Enhancing Design and Authentication Performance Model: A Multilevel Secure Database Management System
Hemin Sardar Abdulla and
Aso M. Aladdin ()
Additional contact information
Hemin Sardar Abdulla: Department of Computer Science, College of Science, Charmo University, Sulaymaniyah 46023, Iraq
Aso M. Aladdin: Department of Computer Science, College of Science, Charmo University, Sulaymaniyah 46023, Iraq
Future Internet, 2025, vol. 17, issue 2, 1-22
Abstract:
Multilevel security (MLS) is particularly intended to secure information against unauthorized access. An MLS security DBMS allows users with different security levels to access and share a database. For this purpose, the study creates a model that includes a restricted access authentication prototype with multilevel security in a database management system (MLS/DBMS). Accordingly, the model has been designed to emphasize the highest level of authorized security. The system ensures that users can only access information that they are permitted to view, fully adhering to the newly established MLS framework. In addition, the model also integrates cryptographic algorithms, such as RSA and AES, to enhance its functionality and demonstrate the scalability and security of the model. These criteria are defined based on the perspective of the database provided to users, determined by their respective authorization levels. An informal security framework for a multilevel secure DBMS is defined. It includes a classification strategy and explains the implementation of operations like insertion and deletion, addressing the complexity of models with novel methods. The metric evaluation of this model assesses the performance of the authentication process and how operations are implemented across three authentication group types. It also calculates the key generation time and encryption types in cryptographic algorithms. The results confirm that the RSA model requires less time for evaluation while maintaining multilevel security. Furthermore, the type 2 authentication group is more complex and requires more memory and time for generation. Based on the classification, the results highlight notable differences, which designers should consider when selecting authentication methods. Lastly, the study presents various conclusions, explores possible future directions, and discusses its limitations.
Keywords: multilevel security; information system; database management system; database security; access control; system implementation (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2025
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/1999-5903/17/2/74/pdf (application/pdf)
https://www.mdpi.com/1999-5903/17/2/74/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:17:y:2025:i:2:p:74-:d:1586426
Access Statistics for this article
Future Internet is currently edited by Ms. Grace You
More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().