DATABASE SECURITY AND STUDY OF DATA ENCRYPTION METHODS IN CLOUD STORAGE
DOI:
https://doi.org/10.26906/SUNZ.2020.3.104Keywords:
Encryption, Cryptography, Hashing, Database, Cloud Storage, Cipher textAbstract
Purpose of the article is discusses the importance of database encryption and makes an in depth review of various encryption techniques. Security of Data is the most important task in today’s world. Governments, companies and other organizations have lost a lot of money and many others have closed down due to the activities of dubious hackers and attackers. Over the years various encryption schemes have been developed in order to protect the database from various attacks by the intruders. As data is the life wire of every organization, there is the need to remotely and securely store the data generated daily by these organizations in order to enable them recover quickly in the event of attach and hack. Cloud storage is needed here for the remote data storage. For many establishments, data security is one of their major concern when sending their files into the cloud. They worry about their files being seen or even compromised by malicious and dubious people because that’s what happened in the past. Data encryption techniques are required to protect the integrity of the stored data. In the past, many businesses felt comfortable allowing the cloud providers to manage all their data, believing that security risks could be managed through contracts, controls and audits. Over time it has become apparent, however, that cloud providers cannot honor such commitments when responding to government requests for information. This paper discuses, the importance of database encryption and makes an in depth review of various encryption techniquesDownloads
References
Baraani-Dastjerdi, Ahmad, Josef Pieprzyk, and Reihaneh Safavi-Naini. "Security in databases: A survey study." Department of Computer Science, The University of Wollongong (1996).
Denny Cherry and Thomas Larock, “2 - Database Encryption, In Securing SQL Server”, edited by Denny Cherry, Thomas Larock, Syngress, Boston, 2011, Pages 27-71, ISBN : 9781597496254.
Kessler, Gary C. "An overview of Cryptography." (2003). http://www.sciencedirect.com/science/article/pii/B97815974962541000 22).
Vamsee Krishna, Yarlagadda And Sriram Ramanujam, ―Data Security in Cloud Computing‖, Journal of Computer and Mathematical Sciences, Vol.2 (1), pp 15-23, 2011.
Peter Mell, Tim Grance, ―Effectively and Securely Using the Cloud Computing Paradigm‖, NIST, Information Technology Laboratory, http://www.csrc.nist.gov/groups/SNS/cloud-comput ing/cloudcomputingv26.ppt. 2009.
Eman M.Mohamed, Hatem S.Abdelkader and Sherif El-Etriby, ―Data Security Model for Cloud Computing‖, The Twelfth International Conference on Networks, ISBN: 978-1-61208-245-5, pp 66-74, 2013.