ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.5, No. 10)

Publication Date:

Authors : ; ; ;

Page : 33-41

Keywords : Confidentiality of Database; Database Security; User Supplied Key; Security issues of Database; Database Encryption .;

Source : Downloadexternal Find it from : Google Scholarexternal


The security of database is very important as data is the most valuable asset in the modern environment. Various security methodologies are available to secure databases. Most of the available methodologies focus on access control of the database, but there may be situations when someone intentionall y or accidentally break or bypass the access control mechanism of the database and hence the confidentially of the database could be compromised. Various methods are available to preserve the confidentially of the database in those situations. The best sol ution in this case is encryption. Various Researchers proposed different methods by which the database encryption can be enforced and the content of database is encrypted and decrypted efficiently. All Encryption techniques available till date converts pl ain text into cipher text but the length of both will be same, this is a serious shortcoming of available cryptographic approach for example some attacker can guess the plain text by accessing the length of cipher. In this paper we elaborate the use of da tabase encryption to protect the database content. We propose a User supplied Key based authentication which generates the cipher of different length in comparison to plain text. By the use of this approach database can be protected again st various kind of vulnerabilities.

Last modified: 2016-10-05 19:20:38