Abstract

The need to protect database, would be an every growing one especially so in this age of e-commerce. Many conventional database security systems are bugged with holes that can be used by attackers to penetrate the database. No matter what degree of security is put in place, sensitive data in database are still vulnerable to attack. To avoid the risk posed by this threat, database encryption has been recommended. However encrypting all of database item will greatly degrade the performance of the database system. As an optimal solution this paper presents a database encryption scheme that provides maximum security, whilst limiting the added time cost of encryption and decryption.

Highlights

  • In today’s economy databases symbolize one of the most valuable assets

  • The objective of this paper is to propose a secure database encryptions scheme that provides maximum security, whilst limiting the added time cost for encryption and decryption

  • Implementation: It is described that how the model operates to provide security to the database

Read more

Summary

Introduction

In today’s economy databases symbolize one of the most valuable assets. They form the basis for e-business, e-commerce, Enterprise Resource Planning (ERP) and other sensitive activities. Huge amount of effort, time and resources are been spent in trying to make database systems meet security requirements. A compromise solution must be found between performance and security, by encrypting only sensitive data in tables or column in the database. The objective of this paper is to propose a secure database encryptions scheme that provides maximum security, whilst limiting the added time cost for encryption and decryption. In [1] he provides solutions to the security problems of field based protection. In his paper he presents a comparative study on implementing encryption at various database levels i.e table, attribute and field (element) levels. A ll the above approaches are different from this study in terms of structure, key management and the implementation procedures

Objectives
Methods
Results
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.