Database security in private database clouds

Çınar, Onur
Cloud computing and systems are very popular in today’s Information Technology and Systems and have grown extremely. Cloud computing helps organizations solve increasing IT costs such as their licenses,power consumption,physical protection,by providing better standardization,higher benefit,greater performance,and quick responses of information services. This thesis presents the study of ensuring database security in cloud computing, protecting data especially from internal attacks, and managing high volumes of log data. Security requirements of a network system differ from each other according to the system which you are using. Carrying vital importance for our private and secret information, cloud systems must provide extra security solutions for database systems with the organizations. While using firewalls, intrusion detection systems on the network for external attacks, improved access controls must be thought for internal attacks. Using database actions logs and audit can be very helpful on developing a database protection system. However, storing these logs will cause a storage and performance problem. The other problem is to manage many databases at the same time. This system provides managing many databases at the same time from the same place. Logs from each database is transmitting to the central point asynchronously. Administrating database protection solution from a central point in cloud helps us to manage security of databases and handling huge volumes of data.The performance of our proposed system has been evaluated against one of the most commonly used products on the market, Oracle audit Vault Server and better results have been obtained on some topics in this thesis.


Cinar, Onur; Guncer, R. Haluk; Yazıcı, Adnan (2016-12-22)
Cloud computing and cloud systems are very popular in today's Information Technology (IT) and systems and have grown very quickly. Cloud computing helps organizations solve increasing IT costs such as their licenses, power consumption, physical protection, by providing better standardization, higher benefit, greater performance, and quicker responses of information services. Carrying vital importance for our private and secret information, cloud systems must provide extra security solutions for database sys...
EPICS: A Framework for Enforcing Security Policies in Composite Web Services
Ranchal, Rohit; Bhargava, Bharat; Angın, Pelin; ben Othmane, Lotfi (Institute of Electrical and Electronics Engineers (IEEE), 2019-05-01)
With advances in cloud computing and the emergence of service marketplaces, the popularity of composite services marks a paradigm shift from single-domain monolithic systems to cross-domain distributed services, which raises important privacy and security concerns. Access control becomes a challenge in such systems because authentication, authorization and data disclosure may take place across endpoints that are not known to clients. The clients lack options for specifying policies to control the sharing of...
A Workflow for Offering Hardware Accelerators as a Cloud Computing Service: Implementation and Evaluation
Tırlıoğlu, Anıl; Schmidt, Şenan Ece; Department of Electrical and Electronics Engineering (2022-2)
Cloud computing and hardware accelerators are two paradigm changes in the field of information technologies and computers. Accordingly, this thesis proposes a workflow for offering users hardware accelerators implemented on FPGA as computing resources in a heterogeneous cloud data center. To this end, we perform the virtualization of FPGA resources as reconfigurable regions (RRs) and provide these resources through OpenStack, an open-source cloud resource management platform. Our workflow is designed for S...
Performance comparison of pattern discovery methods on web log data
Bayir, Murat Ali; Toroslu, İsmail Hakkı; Coşar, Ahmet (2006-03-11)
One of the popular trends in computer science has been development of intelligent web-based systems. Demand for such systems forces designers to make use of knowledge discovery techniques on web server logs. Web usage mining has become a major area of knowledge discovery on World Wide Web. Frequent pattern discovery is one of the main issues in web usage mining. These frequent patterns constitute the basic information source for intelligent web-based systems. In this paper; frequent pattern mining algorithm...
Secure model for efficient live migration of containers
Mavuş, Zeynep; Angın, Pelin; Department of Computer Engineering (2019)
Cloud services have become increasingly widespread in the past decade due to their ability to reduce the complexity and cost of managing computers and networks. Cloud applications are run in virtualized environments such as virtual machines and containers to be able to allocate resources in an inexpensive manner. Both of these approaches require effective resource utilization, for which an important enabling technology is live migration, which involves moving a service from one host to another with the mini...
Citation Formats
O. Çınar, “Database security in private database clouds,” M.S. - Master of Science, Middle East Technical University, 2015.