Database Security Using Encryption
Database Security Using Encryption
m (ABLAZE 2015)
Abstract—Security of Data is the most important task in is encrypted before saving it inn the database, even with access
today’s world. Over the years various encrypption schemes have to the database the intruder caannot misuse this data. Fig 1,
been developed in order to protect the dataabase from various show how the intruder can acceess the contents of database.
attacks by the intruders. This paper discuses the importance of
database encryption and makes an in depth review of various
database encryption techniques and comparee them on basis of
their merits and demerits.
I. INTRODUCTION
In this age of technology, all our work is being done by the
computers. From chatting with friends on social networking
websites, to making online payments throuugh Net Banking,
everything is being done online through compputers. Since these
facilities are efficient and make our work eaasy we use them in
one way or the other. This means to use theese online services
we are storing all our personal and senssitive data in the
databases of these websites and applicatioons, which indeed
make this data prone to various security threeats. So protection
of this important user data is one of the majoor priority, in order
to avoid any misuse of data.
978-1-4799-8433-6/15/$31.00©2015 IEEE
E
353
2015 1st International conference on futuriistic trend in computational analysis and knowledge management
m (ABLAZE 2015)
the system; due to encryption he should not be able to misuse password entered is encryypted using hash function and
the data in the database. then matched with the paassword stored in the database
which is already in encryppted form, if both matches the
Figure 2, shows basic working of the daatabase encryption user get access else it gets the message of invalid
and decryption process. The plain text/data to be saved in the username/password. M
Most commonly used Hash
database is first converted into cipher text ussing an appropriate Functions are MD4, MD55, SHA, SHA-1 etc. Figure 4,
algorithm and a specific key. Then this cipheer text is saved into shows working of hashing.
the database. When the user wants to extractt the data from the
from the database, the cipher text is converrted back to plain
text using the decryption algorithm and the same key used in
encryption. This will return the plain text to the user, when
requested.
354
2015 1st International conference on futuriistic trend in computational analysis and knowledge management
m (ABLAZE 2015)
m
Fig. 6. Database in Encrypted Form
355
2015 1st International conference on futuriistic trend in computational analysis and knowledge management
m (ABLAZE 2015)
c. Hashing
Mary Cindy Ah Kioon, et ala [21], discussed the importance
of password encryption using hashing
h functions like MD5 etc.
It also suggests possible modiffication that can further enhance
the security using hashing fuunctions. Figure 11, shows the
snapshot of database using MD5 hash function.
Table 1,
1 “Comparison of different Research Papers”
Paper Technique Used Algorithm Merits Demerits
Time Cost of Cannot directly
A secure database Standalonne Encryption and perform queries of
Data Encryption
encryption Encryptioon Decryption statistical functions
Standard (DES)
scheme[4] Approacch operation is such as sum,
minimum. average, counts etc.
Security is
guaranteed by use ofo
A two-phase
Standalonne two phase
encryption scheme Data Encryption Lot of computation
Encryptioon encryption.
for enhancing Standard (DES) and Overheads.
Approacch Problem of key
database security[5]
management is alsoo
efficiently handled.
Fast, secure Standalonne Fast Comparison Efficient and Fast Key can be easily
encryption for Encryptioon Encryption (FCE) for protecting the generated and hence
356
2015 1st International conference on futuristic trend in computational analysis and knowledge management (ABLAZE 2015)
357
2015 1st International conference on futuristic trend in computational analysis and knowledge management (ABLAZE 2015)
358