Research Article | Open Access | Download PDF
Volume 2 | Issue 1 | Year 2012 | Article Id. IJCOT-V2I1P304 | DOI : https://doi.org/10.14445/22492593/IJCOT-V2I1P304
A Novel Encryption approach in Database Security
Aarthi.G,Dr. E. Ramaraj
Citation :
Aarthi.G,Dr. E. Ramaraj, "A Novel Encryption approach in Database Security," International Journal of Computer & Organization Trends (IJCOT), vol. 2, no. 1, pp. 6-10, 2012. Crossref, https://doi.org/10.14445/22492593/ IJCOT-V2I1P304
Abstract
Database servers are the most important thing in company environment. They store client details, financial information, human resource details and all the data are should be keptas very secret. Database security concerns the use of a broad range of information security controls to protect databases potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links against compromises of their confidentiality, integrity and availability. It involves various types or categories of controls, such as technical, procedural/administrative and physical. This paper giving a novel security approch in data base encryption. .
Keywords
Database security, Encryption, Decryption..
References
[1] Jain A.,Murty M., and Flynn P., “Data clustering: A Review”, ACAComputing Survey, [1] H. Hacig¨um¨us, S. Mehrotra, and B. Iyer, “Providing database as a service,” in International Conference on Data Engineering - ICDE 2002. IEEE Computer Society, 2002, pp. 29–39.
[2] L. Bouganim and Y. Guo, “Database encryption,” in Encyclopedia of Cryptography and Security.Springer, 2010, 2nd Edition.
[3] M. Bellare, A. Boldyreva, and A. O’Neill, “Deterministic and efficiently searchable encryption,” in Advances in Cryptology - CRYPTO 2007, ser. Lecture Notes in Computer Science, vol. 4622. Springer, 2007, pp. 535–552.
[4] T. Ge and S. Zdonik, “Fast, secure encryption for indexing in a columnoriented DBMS,” in International Conference on Data Engineering - ICDE 2007. IEEE, 2007, pp. 676–685.
[5] S. Goldwasser and S. Micali, “Probabilistic encryption,” J. Comput.Syst. Sci., vol. 28, no. 2, pp. 270–299, 1984.
[6] Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public Key Encryption with Keyword Search. Encrypt 2004, LNCS 3027. pp. 506-522.
[7] Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order Preserving Encryption for Numeric Data. The ACM SIGMOD`2004, Paris, France.
[8] He J, Wang M (2001) Cryptography and Relational Database Management Systems, Proceedings of IEEE Symposium on the International Database Engineering & Applications, Washington, DC, USA.
[9] Chen G, Chen K, Dong J (2006) A Database Encryption Scheme for Enhanced Security and Easy Sharing. CSCWD`06, IEEE Proceedings, IEEE Computer Society, Los Alamitos. CA, pp. 1- 6.
[10] The Forrester Wave: Database Encryption Solutions, Q3 2005.