Comparison of Encryption Algorithms during Data Transmission at Rest and in Transit
MLA Style: P.Rajesh Kannan, R.Mala, "Comparison of Encryption Algorithms during Data Transmission at Rest and in Transit" International Journal of Computer Trends and Technology 67.2 (2019): 60-64.
APA Style:P.Rajesh Kannan, R.Mala, (2019). Comparison of Encryption Algorithms during Data Transmission at Rest and in Transit. International Journal of Computer Trends and Technology, 67(2), 60-64.
Abstract
Securing the sensitive data in the databases become very important nowadays because of the unencrypted form of the unstructured data. Most of the open source databases handle the huge amount of data in unencrypted format that is accessible to anyone. Database operations such as read, edit, update and delete operations are performed on the databases while in transit as well as in rest. This paper proposes a secure encryption algorithm that is used to increase the packet delivery ratio and throughput compared with the existing encryption algorithm which is used to encrypt the data at transit and rest. The average throughput and packet delivery ratio as compared with the existing algorithm results with a more secured algorithm with the validated results.
Reference
[1] Jef Van Loon, Prof. Dr. C-C. Kanne, Ch. Sturm, “Database Security - Concepts, Approaches”, Article in IEEE Transactions on Dependable and Secure Computing · Seminar in Database Systems, University of Zurich,Department of Informatics, Autumn Term 2008, DOI: 10.1109/TDSC.2005.9 · Source: IEEE Xplore.
[2] Mubina Malik and Trisha Patel, “DATABASE SECURITY - ATTACKS AND CONTROL METHODS”, International Journal of Information Sciences and Techniques (IJIST) Vol.6, No.1/2, March 2016.
[3] P. Rajesh kannan1, R. Mala2, “comparison of encryption algorithms on NoSQL databases”, International Journal of Computer Sciences and Engineering, Vol.-6, Issue-10, Oct 2018.
[4] P.R.Hariharan & Dr. K.P. Thooyamani , Various Schemes for Database Encryption - A Survey”, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 19 (2017) pp. 8763-8767, Research India Publications.
[5] https://docs.mongodb.com/manual/core/security-encryption-at-rest.
[6] Suna Yin, Dehua Chen, Jiajin Le,China, 2016 IEEE,"STNOSQL Creating NOSQL Database on the Sensible Things Platform.
[7] E. Bertino and R. Sandhu. Database security - concepts, approaches, and challenges.Dependable and Secure Computing, IEEE Transactions on, 2(1):2–19, Jan.March 2005.
[8] Shelly Rohilla, Pradeep Kumar Mittal, Database Security: Threats and Challenges, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013.
[9] Kurapati Sundar Teja et al. “ Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Operations”, Int. Journal of Engineering Research and Applications Vol. 5, Issue 8, (Part - 1) August 2015, pp.81-82
[10] Vinod Shokeen, Niranjan Yadav, “Encryption and Decryption Technique for Message Communication”, International Journal of Electronics & Communication Technology, Vol. 2, Issue 2, June 2011, pp. 80-83.
[11] Obaida Mohammad Awad Al-Hazaimeh, “A New Approach For Complex Encrypting and Decrypting Data”, International Journal Of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013, pp. 95-103.
[12] D. Kulkarni. A fine-grained access control model for key-value systems. In Proceedings of the third ACM conference on Data and application security and privacy, pages 161–164. ACM, 2013
[13] P. Colombo and E. Ferrari. Enhancing MongoDB with Purpose Based Access Control. In IEEE Transactions on Dependable and Secure Computing, November 2015 DOI:10.1109/TDSC.2015.2497680
[14] Boyu Hou, Kai Qian, Lei Li, Yong Shi, Lixin Tao, Jigang Liu, USA, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing ,"Mongo Database NOSQL Injection Analysis and Detection".
[15] Anil Kumar, Harsha H L, B. Swaroop Reddy, K.Sunil Kumar Reddy, Krishna N, “Homomorphic Encrypted MongoDB for Users Data Security”, International Journal of Engineering Research in Computer Science and Engineering (IJERCSE) Vol 5, Issue 6, June 2018
Keywords
Encryption, data at transit, throughput, packet delivery ratio, No SQL databases