A Novel SHA-1 approach in Database Security

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - Issue 2012 by IJCTT Journal
Volume-3 Issue-2                           
Year of Publication : 2012
Authors :Aarthi.G,Dr. E. Ramaraj.

MLA

Aarthi.G,Dr. E. Ramaraj. "A Novel SHA-1 approach in Database Security"International Journal of Computer Trends and Technology (IJCTT),V3(2):237-241 Issue 2012 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -Database security is a major research area and includes topics such as database security, intrusion detection, DDos, privacy preserving ,data mining and related papers in designing information systems that protect the privacy and ownership of individual or company information . A database contains data ranging from different degree of confidentiality and is globally accessed by variety of clients. As the importance of the database become more and more essential in business, database security turn up to isanimportant issue in order to protect data from its vulnerability to potential attackers and cryptanalysts. Encryption& decryption adds an additional layer of security to make data unusable if someone gets unauthorized access to the raw data. The new innovate proposed technique is going to design the database encryption with high performance. Database encryption is being shown as the strongest security alternative for the data protection. The main objective of thispaper is to give data security protection at data rest in database.

References-

[1]R.Agrawal,J.Kiernan,R.Srikant,andY.Xu.AnXPath based preference language for P3P. In Proc. of the 12th Int’l World Wide Web Conference, Budapest, Hungary, May 2003.
[2] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu.Hippocratic databases.In Proc. of the 28th Int’lConference on Very Large Databases, Hong Kong,China, August 2002.
[3]Agrawal,J.Kiernan,R.Srikant,andY.Xu.Implementi ngP3P using database technology. In Proc. of the 19thInt’l Con-ference on Data Engineering, Bangalore,India, March 2003.
[4] R. Agrawal and J. Kiernan.Watermarking relational databases.In 28th Int’l Conference on Very Large Databases, Hong Kong, China, August 2002.
[5] G. Hamilton and R. Cattell. JDBC: A Java SQL API. http://splash.javasoft.com/jdbc/.
[6] A. F. Westin. Freebies and privacy: What net users think. Technical report,Opinion Research Corporation,

Keywords — Data security, Data Rest, Encryption, SHA-1, Digest.