CFP last date
22 April 2024
Reseach Article

A Proposed Algorithm for Database Encryption and Decryption

Published on December 2014 by Tarendra G. Rahangdale, Pritish A.tijare, Swapnil N. Sawalkar
National Conference on Emerging Trends in Computer Technology
Foundation of Computer Science USA
NCETCT - Number 3
December 2014
Authors: Tarendra G. Rahangdale, Pritish A.tijare, Swapnil N. Sawalkar
76a3b176-c324-49a9-bde0-d9009a17d3a3

Tarendra G. Rahangdale, Pritish A.tijare, Swapnil N. Sawalkar . A Proposed Algorithm for Database Encryption and Decryption. National Conference on Emerging Trends in Computer Technology. NCETCT, 3 (December 2014), 21-24.

@article{
author = { Tarendra G. Rahangdale, Pritish A.tijare, Swapnil N. Sawalkar },
title = { A Proposed Algorithm for Database Encryption and Decryption },
journal = { National Conference on Emerging Trends in Computer Technology },
issue_date = { December 2014 },
volume = { NCETCT },
number = { 3 },
month = { December },
year = { 2014 },
issn = 0975-8887,
pages = { 21-24 },
numpages = 4,
url = { /proceedings/ncetct/number3/19096-4034/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Emerging Trends in Computer Technology
%A Tarendra G. Rahangdale
%A Pritish A.tijare
%A Swapnil N. Sawalkar
%T A Proposed Algorithm for Database Encryption and Decryption
%J National Conference on Emerging Trends in Computer Technology
%@ 0975-8887
%V NCETCT
%N 3
%P 21-24
%D 2014
%I International Journal of Computer Applications
Abstract

As the Computer System becomes popular for storing personal and precious data, need of data security goes its peak. For transmitting confidential information over the network, security is required so that it could not be accessed by illegitimate user. The database contains large amount of data that need to be secure. Cryptographic algorithms provide a way to secure data against the unauthorized access. Encryption is the process of encoding data so that its meaning is not obvious, decryption is reverse process that transform an encrypted massage back into original form. Encryption in database system is an important aspect for research, as efficient and secure algorithms are needed that provide the ability to query over encrypted database and allow optimized encryption and decryption of data. In this paper we observe an algorithm which encrypt and decrypt database over query fire quickly. This proposed algorithm will be simple and fast enough for most application which limits to the time and cost of encryption and decryption.

References
  1. H. Brown, Considerations Database Management System Encryption Security Solution, A Research Report presented to The Department of Computer Science at the University of Cape Town, 2003.
  2. G. Davida, D. L. Wells, and J. B. Kam, "A database Encryption system with subkeys," ACM Transactions on Database Systems, vol. 6, no. 2, pp. 312–328, 1981.
  3. H. Hacig¨um¨us, B. Iyer, and S. Mehrotra, "Providing database as a service," in Proceedings of ICDE, pp. 29–38, 2002.
  4. J. He and M. Wang, "Cryptography and relational database management system," IDEAS, pp. 273–284, 2001.
  5. Oracle, Oracle9i Database Security for eBusiness, An Oracle White Paper, June 2001.
  6. http://en. wikipedia. org/wiki/Encryption
  7. S. Lee, T. Park, D. Lee, T. Nam, and S. Kim, "Chaotic order preserving encryption for efficient and secure queries on databases," IEICE Transactions on Information and Systems, vol. 92, pp. 207–217, 2009.
  8. Ceselli, E. Damiani, S. D. C. D. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, "Modeling and assessing inference exposure in encrypted databases," ACM Transactions on Information System Security, vol. 8, no. 1, pp. 119–152, 2005.
  9. E. Damiani, S. D. C. D. Vimercati, M. Finetti, S. Paraboschi, P. Samarati, and S. Jajodia, "Implementation of a storage mechanism for untrusted dbmss," IEE Security in Storage Workshop 2003, pp. 38-46, 2003.
  10. E. Damiani, S. D. C. D. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Metadata management in outsourced encrypted databases," in The Second VLDB Workshop on Secure Data Management, Lecture Notes in Computer Science, pp. 16–32, Springer, 2005.
  11. H. Hacig¨um¨us, B. R. Iyer, and S. Mehrotra, "Ensuring the integrity of encrypted databases in the database-as-a-service model," DBSec 17th Annual Working Conference on Data and Application Security, pp. 61–74, Kluwer, 2003.
  12. Q. Tang and D. Ji "Verifiable attribute based encryption," International Journal of Network Security, vol. 10, no. 2, pp. 114-120, Mar. 2010.
  13. Assessing performance of encrypted databases under query processing with the REA Algorithm Volume 2, Issue 1, January 2014, ISSN: 2321-7782.
Index Terms

Computer Science
Information Sciences

Keywords

Encryptions Decryption Information Security Database Security Query Processing.