | 3 |
| concepts[1].score | 0.7722567319869995 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q6038026 |
| concepts[1].display_name | Insider threat |
| concepts[2].id | https://openalex.org/C77088390 |
| concepts[2].level | 1 |
| concepts[2].score | 0.5716593861579895 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q8513 |
| concepts[2].display_name | Database |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.5125501155853271 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C41008148 |
| concepts[4].level | 0 |
| concepts[4].score | 0.4218237102031708 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[4].display_name | Computer science |
| concepts[5].id | https://openalex.org/C144133560 |
| concepts[5].level | 0 |
| concepts[5].score | 0.3624875247478485 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q4830453 |
| concepts[5].display_name | Business |
| concepts[6].id | https://openalex.org/C17744445 |
| concepts[6].level | 0 |
| concepts[6].score | 0.19043424725532532 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q36442 |
| concepts[6].display_name | Political science |
| concepts[7].id | https://openalex.org/C199539241 |
| concepts[7].level | 1 |
| concepts[7].score | 0.07454785704612732 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q7748 |
| concepts[7].display_name | Law |
| keywords[0].id | https://openalex.org/keywords/insider |
| keywords[0].score | 0.8559374809265137 |
| keywords[0].display_name | Insider |
| keywords[1].id | https://openalex.org/keywords/insider-threat |
| keywords[1].score | 0.7722567319869995 |
| keywords[1].display_name | Insider threat |
| keywords[2].id | https://openalex.org/keywords/database |
| keywords[2].score | 0.5716593861579895 |
| keywords[2].display_name | Database |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.5125501155853271 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/computer-science |
| keywords[4].score | 0.4218237102031708 |
| keywords[4].display_name | Computer science |
| keywords[5].id | https://openalex.org/keywords/business |
| keywords[5].score | 0.3624875247478485 |
| keywords[5].display_name | Business |
| keywords[6].id | https://openalex.org/keywords/political-science |
| keywords[6].score | 0.19043424725532532 |
| keywords[6].display_name | Political science |
| keywords[7].id | https://openalex.org/keywords/law |
| keywords[7].score | 0.07454785704612732 |
| keywords[7].display_name | Law |
| language | en |
| locations[0].id | doi:10.56831/psen-02-060 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | |
| locations[0].pdf_url | https://doi.org/10.56831/psen-02-060 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | PriMera Scientific Engineering |
| locations[0].landing_page_url | http://doi.org/10.56831/psen-02-060 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5037053380 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-7296-1140 |
| authorships[0].author.display_name | Sourav Mishra |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I26072440 |
| authorships[0].affiliations[0].raw_affiliation_string | Dept. of Information Technology, Indian Institute of Information Technology Allahabad, Prayagraj, India |
| authorships[0].affiliations[1].raw_affiliation_string | Dept. of Information Technology, Indian Institute of Information Technology Allahabad, Prayagraj, India. |
| authorships[0].institutions[0].id | https://openalex.org/I26072440 |
| authorships[0].institutions[0].ror | https://ror.org/03rgjt374 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I26072440 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Indian Institute of Information Technology Allahabad |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Sourav Mishra |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Dept. of Information Technology, Indian Institute of Information Technology Allahabad, Prayagraj, India, Dept. of Information Technology, Indian Institute of Information Technology Allahabad, Prayagraj, India. |
| authorships[1].author.id | https://openalex.org/A5064240021 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-6146-7128 |
| authorships[1].author.display_name | Vijay Kumar Chaurasiya |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I26072440 |
| authorships[1].affiliations[0].raw_affiliation_string | Dept. of Information Technology, Indian Institute of Information Technology Allahabad, Prayagraj, India |
| authorships[1].affiliations[1].raw_affiliation_string | Dept. of Information Technology, Indian Institute of Information Technology Allahabad, Prayagraj, India. |
| authorships[1].institutions[0].id | https://openalex.org/I26072440 |
| authorships[1].institutions[0].ror | https://ror.org/03rgjt374 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I26072440 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Indian Institute of Information Technology Allahabad |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Vijay Chaurasiya |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Dept. of Information Technology, Indian Institute of Information Technology Allahabad, Prayagraj, India, Dept. of Information Technology, Indian Institute of Information Technology Allahabad, Prayagraj, India. |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.56831/psen-02-060 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2023-06-06T00:00:00 |
| display_name | Preventing Insider Attacks in Databases |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9975000023841858 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W4205304595, https://openalex.org/W1499596878, https://openalex.org/W2075012963, https://openalex.org/W2984824917, https://openalex.org/W2161754059, https://openalex.org/W2001702225, https://openalex.org/W2411226021, https://openalex.org/W2013422737, https://openalex.org/W4378421019, https://openalex.org/W2110108192 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2024 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.56831/psen-02-060 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://doi.org/10.56831/psen-02-060 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | PriMera Scientific Engineering |
| best_oa_location.landing_page_url | http://doi.org/10.56831/psen-02-060 |
| primary_location.id | doi:10.56831/psen-02-060 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | |
| primary_location.pdf_url | https://doi.org/10.56831/psen-02-060 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | PriMera Scientific Engineering |
| primary_location.landing_page_url | http://doi.org/10.56831/psen-02-060 |
| publication_date | 2023-06-05 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W2792850657, https://openalex.org/W2727841152, https://openalex.org/W2140893402 |
| referenced_works_count | 3 |
| abstract_inverted_index.a | 96, 107, 121, 152 |
| abstract_inverted_index.be | 136 |
| abstract_inverted_index.by | 30, 149 |
| abstract_inverted_index.do | 113 |
| abstract_inverted_index.in | 48, 116 |
| abstract_inverted_index.of | 18, 69, 99, 144 |
| abstract_inverted_index.on | 5, 101, 147 |
| abstract_inverted_index.or | 56, 138 |
| abstract_inverted_index.to | 10, 42, 65, 81 |
| abstract_inverted_index.we | 105 |
| abstract_inverted_index.and | 39, 83, 103, 133 |
| abstract_inverted_index.any | 67 |
| abstract_inverted_index.are | 33 |
| abstract_inverted_index.can | 52, 135 |
| abstract_inverted_index.for | 130, 160 |
| abstract_inverted_index.log | 63 |
| abstract_inverted_index.may | 25 |
| abstract_inverted_index.new | 108 |
| abstract_inverted_index.not | 114 |
| abstract_inverted_index.one | 75 |
| abstract_inverted_index.the | 27, 49, 90, 117, 128, 142 |
| abstract_inverted_index.web | 1 |
| abstract_inverted_index.who | 32 |
| abstract_inverted_index.Many | 0 |
| abstract_inverted_index.also | 60 |
| abstract_inverted_index.data | 126 |
| abstract_inverted_index.face | 8 |
| abstract_inverted_index.have | 40 |
| abstract_inverted_index.need | 129 |
| abstract_inverted_index.rely | 4 |
| abstract_inverted_index.such | 85 |
| abstract_inverted_index.that | 3, 111, 123, 155 |
| abstract_inverted_index.they | 24 |
