Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Secure database access online database

Posted on 2011-02-18
3
185 Views
Last Modified: 2012-06-27
For a client I need to make a small desktop application that connects to a database (still to be determned which one, probably access or sqlite db). The connection needs to be secure and all information transfered should be secure. What is the best way to accomplish this?

Thanks......
0
Comment
Question by:ShadowPatrick
  • 2
3 Comments
 
LVL 52

Expert Comment

by:Carl Tawn
ID: 34924726
Desktop application would suggest a local database, but your title says "online database". Which is it you require? A local database is generally secure enough anyway since the database and application reside on the same physical machine.
0
 

Author Comment

by:ShadowPatrick
ID: 34924766
It wil be a desktop application in c# that was using a local database before, but will now use a centralised database on a server reachable through internet.
0
 
LVL 52

Accepted Solution

by:
Carl Tawn earned 500 total points
ID: 34924781
If you can then you will want to create a web service to run on the remote server that will provide an abstraction from the database itself. You generally don't want your database to be exposed directly to the internet.

You can add additional security by accessing your web service through SSL which will then encrypt data during transmission across the internet.
0

Featured Post

Networking for the Cloud Era

Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect:
-One-click orchestration and cloud connectivity in Azure environments
-Tight integration of SD-WAN and WAN optimization capabilities
-Scalability and resiliency equal to a data center

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction This article series is supposed to shed some light on the use of IDisposable and objects that inherit from it. In essence, a more apt title for this article would be: using (IDisposable) {}. I’m just not sure how many people would ge…
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question