International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 3 | Issue 2 | Year 2012 | Article Id. IJCTT-V3I2P108 | DOI : https://doi.org/10.14445/22312803/IJCTT-V3I2P108

A Novel SHA-1 approach in Database Security


Aarthi.G,Dr. E. Ramaraj

Citation :

Aarthi.G,Dr. E. Ramaraj, "A Novel SHA-1 approach in Database Security," International Journal of Computer Trends and Technology (IJCTT), vol. 3, no. 2, pp. 237-241, 2012. Crossref, https://doi.org/10.14445/22312803/IJCTT-V3I2P108

Abstract

Database security is a major research area and includes topics such as database security, intrusion detection, DDos, privacy preserving ,data mining and related papers in designing information systems that protect the privacy and ownership of individual or company information . A database contains data ranging from different degree of confidentiality and is globally accessed by variety of clients. As the importance of the database become more and more essential in business, database security turn up to isanimportant issue in order to protect data from its vulnerability to potential attackers and cryptanalysts. Encryption& decryption adds an additional layer of security to make data unusable if someone gets unauthorized access to the raw data. The new innovate proposed technique is going to design the database encryption with high performance. Database encryption is being shown as the strongest security alternative for the data protection. The main objective of thispaper is to give data security protection at data rest in database.

Keywords

Data security, Data Rest, Encryption, SHA-1, Digest.

References

[1]R.Agrawal,J.Kiernan,R.Srikant,andY.Xu.AnXPath based preference language for P3P. In Proc. of the 12th Int’l World Wide Web Conference, Budapest, Hungary, May 2003.
[2] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu.Hippocratic databases.In Proc. of the 28th Int’lConference on Very Large Databases, Hong Kong,China, August 2002.
[3]Agrawal,J.Kiernan,R.Srikant,andY.Xu.Implementi ngP3P using database technology. In Proc. of the 19thInt’l Con-ference on Bangalore,India, March 2003.
[4] Data Engineering, R. Agrawal and J. Kiernan.Watermarking relational databases.In 28th Int’l Conference on Very Large Databases, Hong Kong, China, August 2002.
[5] G. Hamilton and R. Cattell. JDBC: A Java SQL API. http://splash.javasoft.com/jdbc/.
[6] A. F. Westin. Freebies and privacy: What net users think. Technical report,Opinion Research Corporation, http://www.privacyexchange.org/iss/surveys/sr99071 4.html
[7] Mattsson, Ulf T.,’ A DATABASE ENCRYPTION SOLUTION ,LinuxSecurity.com, 28 July 2004, http://www.linuxsecurity.com/content/view/116068/6 5/
[8] M. Lindemann and SW Smith, Improving DES Hardware Throughput forShort Operations, IBM Research Report, 2001, http://www.research.ibm.com/secure_systems_depart ment/projects/scop/papers/rc21798.pdf
[9] Oracle Technical White Paper. Database Security in Oracle8i, November 1999.
[10] HOW TO LOCK DOWN ENTERPRISE DATA WITH INFRASTRUCTURE SERVICESOriginally published in (IN)SECURE Magazine – www.insecuremag.comUlf T. Mattsson, CTO Protegrity
[11]Database Encryption - How to Balance Security with Performance Ulf T. MattssonProtegrity Corp.