International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us

IJSTR >> Volume 7 - Issue 11, November 2018 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Modified Role Based Access Control Model For Data Security

[Full Text]



Bukohwo Michael Esiefarienrhe, Abubakar Hashimu Ekka



Role based access control, security, policy access control, Database management, modeling, enterprise environment



This Paper presents a modified Role Based Access Control model by extending traditional role based access control in SQL (Structure Query Language) data storage. The said model evaluates and executes security policies which contain versatile access conditions against the dynamic nature of data. The goal is to devise a mechanism for a forward looking, assertive yet flexible security features to regulate access to data in the data storage that is devoid of rigid structures and consistency. This is achieved by integrating roles and authenticated fine-grained access rules and implemented through effective audit trail. The model and the rules used are presented and shows that when implemented, it is capable of outperforming existing models that are role based.



[1]. McKendrick, J. (2012), IOUG Enterprise Data Security Survey 2012: Closing the Security Gap, The Independent Oracle Users Group (IOUG) Security Report November, 2012.

[2]. Kobielus, J. (2009), “The Forrester Wave: Enterprise Data storage Platforms, Forrester Research Report, and 1. http://searchdatamanagement.techtarget.com/news/1356934

[3]. Thuraisingham, B., M. Kantarcioglu (2007)."Extended RBAC-based Design and implementation for a secure data storage “An International Journal of Business Intelligence and Data Mining vol2, Issue 4: pp 367- 382.

[4]. Kundu, A., Sural, S. and A. K. Majumdar (2010)” Database Intrusion Detection Using Sequence Alignment” An international journal of information Security, volume9, Issues3 (Jun 2010): pg179-191.

[5]. Santos, R. J., J. Bernardino, et al (2011). "A survey on data security of stored data: Issues, challenges and opportunities “An IEEE International Conference on Computer as a Tool (EUROCON), Lisbon.

[6]. Kangsoo J and Seog P (2013) Context-Aware Role Based Access Control Using User relationship “An International Journal of Computer Theory and Engineering”, Vol. 5, No. 3, June 2013.

[7]. Raimundas M and Henri L (2015) A Model-driven Role-based Access Control SQL Databases: Complex Systems Informatics and Modeling Quarterly CSIMQ, Issue 3, July, 2015, Pages 35-62, A Journal of Institute of Computer Science, University of Tartu, J. Liivi 2, 50409 Tartu, Estonia. https://csimq-journals.rtu.lv/article/view/1074

[8]. Shermin, M (2013) "An Access Control Model for NoSQL Databases" An Electronic Thesis and Dissertation Repository. Paper 1797. http://ir.lib.uwo.ca/cgi/viewcontent.cgi?article=3294.

[9]. Kambiz, G and Mehdi, G” (2015) Dynamic Modeling for Representing Access Control Policies Effect “An International Journal of advanced studies in Computer Science and Engineering IJASCSE, Volume 4, Issue 7, 2015.

[10]. Ankit.V, Ratish.A and Sachin. G” (2015) A Methodology for Development and Verification of Access Control System in Cloud Computing” An International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 3, March 2015.

[11]. Tarai.T and Pradipta. K.M. (2013)” Enhancing database access control policies” An American International Journal of Research in Science, Technology Engineering & Mathematics, 3(1), June-August, 2013, pg 109- 113 AIJRSTEM.

[12]. Rosic. D, Imre. L, Srdjan. V (2015) “A Role-based Access Control Model Supporting Regional Division in Smart Grid System” Acta Polytechnica Hungarica Vol. 12, No. 7, 2015.