Database Security with AES Encryption, Elliptic Curve Encryption and Signature
Title | Database Security with AES Encryption, Elliptic Curve Encryption and Signature |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Zaw, Than Myo, Thant, Min, Bezzateev, S. V. |
Conference Name | 2019 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF) |
Keywords | AES 256 bits random key, AES encryption, collective measures, column level encryption, columns level encryption, composability, confidential data, confidentiality, cryptography techniques, data stores, database information, database management software, database management systems, Database Security, database signature security, Database systems, digital signatures, ECC encryption, ECC Signature, efficient encryption, electronic signatures, element level encryption, elements level encryption, Elliptic curve cryptography, elliptic curve encryption, Encryption, Human Behavior, Information security, integrity, key generator, keys store, malicious threats, Metrics, PQC, pubcrawl, public key cryptography, relational database security, relational databases, Resiliency, rows level encryption, secure method, word length 256.0 bit, word length 521.0 bit |
Abstract | A database is an organized collection of data. Though a number of techniques, such as encryption and electronic signatures, are currently available for the protection of data when transmitted across sites. Database security refers to the collective measures used to protect and secure a database or database management software from illegitimate use and malicious threats and attacks. In this paper, we create 6 types of method for more secure ways to store and retrieve database information that is both convenient and efficient. Confidentiality, integrity, and availability, also known as the CIA triad, is a model designed to guide policies for information security within the database. There are many cryptography techniques available among them, ECC is one of the most powerful techniques. A user wants to the data stores or request, the user needs to authenticate. When a user who is authenticated, he will get key from a key generator and then he must be data encrypt or decrypt within the database. Every keys store in a key generator and retrieve from the key generator. We use 256 bits of AES encryption for rows level encryption, columns level encryption, and elements level encryption for the database. Next two method is encrypted AES 256 bits random key by using 521 bits of ECC encryption and signature for rows level encryption and column level encryption. Last method is most secure method in this paper, which method is element level encryption with AES and ECC encryption for confidentiality and ECC signature use for every element within the database for integrity. As well as encrypting data at rest, it's also important to ensure confidential data are encrypted in motion over our network to protect against database signature security. The advantages of elements level are difficult for attack because the attacker gets a key that is lose only one element. The disadvantages need to thousands or millions of keys to manage. |
DOI | 10.1109/WECONF.2019.8840125 |
Citation Key | zaw_database_2019 |
- Metrics
- elements level encryption
- Elliptic curve cryptography
- elliptic curve encryption
- encryption
- Human behavior
- information security
- integrity
- key generator
- keys store
- malicious threats
- element level encryption
- PQC
- pubcrawl
- public key cryptography
- relational database security
- relational databases
- Resiliency
- rows level encryption
- secure method
- word length 256.0 bit
- word length 521.0 bit
- database information
- AES 256 bits random key
- AES encryption
- collective measures
- column level encryption
- columns level encryption
- composability
- confidential data
- confidentiality
- cryptography techniques
- data stores
- efficient encryption
- database management software
- database management systems
- Database Security
- database signature security
- Database systems
- digital signatures
- ECC encryption
- ECC Signature
- electronic signatures