Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Performance Analysis of the Encryption Algorithms as Solution to Cloud Database Security

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 99 - Number 14
Year of Publication: 2014
Authors:
Murtala Aminu Baba
Abdulrahman Yusuf
Aminu Ahmad
Ladan Maijama'a
10.5120/17442-8228

Murtala Aminu Baba, Abdulrahman Yusuf, Aminu Ahmad and Ladan Maijama'a. Article: Performance Analysis of the Encryption Algorithms as Solution to Cloud Database Security. International Journal of Computer Applications 99(14):24-31, August 2014. Full text available. BibTeX

@article{key:article,
	author = {Murtala Aminu Baba and Abdulrahman Yusuf and Aminu Ahmad and Ladan Maijama'a},
	title = {Article: Performance Analysis of the Encryption Algorithms as Solution to Cloud Database Security},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {99},
	number = {14},
	pages = {24-31},
	month = {August},
	note = {Full text available}
}

Abstract

As the amount of data and information received and sent electronically increases in various Small and Medium Enterprises, companies and organizations, the adoption of cloud Database as a Service is becoming popular in the global business community. The operational burden encountered by users of Traditional Database Systems (TDS), such as configuration, provisioning, performance tuning, scalability, privacy and security, backup and access control, are transferred by Database as a Service to the service provider/operator. This offers lower hardware and software costs, remote online access to databases and reliable applications. Despite all the benefits of Database as a Service, security and privacy issues of the cloud database can present significant challenges. With the increase of unauthorized access to confidential data in the cloud, this paper presents encryption techniques that provide strong security against attacks using Transparent Data Encryption (TDE). To protect the confidentiality of the cloud database, TDE is used to transparently encrypt and protect data at rest, on hard disk, in transit and on backup media. TDE is effective, easy and provides high security levels to columns, tables and table space for data that require protection. This paper studies the performance of encryption algorithms (AES128, AES192, AES256 and 3DES168) with regard to CPU time, execution time and elapsed time. AES128 is found to have a better performance than other encryption algorithms.

References

  • Agrawal, D. , Abbadi, A. E. , and Wang, S. (2013) Secure and privacy-preserving database services in the cloud, 2013 IEEE 29th International Conference on Data Engineering (ICDE) [online]. pp. 1268-1271
  • Arasu, A. , Eguro, K. , Kaushik, R. , and Ramamurthy, R. (2013) Querying encrypted data, IEEE 29th International Conference on Data Engineering (ICDE) [online]. pp. 1262-1263
  • Ahmad, T. , Haque, M. A. , Al-Nafjan, K. , and Ansari, A. A. (2013) Development of cloud computing and security issues, information and knowledge management [online]. 3(1), pp. 34-42
  • Arasu, A. , Blanas, S. , Eguro, K. , Kaushik, R. , Kossmann, D. , Ramamurthy, R. , and Venkatesan, R. (2013) Orthogonal security with cipherbase, 6th Biennial Conference on Innovative Data Systems Research (CIDR '13).
  • Bouganim, L. , and Guo, Y. (2009) Database encryption. Encyclopedia of cryptography and security [online]. pp. 1-9
  • Ferrari, E. (2009) Database as a Service: Challenges and solutions for privacy and security. Asia-Pacific Services Computing Conference, 2009. APSCC 2009. IEEE [online]. pp. 46-51.
  • Goodrich, M. T. & Tamassia, R. (2011) Introduction to computer security, Pearson, Boston, Mass
  • Kuyoro, S. O. , Ibikunle, F. and Awodele, O. (2011) Cloud computing security issues and challenges. International Journal of Computer Networks [Online]. 3(5), pp. 247-253
  • Mateljan, V. , Cisic, D. , and Ogrizovic, D. (2010) Cloud Database as a Service (DaaS)-ROI. Proceedings of the 33rd International Convention in MIPRO, IEEE [Online]. pp. 1185-1188
  • NIST (2013) NIST Cloud Computing Program [online]. [Accessed 09th July 2013]. Available at:
  • Oracle (2013a) Oracle Advance Security [online]. [Accessed 09th July 2013]. Available at: < http://www. oracle. com/technetwork/database/options/advanced-security/index. html >
  • Oracle (2013b) Oracle Press Release [online]. [Accessed 15th August 2013]. Available at:
  • Oracle (2013c) Database Advanced Security Administrator's Guide
  • Pathan, A. S. K. , Lee, H. W. , & Hong, C. S. (2006) Security in wireless sensor networks: issues and challenges [online]. The 8th International Conference proceedings in Advanced Communication Technology, 2006. ICACT 2006. 2, pp. 1043-1048.
  • Rehman, A. U. , and Hussain, M. (2011) Efficient Cloud Data Confidentiality for DaaS. International Journal of Advanced Science and Technology [online]. 35, pp. 1-10
  • Stallings, W. , Brown, L. V. , Bauer, M. and Howard, M. (2008) Computer security: principles and practice, Upper Saddle River, N. J. : Pearson Prentice Hall
  • The Sans Institute (2009) Transparent Data Encryption [online]. pp. 1-33. Available at:
  • Developer Network (2014) Transparent Data Encryption [online]. [Accessed 09th July 2014]. Available at:
  • Paliwal, S. and Gupta, R. (2013) A review of some popular encryption techniques. International Journal of Advanced Research in Computer Science and Software Engineering. [online]. 3(2), pp. 147-149
  • Inte Corporation (2009) Encrypt Healthcare Data with performance using Intel and Xeon Processors, white Paper, USA.
  • Carl D. (2011) Oracle 11g Transparent Data Encryption, UK Oracle User Group (UKOUG).
  • Singh S. P and Maini R. (2011) Comparison of data encryption algorithms. International journal of computer science and communication. 2(1), pp125-127.
  • Singh G. , Kumar A. and Sandha K. S (2011) A study of new trends in Blowfish Algorithm. International Journal of Engineering and Research and Applications (IJERA). 1(2), pp. 321-326.
  • Gharehchopogh F. S and Bahari, M. (2013) Evaluation of the data security methods in cloud computing Environments. International Journal in Foundations of Computer Science and Technology (IJFCST). 3(2), pp. 41-51