| abstract_inverted_index.this | 93 |
| abstract_inverted_index.with | 45, 88 |
| abstract_inverted_index.NoSQL | 153 |
| abstract_inverted_index.along | 87 |
| abstract_inverted_index.could | 77 |
| abstract_inverted_index.data, | 58, 92 |
| abstract_inverted_index.erase | 66 |
| abstract_inverted_index.first | 118 |
| abstract_inverted_index.occur | 115 |
| abstract_inverted_index.posed | 29 |
| abstract_inverted_index.takes | 95 |
| abstract_inverted_index.these | 13, 36 |
| abstract_inverted_index.trace | 84 |
| abstract_inverted_index.while | 59 |
| abstract_inverted_index.access | 41 |
| abstract_inverted_index.delete | 57 |
| abstract_inverted_index.detect | 82 |
| abstract_inverted_index.layers | 17, 38 |
| abstract_inverted_index.making | 71 |
| abstract_inverted_index.nearly | 73 |
| abstract_inverted_index.offers | 156 |
| abstract_inverted_index.report | 94, 140 |
| abstract_inverted_index.system | 51, 122 |
| abstract_inverted_index.threat | 28 |
| abstract_inverted_index.within | 35 |
| abstract_inverted_index.access, | 54 |
| abstract_inverted_index.against | 21 |
| abstract_inverted_index.already | 34 |
| abstract_inverted_index.attacks | 112, 146 |
| abstract_inverted_index.entries | 64 |
| abstract_inverted_index.explore | 106 |
| abstract_inverted_index.insider | 11, 145 |
| abstract_inverted_index.involve | 78 |
| abstract_inverted_index.methods | 80 |
| abstract_inverted_index.modify, | 55 |
| abstract_inverted_index.systems | 14 |
| abstract_inverted_index.approach | 76 |
| abstract_inverted_index.attacks, | 86 |
| abstract_inverted_index.database | 50, 154, 158 |
| abstract_inverted_index.ensuring | 110 |
| abstract_inverted_index.evidence | 68 |
| abstract_inverted_index.external | 22 |
| abstract_inverted_index.focusing | 100 |
| abstract_inverted_index.hackers, | 23 |
| abstract_inverted_index.measures | 20 |
| abstract_inverted_index.multiple | 16 |
| abstract_inverted_index.original | 91 |
| abstract_inverted_index.overlook | 26 |
| abstract_inverted_index.place.By | 119 |
| abstract_inverted_index.recovery | 134 |
| abstract_inverted_index.security | 19, 37 |
| abstract_inverted_index.tracing, | 132 |
| abstract_inverted_index.Bluzelle, | 151 |
| abstract_inverted_index.databases | 7, 148 |
| abstract_inverted_index.detection | 72, 102 |
| abstract_inverted_index.different | 97 |
| abstract_inverted_index.employees | 31 |
| abstract_inverted_index.implement | 15 |
| abstract_inverted_index.minimized | 137 |
| abstract_inverted_index.recovery, | 104 |
| abstract_inverted_index.solutions | 159 |
| abstract_inverted_index.utilizing | 150 |
| abstract_inverted_index.detection, | 131 |
| abstract_inverted_index.developing | 79 |
| abstract_inverted_index.direction: | 109 |
| abstract_inverted_index.integrity, | 127 |
| abstract_inverted_index.prevention | 143 |
| abstract_inverted_index.privileged | 43 |
| abstract_inverted_index.privileges | 47 |
| abstract_inverted_index.recovering | 89 |
| abstract_inverted_index.safeguards | 125 |
| abstract_inverted_index.tampering, | 70 |
| abstract_inverted_index.centralized | 6 |
| abstract_inverted_index.potentially | 53 |
| abstract_inverted_index.applications | 2 |
| abstract_inverted_index.establishing | 120 |
| abstract_inverted_index.investigates | 141 |
| abstract_inverted_index.manipulating | 61 |
| abstract_inverted_index.applications. | 162 |
| abstract_inverted_index.attacks.While | 12 |
| abstract_inverted_index.corresponding | 62 |
| abstract_inverted_index.decentralized | 157, 161 |
| abstract_inverted_index.administrative | 46 |
| abstract_inverted_index.comprehensively | 124 |
| abstract_inverted_index.eliminated.This | 139 |
| abstract_inverted_index.vulnerabilities | 9 |
| abstract_inverted_index.impossible.While | 74 |
| abstract_inverted_index.information.Users | 44 |
| abstract_inverted_index.perspective.Instead | 98 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 90 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| citation_normalized_percentile.value | 0.49296826 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |