Home > Research > Publications & Outputs > Advancing database security a comprehensive sys...

Links

Text available via DOI:

View graph of relations

Advancing database security a comprehensive systematic mapping study of potential challenges

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Advancing database security a comprehensive systematic mapping study of potential challenges. / Iqbal, Asif; Khan, Siffat Ullah; Niazi, Mahmood et al.
In: Wireless Networks, Vol. 30, No. 7, 01.10.2024, p. 6399-6426.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Iqbal, A, Khan, SU, Niazi, M, Humayun, M, Sama, NU, Khan, AA & Ahmad, A 2024, 'Advancing database security a comprehensive systematic mapping study of potential challenges', Wireless Networks, vol. 30, no. 7, pp. 6399-6426. https://doi.org/10.1007/s11276-023-03436-z

APA

Iqbal, A., Khan, S. U., Niazi, M., Humayun, M., Sama, N. U., Khan, A. A., & Ahmad, A. (2024). Advancing database security a comprehensive systematic mapping study of potential challenges. Wireless Networks, 30(7), 6399-6426. https://doi.org/10.1007/s11276-023-03436-z

Vancouver

Iqbal A, Khan SU, Niazi M, Humayun M, Sama NU, Khan AA et al. Advancing database security a comprehensive systematic mapping study of potential challenges. Wireless Networks. 2024 Oct 1;30(7):6399-6426. Epub 2023 Jul 17. doi: 10.1007/s11276-023-03436-z

Author

Iqbal, Asif ; Khan, Siffat Ullah ; Niazi, Mahmood et al. / Advancing database security a comprehensive systematic mapping study of potential challenges. In: Wireless Networks. 2024 ; Vol. 30, No. 7. pp. 6399-6426.

Bibtex

@article{4504661895624628bd300ceb2f3a0b15,
title = "Advancing database security a comprehensive systematic mapping study of potential challenges",
abstract = "The value of data to a company means that it must be protected. When it comes to safeguarding their local and worldwide databases, businesses face a number of challenges. To systematically review the literature to highlight the difficulties in establishing, implementing, and maintaining secure databases. In order to better understand database system problems, we did a systematic mapping study (SMS). We{\textquoteright}ve analyzed 100 research publications from different digital libraries and found 20 issues after adopting inclusion and exclusion criteria. This SMS study aimed to identify the most up-to-date research in database security and the different challenges faced by users/clients using various databases from a software engineering perspective. In total, 20 challenges were identified related to database security. Our results show that “weak authorization system”, “weak access control”, “privacy issues/data leakage”, “lack of NOP security”, and “database attacks” as the most frequently cited critical challenges. Further analyses were performed to show different challenges with respect to different phases of the software development lifecycle, venue of publications, types of database attacks, and active research institutes/universities researching database security. The organizations should implement adequate mitigation strategies to address the identified database challenges. This research will also provide a direction for new research in this area.",
keywords = "Modeling and maintenance of protected databases, Systematic mapping study, Secure databases, Database security, Issues in the development",
author = "Asif Iqbal and Khan, {Siffat Ullah} and Mahmood Niazi and Mamoona Humayun and Sama, {Najm Us} and Khan, {Arif Ali} and Aakash Ahmad",
year = "2024",
month = oct,
day = "1",
doi = "10.1007/s11276-023-03436-z",
language = "English",
volume = "30",
pages = "6399--6426",
journal = "Wireless Networks",
issn = "1022-0038",
publisher = "Springer Netherlands",
number = "7",

}

RIS

TY - JOUR

T1 - Advancing database security a comprehensive systematic mapping study of potential challenges

AU - Iqbal, Asif

AU - Khan, Siffat Ullah

AU - Niazi, Mahmood

AU - Humayun, Mamoona

AU - Sama, Najm Us

AU - Khan, Arif Ali

AU - Ahmad, Aakash

PY - 2024/10/1

Y1 - 2024/10/1

N2 - The value of data to a company means that it must be protected. When it comes to safeguarding their local and worldwide databases, businesses face a number of challenges. To systematically review the literature to highlight the difficulties in establishing, implementing, and maintaining secure databases. In order to better understand database system problems, we did a systematic mapping study (SMS). We’ve analyzed 100 research publications from different digital libraries and found 20 issues after adopting inclusion and exclusion criteria. This SMS study aimed to identify the most up-to-date research in database security and the different challenges faced by users/clients using various databases from a software engineering perspective. In total, 20 challenges were identified related to database security. Our results show that “weak authorization system”, “weak access control”, “privacy issues/data leakage”, “lack of NOP security”, and “database attacks” as the most frequently cited critical challenges. Further analyses were performed to show different challenges with respect to different phases of the software development lifecycle, venue of publications, types of database attacks, and active research institutes/universities researching database security. The organizations should implement adequate mitigation strategies to address the identified database challenges. This research will also provide a direction for new research in this area.

AB - The value of data to a company means that it must be protected. When it comes to safeguarding their local and worldwide databases, businesses face a number of challenges. To systematically review the literature to highlight the difficulties in establishing, implementing, and maintaining secure databases. In order to better understand database system problems, we did a systematic mapping study (SMS). We’ve analyzed 100 research publications from different digital libraries and found 20 issues after adopting inclusion and exclusion criteria. This SMS study aimed to identify the most up-to-date research in database security and the different challenges faced by users/clients using various databases from a software engineering perspective. In total, 20 challenges were identified related to database security. Our results show that “weak authorization system”, “weak access control”, “privacy issues/data leakage”, “lack of NOP security”, and “database attacks” as the most frequently cited critical challenges. Further analyses were performed to show different challenges with respect to different phases of the software development lifecycle, venue of publications, types of database attacks, and active research institutes/universities researching database security. The organizations should implement adequate mitigation strategies to address the identified database challenges. This research will also provide a direction for new research in this area.

KW - Modeling and maintenance of protected databases

KW - Systematic mapping study

KW - Secure databases

KW - Database security

KW - Issues in the development

U2 - 10.1007/s11276-023-03436-z

DO - 10.1007/s11276-023-03436-z

M3 - Journal article

VL - 30

SP - 6399

EP - 6426

JO - Wireless Networks

JF - Wireless Networks

SN - 1022-0038

IS - 7

ER -