A Modular and Extendable Approach to Database Encryption at Multi-granularity Level
| International Journal of Computer Trends and Technology (IJCTT) | |
© - Issue 2012 by IJCTT Journal | ||
Volume-3 Issue-6 | ||
Year of Publication : 2012 | ||
Authors :Ramesh Pabboju, S.Krishna Mohan Rao. |
Ramesh Pabboju, S.Krishna Mohan Rao."A Modular and Extendable Approach to Database Encryption at Multi-granularity Level"International Journal of Computer Trends and Technology (IJCTT),V3(6):582-585 Issue 2012 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: -In spite of security mechanisms built into RDBMS, the databases are traditionally having security vulnerabilities for many reasons as they process huge amount of valuable data of real world enterprises. Thus the need for encryption schemes for storing encrypted data to database and decrypting the same while retrieving came into existence. While these schemes are capable of providing complete database security, they actually exhibit tradeoff between true security and efficiency. Efficiency decreases when security increases. There are two problems with traditional database encryption schemes. They show tradeoff between efficiency and security and also can’t solve the problem of storing multi-level encrypted elements into database besides having no ability for effective key management. This paper presents an efficient database encryption scheme that overcomes the problems mentioned above.
References-
[1] Zhou Qin-Li, He Xian-Ming, The Study of an Compound Index Structure & Its Performance Comparison, Microelectronics & Computer, 2004.
[2] D. E Denning, “Field Encryption and Authentication.” Proc. Of CRYPTO 8.9, Plenum Press. 1983.
[3] D. E Denning, “Cryptographic checksums for multilevel data security. “Proc. of Symp.on Security and Privacy, IEEE Computer Society, 1984.pp. 52-61.
[4] Zheng-Fei Wang , Ai-Guo Tang, Wei Wang , Fast Query Over Encrypted Data Based On B+ Tree, International Conference On Apperceiving Computing and Intelligence Analysis,2009.
[5] Samba Sesay, Zongkai Yang, Jingwen Chen and Du Xu, A Secure Database Encryption Scheme, Consumer Communications and Networking Conference,2005.
[6] D Downs,. and G. J Popek, “A Kernel Design for a Secure Data Base Management System.” Proc.3rd Conf. Very Large Data Bases, IEEE and ACM, New York, 1977 pp. 507-514.
KeywordsCryptography, databases, database encryption and decryption, database security .