IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 6 - Issue 12, December 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Database Security Technique With Database Cache

[Full Text]

 

AUTHOR(S)

Rashmi Parab, Nilima Nikam

 

KEYWORDS

Authentication, Relational Database, Security, integrity, protection, DBMS, Blowfish.

 

ABSTRACT

Today people are depending more on the corporate data for decision making, management of customer service and supply chain management etc. Any loss, corrupted data or unavailability of data may seriously affect its performance. The database security should provide protected access to the contents of a database and should preserve the integrity, availability, consistency, and quality of the data In this paper, we analyze and compare five traditional architectures for database encryption. We show that existing architectures may provide a high level of security, but have a significant impact on performance and impose major changes to the application layer, or may be transparent to the application layer and provide high performance, but have several fundamental security weaknesses. We suggest a sixth novel architecture that was not considered before. The new architecture is based on placing the encryption module inside the database management software (DBMS), just above the database cache, and using a dedicated technique to encrypt each database value together with its coordinates.

 

REFERENCES

[1] Abdulrahman Hamed Almutairi &Abdulrahman Helal Alruwaili ,”Security in Database Systems”,Volume 12 , Issue 17, Version 1.0, Year 2012,ISSN: 0975-4172..

[2] Tarun Narayan Shankar, G. Sahoo, “Cryptography with Elliptic Curves”, International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 2009,ISSN: 0974-1003

[3] Erez Shmueli, Ronen Vaisenberg, Yuval Elovici, Chanan Glezer,“Database Encryption – An Overview of Contemporary Challenges and Design Considerations”, SIGMOD Record,September 2009 (Vol. 38, No. 3).

[4] H. Hacigumus, B. Iyer, C. Li, S. Mehrotra, Executing SQL over encrypted data in the database-service-provider model, Proceedings of the 2002 ACM SIGMOD International conference on Management of data (2002) 216-227.¬¬

[5] Erez Shmueli, Ronen Vaisenberg, Ehud Gudes, Yuval Elovic,“Implementing a database encryption solution, design and implementation issues”. Computers & Security, Volume 44, July 2014, Pages 33-50