Database Security and Study of Data Encryption Met
Database Security and Study of Data Encryption Met
105
Системи управління, навігації та зв'язку, 2020, випуск 3(61) ISSN 2073-7394
keys: public key, which is known to the public, and ciphertexts in the different attack models. Once again
private key which is known only to the user. Fig. 3, b we see that there is no Semantic Security without
below illustrates the use of the two keys between node A probabilistic encryption. This is especially true in the
and node B. After agreeing on the type of encryption to public-key setting, since every principal has access to an
be used in the connection, node B sends its public key to encryption function for every other principal, by
node A. Node A uses the received public key to encrypt definition. Especially when the space of possible
its messages. Then when the encrypted messages arrive, messages is small, it is easy to simply check all
node B uses its private key to decrypt them. messages under the encryption function to figure out
This capability surmounts the symmetric encryption what has been encrypted.
problem of managing secret keys. But on the other hand,
this unique feature of public key encryption makes it Conclusions
mathematically more prone to attacks. Moreover, With advancement in Technology, nowadays
asymmetric encryption techniques are almost 1000 times everything is being done with computers, so security of
slower than symmetric techniques, because they require these data in the database becomes an important issue.
more computational processing power. To get the Many researchers have worked on this thing and
benefits of both methods, a hybrid technique is usually proposed various algorithms and architectures. Each
used. In this technique, asymmetric encryption is used to scheme has its own advantages and disadvantages. But
exchange the secret key, symmetric encryption is then none of them is fully secure, and contain certain
used to transfer data between sender and receiver [6]. loopholes or demerits with can be used by the attackers
For example, in an open system, given any two and the intruders to get access of the database. So there
principals X and Y, X should be able to encrypt a is a scope of improvement in this area.
message that can only be decrypted by Y. If there is Many research problems are yet to be identified.
some binding established between principal identities Cryptographic techniques are used to provide secure
and public keys, then these operations can easily be communication between the user and the cloud.
performed. A naive scheme might function as follows: Symmetric encryption has the speed and computational
principal X looks up public key Ky for principal Y and efficiency to handle encryption of large volumes of data
uses it to compute an encryption for Y using some in cloud storage. This paper proposed a symmetric
trapdoor function c f KY (m) ; then Y, on receipt of encryption algorithm for secure storage of cloud user
data in cloud storage. The proposed encryption
this message computes f 1k y (c) m . algorithm is described in detail and the decryption
But there's a significant problem with this scheme process is reverse of the encryption. This algorithm is
given our definitions of security for shared-key used in order to encrypt the data of the user in the cloud.
encryption: it doesn't satisfy Semantic Security, since Since the user has no control over the data once their
it's trivial for an adversary to compute session is logged out, the encryption key acts as the
fK y (m) and fK y (m) and compare them against given primary authentication for the user.
REFERENCES
1. Baraani-Dastjerdi, Ahmad, Josef Pieprzyk, and Reihaneh Safavi-Naini. "Security in databases: A survey study." Department
of Computer Science, The University of Wollongong (1996).
2. Denny Cherry and Thomas Larock, “2 - Database Encryption, In Securing SQL Server”, edited by Denny Cherry, Thomas
Larock, Syngress, Boston, 2011, Pages 27-71, ISBN : 9781597496254.
3. Kessler, Gary C. "An overview of Cryptography." (2003).
http://www.sciencedirect.com/science/article/pii/B97815974962541000 22).
4. Vamsee Krishna, Yarlagadda And Sriram Ramanujam, ―Data Security in Cloud Computing‖, Journal of Computer and
Mathematical Sciences, Vol.2 (1), pp 15-23, 2011.
5. Peter Mell, Tim Grance, ―Effectively and Securely Using the Cloud Computing Paradigm‖, NIST, Information Technology
Laboratory, http://www.csrc.nist.gov/groups/SNS/cloud-comput ing/cloudcomputingv26.ppt. 2009.
6. Eman M.Mohamed, Hatem S.Abdelkader and Sherif El-Etriby, ―Data Security Model for Cloud Computing‖, The Twelfth
International Conference on Networks, ISBN: 978-1-61208-245-5, pp 66-74, 2013.
Received (Надійшла) 30.07.2020
Accepted for publication (Прийнята до друку) 09.09.2020
106