Abstract

Data encryption is one of the advanced measures used to consolidate data security inside Databases. It is an essential technique to protect data against theft, disclosure or modification from different typologies of attacks. In this work, we will propose a new database encryption model. It is based on a novel concept called "Encryption Classes". The proposed model is full compared to the existing models; it integrates many security mechanisms starting from the keys generation and their protection until the data encryption. Furthermore, our proposed model performed a new feature which is the Database structure encryption.

Highlights

  • The security of databases (DB) has been subject of multiple studies and researches conducted by the computer security worldwide community; it aims to protect sensitive data stored in centralized or distributed DB against attacks from malicious entities (Elbouchti et al, 2018)

  • The conventional solutions and mechanisms to secure DB are based on the implementation of three security levels: 1/-Physical security level, 2/-Operating system security level, 3/- Database Management System (DBMS) security level (Elovici et al, 2018)

  • The access control mechanism implemented inside the DBMS level is considered as a strong means that controls the access of subjects to DB objects; it includes identification, authentification and auditing

Read more

Summary

Introduction

The security of databases (DB) has been subject of multiple studies and researches conducted by the computer security worldwide community; it aims to protect sensitive data stored in centralized or distributed DB against attacks from malicious entities (Elbouchti et al, 2018). The access control mechanism implemented inside the DBMS level is considered as a strong means that controls the access of subjects (users) to DB objects; it includes identification, authentification and auditing. This mechanism consolidates the DB security, it doesn't protect against administrator attacks. DB encryption is one of the necessary security measures to implement beside the access control mechanism It can be implemented on several levels: application, DBMS and hard disk (Shmueli et al, 2010; Mattsson, 2005). Several architectures using encryption inside clouds have been developed (Ma et al, 2018; Chen et al, 2018)

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.