CFP last date
22 April 2024
Reseach Article

Performance Analysis of the Encryption Algorithms as Solution to Cloud Database Security

by Murtala Aminu Baba, Abdulrahman Yusuf, Aminu Ahmad, Ladan Maijama'a
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 99 - Number 14
Year of Publication: 2014
Authors: Murtala Aminu Baba, Abdulrahman Yusuf, Aminu Ahmad, Ladan Maijama'a
10.5120/17442-8228

Murtala Aminu Baba, Abdulrahman Yusuf, Aminu Ahmad, Ladan Maijama'a . Performance Analysis of the Encryption Algorithms as Solution to Cloud Database Security. International Journal of Computer Applications. 99, 14 ( August 2014), 24-31. DOI=10.5120/17442-8228

@article{ 10.5120/17442-8228,
author = { Murtala Aminu Baba, Abdulrahman Yusuf, Aminu Ahmad, Ladan Maijama'a },
title = { Performance Analysis of the Encryption Algorithms as Solution to Cloud Database Security },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 99 },
number = { 14 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 24-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume99/number14/17442-8228/ },
doi = { 10.5120/17442-8228 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:28:12.441924+05:30
%A Murtala Aminu Baba
%A Abdulrahman Yusuf
%A Aminu Ahmad
%A Ladan Maijama'a
%T Performance Analysis of the Encryption Algorithms as Solution to Cloud Database Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 99
%N 14
%P 24-31
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As the amount of data and information received and sent electronically increases in various Small and Medium Enterprises, companies and organizations, the adoption of cloud Database as a Service is becoming popular in the global business community. The operational burden encountered by users of Traditional Database Systems (TDS), such as configuration, provisioning, performance tuning, scalability, privacy and security, backup and access control, are transferred by Database as a Service to the service provider/operator. This offers lower hardware and software costs, remote online access to databases and reliable applications. Despite all the benefits of Database as a Service, security and privacy issues of the cloud database can present significant challenges. With the increase of unauthorized access to confidential data in the cloud, this paper presents encryption techniques that provide strong security against attacks using Transparent Data Encryption (TDE). To protect the confidentiality of the cloud database, TDE is used to transparently encrypt and protect data at rest, on hard disk, in transit and on backup media. TDE is effective, easy and provides high security levels to columns, tables and table space for data that require protection. This paper studies the performance of encryption algorithms (AES128, AES192, AES256 and 3DES168) with regard to CPU time, execution time and elapsed time. AES128 is found to have a better performance than other encryption algorithms.

References
  1. Agrawal, D. , Abbadi, A. E. , and Wang, S. (2013) Secure and privacy-preserving database services in the cloud, 2013 IEEE 29th International Conference on Data Engineering (ICDE) [online]. pp. 1268-1271
  2. Arasu, A. , Eguro, K. , Kaushik, R. , and Ramamurthy, R. (2013) Querying encrypted data, IEEE 29th International Conference on Data Engineering (ICDE) [online]. pp. 1262-1263
  3. Ahmad, T. , Haque, M. A. , Al-Nafjan, K. , and Ansari, A. A. (2013) Development of cloud computing and security issues, information and knowledge management [online]. 3(1), pp. 34-42
  4. Arasu, A. , Blanas, S. , Eguro, K. , Kaushik, R. , Kossmann, D. , Ramamurthy, R. , and Venkatesan, R. (2013) Orthogonal security with cipherbase, 6th Biennial Conference on Innovative Data Systems Research (CIDR '13).
  5. Bouganim, L. , and Guo, Y. (2009) Database encryption. Encyclopedia of cryptography and security [online]. pp. 1-9
  6. Ferrari, E. (2009) Database as a Service: Challenges and solutions for privacy and security. Asia-Pacific Services Computing Conference, 2009. APSCC 2009. IEEE [online]. pp. 46-51.
  7. Goodrich, M. T. & Tamassia, R. (2011) Introduction to computer security, Pearson, Boston, Mass
  8. Kuyoro, S. O. , Ibikunle, F. and Awodele, O. (2011) Cloud computing security issues and challenges. International Journal of Computer Networks [Online]. 3(5), pp. 247-253
  9. Mateljan, V. , Cisic, D. , and Ogrizovic, D. (2010) Cloud Database as a Service (DaaS)-ROI. Proceedings of the 33rd International Convention in MIPRO, IEEE [Online]. pp. 1185-1188
  10. Oracle (2013a) Oracle Advance Security [online]. [Accessed 09th July 2013]. Available at: < http://www. oracle. com/technetwork/database/options/advanced-security/index. html >
  11. Pathan, A. S. K. , Lee, H. W. , & Hong, C. S. (2006) Security in wireless sensor networks: issues and challenges [online]. The 8th International Conference proceedings in Advanced Communication Technology, 2006. ICACT 2006. 2, pp. 1043-1048.
  12. Rehman, A. U. , and Hussain, M. (2011) Efficient Cloud Data Confidentiality for DaaS. International Journal of Advanced Science and Technology [online]. 35, pp. 1-10
  13. Stallings, W. , Brown, L. V. , Bauer, M. and Howard, M. (2008) Computer security: principles and practice, Upper Saddle River, N. J. : Pearson Prentice Hall
  14. Paliwal, S. and Gupta, R. (2013) A review of some popular encryption techniques. International Journal of Advanced Research in Computer Science and Software Engineering. [online]. 3(2), pp. 147-149
  15. Inte Corporation (2009) Encrypt Healthcare Data with performance using Intel and Xeon Processors, white Paper, USA.
  16. Carl D. (2011) Oracle 11g Transparent Data Encryption, UK Oracle User Group (UKOUG).
  17. Singh S. P and Maini R. (2011) Comparison of data encryption algorithms. International journal of computer science and communication. 2(1), pp125-127.
  18. Singh G. , Kumar A. and Sandha K. S (2011) A study of new trends in Blowfish Algorithm. International Journal of Engineering and Research and Applications (IJERA). 1(2), pp. 321-326.
  19. Gharehchopogh F. S and Bahari, M. (2013) Evaluation of the data security methods in cloud computing Environments. International Journal in Foundations of Computer Science and Technology (IJFCST). 3(2), pp. 41-51
Index Terms

Computer Science
Information Sciences

Keywords

Encryption TDE TDS AES 3DES Oracle12c