A NEW SECURE DATABASE MODEL BASED ON THE HASH ALGORITHM AND CELLULAR AUTOMATA
Proceeding: The International Conference on Electrical and Electronics Engineering, Clean Energy and Green Computing (EEECEGC)Publication Date: 2013-11-11
Authors : Mohammad V. Malakooti; Ebrahim Akhavan Bazofti;
Page : 232-238
Keywords :
Abstract
In this paper, we have developed a robust encryption system for the database tables based on the orthogonal transform to increase the security of its content. We also presented a secure database model based on the hash algorithm and a cellular automaton to turn on the attack alarm while the database is unlocked and in active mode but it is accessed by illegal user. Our proposed encryption and decryption algorithm is categorized as symmetric cryptography in which a common key is used for both encryption and decryption processes as oppose to asymmetric one that two keys, private and public key, are required. We have used the property of orthogonal matrix to calculate the inverse of the transformation matrix based on its matrix transpose rather than direct calculation of its inverse during the decryption process to speed up the operations. We have generated a secret key sequence to apply the XOR operations on the data elements of all tables in the database during the encryption and decryption processes. We used Malakooti Orthogonal Transform (M-T) and the internal rules of cellular automata to encrypt the data elements inside the database through a proper method with a high degree of security. The Encrypted database elements can only be displayed when the XOR operation is applied on these data elements and the secret keys generated by Malakooti Key Generator algorithm. Our algorithm is able to encrypt the data elements of each table inside the database with a high degree of security. In addition, our proposed method can be applied to all data elements of the database kept on servers as the backup and archive. Using orthogonal transformation (M-T) and proposed highly strong and irreversible hash algorithm, we have introduced a new secure database model to protect the vital information online and inside the database servers from the illegal users and hackers.
Other Latest Articles
- NONLINEAR COMPOSITE ADAPTIVE CONTROL FOR QUADROTOR COPTER
- CRITICAL FACTORS AND ICT CONTRIBUTION FOR ACCELERATING SMART GRID REALIZATION
- TOWARDS GREEN SERVICE-ORIENTED COMPUTING
- MATCHING LAYER DESIGN PROCEDURE FOR A NOVEL BROADBAND DIELECTRIC LENS ANTENNA
- COMPUTING FOR CARBON EMISSION REDUCTION: ICT ROLE
Last modified: 2014-01-05 06:38:07