DocumentCode :
3076849
Title :
Numeric To Numeric Encryption of Databases: Using 3Kdec Algorithm
Author :
Kaur, Kamaljit ; Dhindsa, K.S. ; Singh, