A Novel Encryption approach in Database Security

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2012 by IJCOT Journal
Volume-2 Issue-1                           
Year of Publication : 2012
Authors :Aarthi.G,Dr. E. Ramaraj  

MLA

Aarthi.G,Dr. E. Ramaraj . "A Novel Encryption approach in Database Security" . International Journal of Computer & organization Trends (IJCOT), V2(1):16-20 Jan - Feb 2012, ISSN 2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract—Database servers are the most important thing in company environment. They store client details, financial information, human resource details and all the data are should be keptas very secret. Database security concerns the use of a broad range of information security controls to protect databases potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links against compromises of their confidentiality, integrity and availability. It involves various types or categories of controls, such as technical, procedural/administrative and physical. This paper giving a novel security approch in data base encryption. .

References-

[1] Jain A.,Murty M., and Flynn P., “Data clustering: A Review”, ACAComputing Survey, [1] H. Hacig¨um¨us, S. Mehrotra, and B. Iyer, “Providing database as a service,” in International Conference on Data Engineering - ICDE 2002. IEEE Computer Society, 2002, pp. 29–39.
[2] L. Bouganim and Y. Guo, “Database encryption,” in Encyclopedia of Cryptography and Security.Springer, 2010, 2nd Edition.
[3] M. Bellare, A. Boldyreva, and A. O’Neill, “Deterministic and efficiently searchable encryption,” in Advances in Cryptology - CRYPTO 2007, ser. Lecture Notes in Computer Science, vol. 4622. Springer, 2007, pp. 535–552.
[4] T. Ge and S. Zdonik, “Fast, secure encryption for indexing in a columnoriented DBMS,” in International Conference on Data Engineering - ICDE 2007. IEEE, 2007, pp. 676–685.
[5] S. Goldwasser and S. Micali, “Probabilistic encryption,” J. Comput.Syst. Sci., vol. 28, no. 2, pp. 270–299, 1984.
[6] Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public Key Encryption with Keyword Search. Encrypt 2004, LNCS 3027. pp. 506-522.
[7] Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order Preserving Encryption for Numeric Data. The ACM SIGMOD'2004, Paris, France.
[8] He J, Wang M (2001) Cryptography and Relational Database Management Systems, Proceedings of IEEE Symposium on the International Database Engineering & Applications, Washington, DC, USA.
[9] Chen G, Chen K, Dong J (2006) A Database Encryption Scheme for Enhanced Security and Easy Sharing. CSCWD'06, IEEE Proceedings, IEEE Computer Society, Los Alamitos. CA, pp. 1- 6.
[10] The Forrester Wave: Database Encryption Solutions, Q3 2005.

Keywords— Database security, Encryption, Decryption..