Advancing database security: a comprehensive systematic mapping study of potential challenges

  • Asif Iqbal
  • , Siffat Ullah Khan
  • , Mahmood Niazi
  • , Mamoona Humayun
  • , Najm Us Sama
  • , Arif Ali Khan*
  • , Aakash Ahmad
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

6 Scopus citations

Abstract

The value of data to a company means that it must be protected. When it comes to safeguarding their local and worldwide databases, businesses face a number of challenges. To systematically review the literature to highlight the difficulties in establishing, implementing, and maintaining secure databases. In order to better understand database system problems, we did a systematic mapping study (SMS). We’ve analyzed 100 research publications from different digital libraries and found 20 issues after adopting inclusion and exclusion criteria. This SMS study aimed to identify the most up-to-date research in database security and the different challenges faced by users/clients using various databases from a software engineering perspective. In total, 20 challenges were identified related to database security. Our results show that “weak authorization system”, “weak access control”, “privacy issues/data leakage”, “lack of NOP security”, and “database attacks” as the most frequently cited critical challenges. Further analyses were performed to show different challenges with respect to different phases of the software development lifecycle, venue of publications, types of database attacks, and active research institutes/universities researching database security. The organizations should implement adequate mitigation strategies to address the identified database challenges. This research will also provide a direction for new research in this area.

Original languageEnglish
Pages (from-to)6399-6426
Number of pages28
JournalWireless Networks
Volume30
Issue number7
DOIs
StatePublished - Oct 2024

Bibliographical note

Publisher Copyright:
© The Author(s) 2023.

Keywords

  • Database security
  • Issues in the development
  • Modeling and maintenance of protected databases
  • Secure databases
  • Systematic mapping study

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Advancing database security: a comprehensive systematic mapping study of potential challenges'. Together they form a unique fingerprint.

Cite this