Database Security Technique With Database Cache
[Full Text]
AUTHOR(S)
Rashmi Parab, Nilima Nikam
KEYWORDS
Authentication, Relational Database, Security, integrity, protection, DBMS, Blowfish.
ABSTRACT
Today people are depending more on the corporate data for decision making, management of customer service and supply chain management etc. Any loss, corrupted data or unavailability of data may seriously affect its performance. The database security should provide protected access to the contents of a database and should preserve the integrity, availability, consistency, and quality of the data In this paper, we analyze and compare five traditional architectures for database encryption. We show that existing architectures may provide a high level of security, but have a significant impact on performance and impose major changes to the application layer, or may be transparent to the application layer and provide high performance, but have several fundamental security weaknesses. We suggest a sixth novel architecture that was not considered before. The new architecture is based on placing the encryption module inside the database management software (DBMS), just above the database cache, and using a dedicated technique to encrypt each database value together with its coordinates.
REFERENCES
[1] Abdulrahman Hamed Almutairi &Abdulrahman Helal Alruwaili ,”Security in Database Systems”,Volume 12 , Issue 17, Version 1.0, Year 2012,ISSN: 0975-4172..
[2] Tarun Narayan Shankar, G. Sahoo, “Cryptography with Elliptic Curves”, International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 2009,ISSN: 0974-1003
[3] Erez Shmueli, Ronen Vaisenberg, Yuval Elovici, Chanan Glezer,“Database Encryption – An Overview of Contemporary Challenges and Design Considerations”, SIGMOD Record,September 2009 (Vol. 38, No. 3).
[4] H. Hacigumus, B. Iyer, C. Li, S. Mehrotra, Executing SQL over encrypted data in the database-service-provider model, Proceedings of the 2002 ACM SIGMOD International conference on Management of data (2002) 216-227.¬¬
[5] Erez Shmueli, Ronen Vaisenberg, Ehud Gudes, Yuval Elovic,“Implementing a database encryption solution, design and implementation issues”. Computers & Security, Volume 44, July 2014, Pages 33-50
|