Authors :
Pratiksha Patil
Volume/Issue :
Volume 10 - 2025, Issue 7 - July
Google Scholar :
https://tinyurl.com/ywp7r27a
Scribd :
https://tinyurl.com/5c6an9s3
DOI :
https://doi.org/10.38124/ijisrt/25jul1399
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
In multi-user database systems, guaranteeing both secure access and traceability is essential. This research
introduces a relational database architecture leveraging Role-Based Access Control (RBAC) and comprehensive Audit
Logging. Users are classified into Admin, Editor, and Viewer roles, each assigned distinct permissions. Every database
operation is recorded to ensure accountability. Through performance tests measuring query latency and storage impact, we
find that adding role enforcement and logging results in a minor slowdown—well within acceptable limits for most
institutional use cases. This balance makes the system practical for environments demanding both security and
transparency.
Keywords :
Database Security, Role-Based Access Control, Audit Trail, Multi-User System, SQL, Access Management.
References :
- Sandhu, R.S., et al. 'Role-Based Access Control Models.' IEEE Computer, 1996.
- Vacca, J.R. Computer and Information Security Handbook. Elsevier, 2012.
In multi-user database systems, guaranteeing both secure access and traceability is essential. This research
introduces a relational database architecture leveraging Role-Based Access Control (RBAC) and comprehensive Audit
Logging. Users are classified into Admin, Editor, and Viewer roles, each assigned distinct permissions. Every database
operation is recorded to ensure accountability. Through performance tests measuring query latency and storage impact, we
find that adding role enforcement and logging results in a minor slowdown—well within acceptable limits for most
institutional use cases. This balance makes the system practical for environments demanding both security and
transparency.
Keywords :
Database Security, Role-Based Access Control, Audit Trail, Multi-User System, SQL, Access Management.