Please use this identifier to cite or link to this item:
Title: Hybrid Database Encryption with Data in Rest and Data in Motion
Researcher: Aarthi.G
Guide(s): Ramaraj.E
Keywords: computer science, hybrid, encryption, data
University: Mother Teresa Womens University
Completed Date: 22.07.2015
Abstract: Security is one of the important aspects in the field of computer science. Out of the various types of securities database security plays a significant role in protecting the sensitive data during the Data-in-Rest and Data-in-Motion level. To perform a secured data transfer, few methods are available and one of them is an encryption of data. The data are to be transferred in an encrypted way while sending and decrypted when they are used. The volatility of the present day, online business environment has left organizations with no alternatives to share sensitive information with their systems, suppliers and business partners. Most of the cryptographic algorithms provide the security of information to be transferred into an insecure medium. Algorithms of those types are in need of data protection from interruption, interception, modification and fabrication. In this way, the security of the data communication is mainly based on the cryptographic algorithms along with their key values. Symmetric and Asymmetric cryptographic algorithms are used the specialized procedure to encrypt or decrypt the data. newlineThere is a possibility that, the hackers may decrypt the message which is either encrypted with symmetric or asymmetric encryption algorithm. Hence, it is essential to hybrid the concept of symmetric and asymmetric technique. The hybrid encryption technique has the advantage of both symmetric and asymmetric way of encrypting. newlineHybrid encryption can provide strong security for Data-in-Rest and Data-in-Motion levels. But developing a database encryption strategy must take many factors into considerations. Encryption at database level, application level and file level has proved to be an ideal method for protecting the sensitive data and delivering the performance. Packaged database encryption solutions have proven to be the best alternative technique to protect the sensitive data. newline Database security is a wide research area and includes topics such as statistical database security, intrusion and detection.
Pagination: xiv, 221p.
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
01-title.pdfAttached File34.21 kBAdobe PDFView/Open
02-certificate.pdf169.5 kBAdobe PDFView/Open
03-abstract.pdf7.83 kBAdobe PDFView/Open
04-declaration.pdf156.6 kBAdobe PDFView/Open
05-acknowledgement.pdf97.16 kBAdobe PDFView/Open
06-contents.pdf11.35 kBAdobe PDFView/Open
07-_list_of_tables.pdf4.05 kBAdobe PDFView/Open
08-list_of_figures.pdf162.45 kBAdobe PDFView/Open
09-abbreviations.pdf17.62 kBAdobe PDFView/Open
10-chapter1.pdf756.07 kBAdobe PDFView/Open
11-chapter2.pdf543.18 kBAdobe PDFView/Open
12-chapter3.pdf2.24 MBAdobe PDFView/Open
13-chapter4.pdf546.54 kBAdobe PDFView/Open
14-chapter5.pdf988.51 kBAdobe PDFView/Open
15-conclusion.pdf170.65 kBAdobe PDFView/Open
16-summary.pdf85.48 kBAdobe PDFView/Open
17-bibliography.pdf298.75 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: