Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Proposed Algorithm for Database Encryption and Decryption

Print
PDF
IJCA Proceedings on National Conference on Emerging Trends in Computer Technology
© 2014 by IJCA Journal
NCETCT - Number 3
Year of Publication: 2014
Authors:
Tarendra G. Rahangdale
Pritish A. Tijare
Swapnil N. Sawalkar

Tarendra G Rahangdale, Pritish A.tijare and Swapnil N Sawalkar. Article: A Proposed Algorithm for Database Encryption and Decryption. IJCA Proceedings on National Conference on Emerging Trends in Computer Technology NCETCT(3):21-24, December 2014. Full text available. BibTeX

@article{key:article,
	author = {Tarendra G. Rahangdale and Pritish A.tijare and Swapnil N. Sawalkar},
	title = {Article: A Proposed Algorithm for Database Encryption and Decryption},
	journal = {IJCA Proceedings on National Conference on Emerging Trends in Computer Technology},
	year = {2014},
	volume = {NCETCT},
	number = {3},
	pages = {21-24},
	month = {December},
	note = {Full text available}
}

Abstract

As the Computer System becomes popular for storing personal and precious data, need of data security goes its peak. For transmitting confidential information over the network, security is required so that it could not be accessed by illegitimate user. The database contains large amount of data that need to be secure. Cryptographic algorithms provide a way to secure data against the unauthorized access. Encryption is the process of encoding data so that its meaning is not obvious, decryption is reverse process that transform an encrypted massage back into original form. Encryption in database system is an important aspect for research, as efficient and secure algorithms are needed that provide the ability to query over encrypted database and allow optimized encryption and decryption of data. In this paper we observe an algorithm which encrypt and decrypt database over query fire quickly. This proposed algorithm will be simple and fast enough for most application which limits to the time and cost of encryption and decryption.

References

  • H. Brown, Considerations Database Management System Encryption Security Solution, A Research Report presented to The Department of Computer Science at the University of Cape Town, 2003.
  • G. Davida, D. L. Wells, and J. B. Kam, "A database Encryption system with subkeys," ACM Transactions on Database Systems, vol. 6, no. 2, pp. 312–328, 1981.
  • H. Hacig¨um¨us, B. Iyer, and S. Mehrotra, "Providing database as a service," in Proceedings of ICDE, pp. 29–38, 2002.
  • J. He and M. Wang, "Cryptography and relational database management system," IDEAS, pp. 273–284, 2001.
  • Oracle, Oracle9i Database Security for eBusiness, An Oracle White Paper, June 2001.
  • http://en. wikipedia. org/wiki/Encryption
  • S. Lee, T. Park, D. Lee, T. Nam, and S. Kim, "Chaotic order preserving encryption for efficient and secure queries on databases," IEICE Transactions on Information and Systems, vol. 92, pp. 207–217, 2009.
  • Ceselli, E. Damiani, S. D. C. D. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, "Modeling and assessing inference exposure in encrypted databases," ACM Transactions on Information System Security, vol. 8, no. 1, pp. 119–152, 2005.
  • E. Damiani, S. D. C. D. Vimercati, M. Finetti, S. Paraboschi, P. Samarati, and S. Jajodia, "Implementation of a storage mechanism for untrusted dbmss," IEE Security in Storage Workshop 2003, pp. 38-46, 2003.
  • E. Damiani, S. D. C. D. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Metadata management in outsourced encrypted databases," in The Second VLDB Workshop on Secure Data Management, Lecture Notes in Computer Science, pp. 16–32, Springer, 2005.
  • H. Hacig¨um¨us, B. R. Iyer, and S. Mehrotra, "Ensuring the integrity of encrypted databases in the database-as-a-service model," DBSec 17th Annual Working Conference on Data and Application Security, pp. 61–74, Kluwer, 2003.
  • Q. Tang and D. Ji "Verifiable attribute based encryption," International Journal of Network Security, vol. 10, no. 2, pp. 114-120, Mar. 2010.
  • Assessing performance of encrypted databases under query processing with the REA Algorithm Volume 2, Issue 1, January 2014, ISSN: 2321-7782.