Designing a database encryption technique for database security solution with cache
Title | Designing a database encryption technique for database security solution with cache |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Mahajan, S., Katti, J., Walunj, A., Mahalunkar, K. |
Conference Name | 2015 IEEE International Advance Computing Conference (IACC) |
Date Published | jun |
Keywords | Advanced Encryption Standard(AES), cache storage, client details, company secrets, Computer architecture, corporate data, corrupted data, customer service management, data availability, Data collection, data consistency, data integrity, data loss, data management, data organization, data quality, data retrieval, database cache, database encryption technique, database management software, database management systems, database security solution, Databases, DBMS, decision making, Elliptic curve cryptography, Elliptic Curve Cryptography(ECC), Elliptic curves, elliptical curve cryptography module, Encryption, financial information, personal files, pubcrawl170112, public key cryptography, RSA, supply chain management |
Abstract | A database is a vast collection of data which helps us to collect, retrieve, organize and manage the data in an efficient and effective manner. Databases are critical assets. They store client details, financial information, personal files, company secrets and other data necessary for business. Today people are depending more on the corporate data for decision making, management of customer service and supply chain management etc. Any loss, corrupted data or unavailability of data may seriously affect its performance. The database security should provide protected access to the contents of a database and should preserve the integrity, availability, consistency, and quality of the data This paper describes the architecture based on placing the Elliptical curve cryptography module inside database management software (DBMS), just above the database cache. Using this method only selected part of the database can be encrypted instead of the whole database. This architecture allows us to achieve very strong data security using ECC and increase performance using cache. |
URL | https://ieeexplore.ieee.org/document/7154730 |
DOI | 10.1109/IADCC.2015.7154730 |
Citation Key | mahajan_designing_2015 |
- Elliptic curves
- database management software
- database management systems
- database security solution
- Databases
- DBMS
- Decision Making
- Elliptic curve cryptography
- Elliptic Curve Cryptography(ECC)
- database encryption technique
- elliptical curve cryptography module
- encryption
- financial information
- personal files
- pubcrawl170112
- public key cryptography
- RSA
- supply chain management
- Data collection
- cache storage
- client details
- company secrets
- computer architecture
- corporate data
- corrupted data
- customer service management
- data availability
- Advanced Encryption Standard(AES)
- data consistency
- data integrity
- data loss
- data management
- data organization
- data quality
- data retrieval
- database cache