skip to main content
10.1145/3661638.3661710acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaisnsConference Proceedingsconference-collections
research-article

A Database Security Access Control Method Based on Identity Authentication

Published: 01 June 2024 Publication History

Abstract

Due to the limited ability to authenticate user access attributes, the control effect of database access is difficult to achieve the desired state. Therefore, an identity based database security access control method is proposed. In the stage of building identity trust relationships in cloud services, a trust transfer model was designed, with a trust chain consisting of guarantee nodes and recommendation nodes, allowing users to establish a direct trust relationship between accessing the database through identity authentication. The cloud service provider (CSP) was used as a trusted third party to establish mutual trust relationships between different domains, and the identity authentication gateway was used as a special identity of the domain trust proxy, Use a gateway token as the information credential for trust transfer, thereby achieving secure transfer of user identity between different domains. In the access control stage, the authentication of cloud service identity is achieved by combining trust relationships, and the permission to request database access is determined. In the test results, the interception rate of designing database access control methods for abnormal access has always been stable at over 98.0%, which can effectively ensure the security of database information, with the shortest response time and the least impact from the scale of concurrent access requests.

References

[1]
Nagamani C, Chittineni S. Network database security with intellectual access supervision using outlier detection techniques[J]. International journal of advanced intelligence paradigms, 2022, 22(3/4):348-361.
[2]
Asimopolos N S, Asimopolos L, Balea-Roman B, The Organizing of Database from Surlari National Geomagnetic Observatory[J]. Environmental Science and Engineering: A, 2021, 10(1):8.
[3]
Wang X F, Wang Y X, Yuan T, Research and implementation of security mechanism of virtual experiment based on Spring Security[J]. Electronic Design Engineering, 2021, 029(005):80-89.
[4]
Zhu T, Dong P, Zhu H, Mandatory access control model based on marking technology[J]. Railway Computer Application, 2022, 31(1):55-60.
[5]
Chen Y R. A Scheme Based on CPK Role Access Control[J]. Journal of Information Security Research, 2021, 007(002):184-189.
[6]
Saidi A, Aissaoui K, Mektoubi A. A Federative Access Control in a Cloud Environment with a Publish/Subscribe Protocol[J]. Journal of Computer Science, 2022, 18(10):955-967.
[7]
Zhang S, Luo S. Evolution analysis of corporate governance structure based on blockchain network security and complex adaptive system[J]. Sustainable Energy Technologies and Assessments, 2022, 53(Oct.Pt.C):1-8.
[8]
Mohamed A K Y S, Auer D, Hofer D, A systematic literature review for authorization and access control: definitions, strategies and models[J]. International journal of web information systems, 2022, 18(2/3):156-180.
[9]
Onwuama, Asagba T U P O, Odii J. Application of Role Based Technology for Database Intrusion Detection[J]. International Journal of Computer Science and Information Security, 2021, 17(7):81-92.
[10]
Levin S C, Evers S, Potter T, Rpadrino: An R package to access and use PADRINO, an open access database of Integral Projection Models[J]. Methods in Ecology and Evolution, 2022, 13(9):1923-1929.

Index Terms

  1. A Database Security Access Control Method Based on Identity Authentication

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    AISNS '23: Proceedings of the 2023 International Conference on Artificial Intelligence, Systems and Network Security
    December 2023
    467 pages
    ISBN:9798400716966
    DOI:10.1145/3661638
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 June 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    AISNS 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 35
      Total Downloads
    • Downloads (Last 12 months)35
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 20 Jan 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media