CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Security Analysis of Reverse Encryption Algorithm for Databases

by Ayman Mousa, Osama S. Faragallah, S. El-rabaie, E. M. Nigm
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 66 - Number 14
Year of Publication: 2013
Authors: Ayman Mousa, Osama S. Faragallah, S. El-rabaie, E. M. Nigm
10.5120/11153-6255

Ayman Mousa, Osama S. Faragallah, S. El-rabaie, E. M. Nigm . Security Analysis of Reverse Encryption Algorithm for Databases. International Journal of Computer Applications. 66, 14 ( March 2013), 19-27. DOI=10.5120/11153-6255

@article{ 10.5120/11153-6255,
author = { Ayman Mousa, Osama S. Faragallah, S. El-rabaie, E. M. Nigm },
title = { Security Analysis of Reverse Encryption Algorithm for Databases },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 66 },
number = { 14 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 19-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume66/number14/11153-6255/ },
doi = { 10.5120/11153-6255 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:22:23.171635+05:30
%A Ayman Mousa
%A Osama S. Faragallah
%A S. El-rabaie
%A E. M. Nigm
%T Security Analysis of Reverse Encryption Algorithm for Databases
%J International Journal of Computer Applications
%@ 0975-8887
%V 66
%N 14
%P 19-27
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Encryption provides strong security for databases. To develop a database encryption strategy, many factors must be taken into consideration. Organizations must balance between the requirement for security and the desire for excellent performance. In this paper a novel encryption algorithm is proposed "Reverse Encryption Algorithm (REA)". The proposed algorithm REA is simple and yet leads to a cipher. It has achieved security and is fast enough for most applications. REA algorithm is limiting the added time cost for encryption and decryption to not degrade the performance of a database system. Moreover, designing REA algorithm has enhanced security in data encryption. Besides, the secure and performance of the proposed encryption algorithm REA is evaluated and compare with the most common encryption algorithms. Experimental results show that the proposed encryption algorithm REA outperforms other encryption algorithms at performance and security in databases. Overall, the proposed encryption algorithm REA achieves balance between the security and the efficiency.

References
  1. Bouganim L. , and Pucheral P. , "Chip-secured data access: Confidential data on untrusted servers", Proceedings of the 28th International Conference on Very Large Data Bases, Hong Kong, China, pp. 131-142, 2002.
  2. Castano S. , Fugini M. , Martella G. , and Samarati P. , "Database Security", Addison-Wesley, 1995.
  3. Chen G. , Chen K. , and Dong J. , "A Database Encryption Scheme for Enhanced Security and Easy Sharing", Proceedings of the 10th International Conference on Computer Supported Cooperative Work in Design, 2006.
  4. Coppersmith D. , "The Data Encryption Standard (DES) and Its Strength against Attacks", IBM Journal of Research and Development, pp. 243-250, May 1994.
  5. Daemen, J. , and Rijmen, V. "Rijndael: The Advanced Encryption Standard (AES)", Dr. Dobb's Journal, PP. 137-139, March 2001.
  6. Damiani E. , Vimercati S. , and Foresti S. , "Key Management for Multi-User Encrypted Databases", Proceedings of ACM Storage SS'05, pp. 74–83, 2005.
  7. El-Fishawy N. , "Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms", Proceedings International Journal of Network Security, PP. 241–251, Nov. 2007.
  8. Ferraiolo D. , and Kuhn R. , "Role-based Access Controls", Proceedings of NIST-NCSC'92, pp. 554–563, 2002.
  9. Idrus S. , and Aljunid A. , "Performance analysis of encryption algorithms text length size on web browsers," IJCSNS International Journal of Computer Science and Network Security, vol. 8 no. 1, pp. 20-25, Jan. 2008.
  10. Jingmin H. , and Wang M. , "Cryptography and Relational Database Management Systems", Proceedings IEEE Symposium on the International Database Engineering & Applications, Washington, USA, 2001.
  11. KIM Y. , and Hong E. , "A Study of UniSQL Encryption System: Case Study of Developing SAMS", proceedings of ICACT 2007, Volume III, pp. 577-582, Seoul, Korea, 2007.
  12. Mattsson U. , "A Database Encryption Solution That Is Protecting against External and Internal Threats, and Meeting Regulatory Requirements: A practical implementation of field level privacy", 2005.
  13. Musheer A. and Shamsher M. "A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping ", International Journal on Computer Science and Engineering, Vol. 2, No. 1, pp. 46-50, 2009.
  14. Results of Comparing Tens of Encryption Algorithms Using Different Settings-Crypto++ Benchmark, Retrieved Oct. 1, 2008. (http://www. eskimo. com/ weidai/benchmarks. html)
  15. Salama D. , Abdual Kader H. , and Hadhoud M. , "Studying the Effects of Most Common Encryption Algorithms", International Arab Journal of e-Technology, Vol. 2, No. 1, pp. 1-10 January 2011.
  16. Salama D. , Abdual Kader H. , and Hadhoud M. , "Wireless Network Security Still Has no Clothes", International Arab Journal of e-Technology, Vol. 2, No. 2, pp. 112-123, June 2011.
  17. Schneier B. , "Applied Cryptography Second Edition: protocols, algorithms, and source", Beijing: China Machine Press, 2000.
  18. Schneier B. , "The Blowfish Encryption Algorithm", Retrieved, 2008.
  19. Stallings W. , "Cryptography and Network Security Principles and Practice" 4th Ed. Prentice-Hill Inc. 2005.
  20. Weerasinghe T. , "Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms ", International Journal of Information & Network Security (IJINS), Vol. 1, No. 2, pp. 77-87, June 2012.
  21. Zeghid M. , Machhout M. , Khriji L. , Baganne A. , and Tourki R. , "A Modified AES Based Algorithm for Image Encryption", World Academy of Science, Engineering and Technology 27 2007, pp. 206-211, March 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Database security cryptographic algorithms and database encryption