Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/85992
Title: | Hybrid Database Encryption with Data in Rest and Data in Motion |
Researcher: | Aarthi.G |
Guide(s): | Ramaraj.E |
Keywords: | computer science, hybrid, encryption, data |
University: | Mother Teresa Womens University |
Completed Date: | 22.07.2015 |
Abstract: | Security is one of the important aspects in the field of computer science. Out of the various types of securities database security plays a significant role in protecting the sensitive data during the Data-in-Rest and Data-in-Motion level. To perform a secured data transfer, few methods are available and one of them is an encryption of data. The data are to be transferred in an encrypted way while sending and decrypted when they are used. The volatility of the present day, online business environment has left organizations with no alternatives to share sensitive information with their systems, suppliers and business partners. Most of the cryptographic algorithms provide the security of information to be transferred into an insecure medium. Algorithms of those types are in need of data protection from interruption, interception, modification and fabrication. In this way, the security of the data communication is mainly based on the cryptographic algorithms along with their key values. Symmetric and Asymmetric cryptographic algorithms are used the specialized procedure to encrypt or decrypt the data. newlineThere is a possibility that, the hackers may decrypt the message which is either encrypted with symmetric or asymmetric encryption algorithm. Hence, it is essential to hybrid the concept of symmetric and asymmetric technique. The hybrid encryption technique has the advantage of both symmetric and asymmetric way of encrypting. newlineHybrid encryption can provide strong security for Data-in-Rest and Data-in-Motion levels. But developing a database encryption strategy must take many factors into considerations. Encryption at database level, application level and file level has proved to be an ideal method for protecting the sensitive data and delivering the performance. Packaged database encryption solutions have proven to be the best alternative technique to protect the sensitive data. newline Database security is a wide research area and includes topics such as statistical database security, intrusion and detection. |
Pagination: | xiv, 221p. |
URI: | http://hdl.handle.net/10603/85992 |
Appears in Departments: | Department of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01-title.pdf | Attached File | 34.21 kB | Adobe PDF | View/Open |
02-certificate.pdf | 169.5 kB | Adobe PDF | View/Open | |
03-abstract.pdf | 7.83 kB | Adobe PDF | View/Open | |
04-declaration.pdf | 156.6 kB | Adobe PDF | View/Open | |
05-acknowledgement.pdf | 97.16 kB | Adobe PDF | View/Open | |
06-contents.pdf | 11.35 kB | Adobe PDF | View/Open | |
07-_list_of_tables.pdf | 4.05 kB | Adobe PDF | View/Open | |
08-list_of_figures.pdf | 162.45 kB | Adobe PDF | View/Open | |
09-abbreviations.pdf | 17.62 kB | Adobe PDF | View/Open | |
10-chapter1.pdf | 756.07 kB | Adobe PDF | View/Open | |
11-chapter2.pdf | 543.18 kB | Adobe PDF | View/Open | |
12-chapter3.pdf | 2.24 MB | Adobe PDF | View/Open | |
13-chapter4.pdf | 546.54 kB | Adobe PDF | View/Open | |
14-chapter5.pdf | 988.51 kB | Adobe PDF | View/Open | |
15-conclusion.pdf | 170.65 kB | Adobe PDF | View/Open | |
16-summary.pdf | 85.48 kB | Adobe PDF | View/Open | |
17-bibliography.pdf | 298.75 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: