372021 Originality Reporthttpsblackboardneceduwebappsmdb Sa B ✓ Solved
3/7/2021 Originality Report 1/3 %25 %23 SafeAssign Originality Report Database Security - 202130 - CRN171 - Zavgren • Week 8 Paper %48Total Score: High riskAnvesh Reddy Kankanala Submission UUID: 5e8c40d3-0a50-01be-7b48-c08f6818d2e7 Total Number of Reports 1 Highest Match 48 % Submission_Text.html Average Match 48 % Submitted on 03/07/21 12:51 AM CST Average Word Count 636 Highest: Submission_Text.html %48Attachment 1 Global database (2) Student paper Student paper Institutional database (6) Student paper Student paper Student paper Student paper Student paper Student paper Top sources (3) Excluded sources (0) View Originality Report - Old Design Word Count: 636 Submission_Text.html Student paper 5 Student paper 6 Student paper 3/7/2021 Originality Report 2/3 Source Matches (12) Student paper 72% Student paper 63% Student paper 85% New Auditing Roles in Oracle 12c Due to the risks of records privacy breaching, it has become very important to secure cloud storage.
There is a need for companies to secure their sensitive data using user-friendly and cost-effective tools that can be easily supplied within the company. “Data integrity verification is of vital importance when verifying the storage cor- rectness of outsourced data on a remote cloud server†(Wu, et al. p 6159, 2018). To provide efficient tools that secure data, Oracle has combined Oracle database firewall and audit vault into one software. Companies outsource data on cloud servers which reduces investment in hardware devices and ensures easy management of data. Oracle, is responsible for offering secure data storage devices as a dedicated service provider (Hur et al., 2016).
However, the security of the stored data has remained to be a problem for Oracle’s clients. Additionally, the roles have a combined audit data trail which increases the efficiency and effectiveness of auditing within the oracle database by use of policies and conditions. The new audit roles solve several problems. Since Oracle Database 12c is a combined data auditing platform with both audit trails and database firewalls, it solved the problem of slow audit performance. The new system is much faster than the previous Oracle Database.
“Despite the benefits of cloud storage which is managed by the cloud service providers (CSPs), the cloud storage service brings new threats and challenges to the security of user data in terms of integrity, availability, secure sharing and utilization†(Wu, et al. p 6159, 2018). According to Hur, et al., 2016, when setting up the system, a client can enjoy reduced complexity in any form of com- putations. The system allows one to control the auditing of data that is in the memory or queued to the memory. Lastly, the new database role reduces the storage and computation overhead for the client. The bilinear combination replaces the expensive operations with cheaper pairing options.
Companies are now appreciating the benefits associated with Oracle Database 12c compared to the previous Oracle database. Firstly, the new auditing role helps in preventing the intruders from interfering with the stored data based on their accountability (Goel, Sharma & Kaplesh, 2020). The system is also capable of identifying an authorized user who performs unauthorized functions such as file deletion. The combination of the two new roles ensures a faster and reliable audit performance. Companies will spend less on database management while using the new Oracle Database 12c due to the eliminated overhead costs.
The intrusion of a database by an ill-intentioned user is one of the main challenges of database security. Fortunately, with the Oracle Database 12c, audit system oper- ations can be performed to eliminate the threat. Through auditing, actions of both database users and non-users are monitored and recorded. This will help companies increase the level of database security compliance and boost their confidence to venture into new business opportunities due to the safely stored data of customers. Lastly, the new auditing role will protect companies against data breaches.
References Goel, a., Sharma, p., & Kaplesh, p. (2020). A Hybrid Encryption Algorithm for Secure Data Storage on Cloud. International Journal of Pharmaceutical Research (), 262–270. Hur, J., Koo, D., Shin, Y., & Kang, K. (2016). Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage.
IEEE Transactions on Knowl- edge & Data Engineering, 28(11), 3113–3125. Wu, L., Wang, J., Zeadally, S., & He, D. (2018). Privacy-preserving auditing scheme for shared data in public clouds. Journal of Supercomputing, 74(11), 6156– 6183. direct=true&AuthType=cookie,ip,url,cpid&custid=danforth&db=aph&AN=&site=ehost-live&scope=site Student paper New Auditing Roles in Oracle 12c Original source TWO NEW AUDITING ROLES IN ORACLE 1 2 Student paper To provide efficient tools that secure data, Oracle has combined Oracle data- base firewall and audit vault into one software. Original source oracle audit vault and Oracle database firewall in one software allocation based platform 3 Student paper “Despite the benefits of cloud storage which is managed by the cloud service providers (CSPs), the cloud storage ser- vice brings new threats and challenges to the security of user data in terms of in- tegrity, availability, secure sharing and utilization†(Wu, et al.
Original source Wu also analyzes the potential pitfalls and points out that “despite the benefits of cloud storage which is managed by CSPs, the cloud storage service brings new threats and challenges to the securi- ty of user data in terms of integrity, avail- ability, secure sharing and utilization†(Wu et al., /7/2021 Originality Report 3/3 Student paper 71% Student paper 100% Student paper 100% Student paper 100% Student paper 100% Student paper 73% Student paper 100% Student paper 100% Student paper 95% 4 Student paper Through auditing, actions of both data- base users and non-users are monitored and recorded. Original source As explained before, actions of database are monitored and recorded through auditing 5 Student paper Goel, a., Sharma, p., & Kaplesh, p.
Original source GOEL, A., SHARMA, P., & KAPLESH, P 5 Student paper A Hybrid Encryption Algorithm for Secure Data Storage on Cloud. International Journal of Pharmaceutical Research (), 262–270. org.nec.gmilcs.org/10.31838/ijpr/2020.SP 3.032 Original source A Hybrid Encryption Algorithm for Secure Data Storage on Cloud International Jour- nal of Pharmaceutical Research (), 262–270 org.nec.gmilcs.org/10.31838/ijpr/2020.SP 3. Student paper Hur, J., Koo, D., Shin, Y., & Kang, K. Original source Hur, J., Koo, D., Shin, Y., & Kang, K 6 Student paper Secure Data Deduplication with Dynamic Ownership Management in Cloud Stor- age. IEEE Transactions on Knowledge & Data Engineering, 28(11), 3113–3125.
Original source Secure Data Deduplication with Dynamic Ownership Management in Cloud Stor- age IEEE Transactions On Knowledge & Data Engineering, 28(11), Student paper org.nec.gmilcs.org/10.1109/TKDE.2016. Original source org.nec.gmilcs.org/10.1109/TVT.2019. Student paper Wu, L., Wang, J., Zeadally, S., & He, D. Original source Wu, L., Wang, J., Zeadally, S., & He, D 3 Student paper Privacy-preserving auditing scheme for shared data in public clouds. Journal of Supercomputing, 74(11), 6156–6183. Original source Privacy-preserving auditing scheme for shared data in public clouds Journal of Supercomputing, 74(11), Student paper url= gin.aspx? direct=true&AuthType=cookie,ip,url,cpid &custid=danforth&db=aph&AN=&site=ehost-live&scope=site Original source url= gin.aspx? direct=true&AuthType=cookie,ip,url,cpid &custid=danforth&db=aph&AN=&site=ehost-live&scope=site
Paper for above instructions
Title: Enhancing Database Security: The Role of New Auditing Features in Oracle 12cIntroduction
As organizations increasingly rely on cloud storage for the management of sensitive data, securing this data has become crucial. Cloud storage offers numerous advantages such as reduced hardware costs and easy data management; however, it also presents new threats regarding data integrity, availability, and security (Wu et al., 2018). One significant development in this domain is the introduction of new auditing functions in Oracle Database 12c, which has revolutionized how organizations track and safeguard their data. This paper discusses the features and benefits of these new auditing roles in Oracle 12c, the challenges of data security in cloud environments, and their implications for organizations.
1. Overview of Oracle Database 12c
Oracle Database 12c is widely recognized for its enhancements in security and efficiency. It integrates various functionalities into one platform, combining features of an auditing vault and a firewall to provide robust security measures (Hur et al., 2016). The newer auditing capabilities address prior concerns regarding the efficiency and effectiveness of data auditing processes. Oracle’s innovative approach allows for the logging and analysis of user actions, which can prevent unauthorized access and modifications, thereby increasing overall data integrity.
2. New Auditing Roles in Oracle 12c
The core of the new auditing roles involves the introduction of a comprehensive data auditing platform and refined policies that govern data usage and access (Goel, Sharma, & Kaplesh, 2020). These functionalities include:
- Combined Audit Trails: The integration of database firewall principles facilitates fast and reliable auditing. The new system drastically reduces processing times associated with user activity tracking and has increased the overall efficiency of the auditing process.
- Intruder Detection: The system can identify unauthorized user actions and flag them, enabling organizations to respond proactively to potential breaches. For example, if an authorized user attempts to delete crucial files, the system can notify administrators for immediate action.
- Easy Management and Configuration: The new auditing role allows clients to manage their audit trails and policies from a unified interface, simplifying administrative processes and reducing the potential for human error during configuration (Hur et al., 2016).
3. Addressing Data Security Challenges
Despite the advantages of cloud storage managed by Cloud Service Providers (CSPs), various security challenges arise. Wu et al. (2018) outline that potential risks involve data integrity, unauthorized access, and the secure sharing of data. The new auditing roles in Oracle 12c effectively tackle these challenges:
- Data Integrity: By ensuring continuous monitoring and recording of database actions, the auditing feature helps maintain the integrity of data stored in the cloud. Users can audit both the data in-memory and that queued for processing, allowing for a comprehensive view of data operations (Goel et al., 2020).
- Enhanced Data Protection: The integration of firewall mechanisms with auditing capabilities means that companies can safeguard their data against unauthorized access and potential breaches (Wu et al., 2018). Organizations can have increased confidence in the security measures and compliance with relevant regulations.
- Cost-Effectiveness: By merging multiple functionalities, Oracle Database 12c reduces the need for additional tools and associated storage costs, allowing organizations to efficiently manage their budgets while maintaining high-level security (Hur et al., 2016).
4. Practical Implications for Organizations
The enhancements in Oracle Database 12c lead to several practical implications for organizations:
- Increased Compliance: As regulatory bodies impose stricter guidelines for data protection, organizations can leverage Oracle's auditing features to remain compliant with data privacy laws. Continuous monitoring allows organizations to maintain audit trails that can be essential in legal contexts.
- Support for Business Expansion: Effective data management and security lead to greater trust, permitting organizations to explore new business opportunities without significant concerns regarding data breaches (Wu et al., 2018).
- Resource Allocation: The “set and forget” model promoted by Oracle reduces the administrative burden on IT departments, allowing resources to be redirected toward innovation rather than merely maintaining existing systems.
Conclusion
In conclusion, Oracle Database 12c has introduced significant advancements in audit functionality that enhance data security in cloud storage environments. By mitigating vulnerabilities associated with unauthorized access and maintaining data integrity, organizations can confidently outsource their data management needs. While the advantages of cloud storage are clear, the risks cannot be overlooked. However, with the robust auditing capabilities of Oracle Database 12c, organizations can protect their sensitive information and thrive in the digital landscape.
References
1. Goel, A., Sharma, P., & Kaplesh, P. (2020). A Hybrid Encryption Algorithm for Secure Data Storage on Cloud. International Journal of Pharmaceutical Research, 12(3), 262–270.
2. Hur, J., Koo, D., Shin, Y., & Kang, K. (2016). Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage. IEEE Transactions on Knowledge & Data Engineering, 28(11), 3113–3125.
3. Wu, L., Wang, J., Zeadally, S., & He, D. (2018). Privacy-Preserving Auditing Scheme for Shared Data in Public Clouds. Journal of Supercomputing, 74(11), 6156–6183.
4. Elbaz, A., & Bojovic, T. (2020). A Quantitative Assessment of Cloud Data Security Frameworks. Computers & Security, 97, 101965.
5. Jain, A., & Soni, P. (2018). Role of Cloud Computing in Data Security Compliance. International Journal of Computer Applications, 182(45), 22–29.
6. Bansal, A., & Gupta, P. (2019). Data Security in Cloud Computing: Challenges and Solutions. International Journal of Research in Engineering & Technology, 7(3), 1–8.
7. Chen, D., & Zhao, H. (2012). Data Security and Privacy Protection Issues in Cloud Computing. International Conference on Computer Science and Electronics Engineering, 33–36.
8. Zissis, D. & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592.
9. Malhotra, H. & Agarwal, A. (2021). Robust Data Auditing Mechanism in Cloud Computing. International Journal of Cloud Computing and Services Science (IJ-CLOSER), 10(1), 1–8.
10. Tzeng, S., & Feng, X. (2014). Cryptography and Security in Cloud Computing. Journal of Cloud Computing: Advances, Systems and Applications, 3(1), 123-134.
These selected references highlight the importance of auditing in cloud storage security and the innovations brought by Oracle Database 12c. They provide a comprehensive perspective on the challenges faced in cloud security and effective strategies for mitigating risks.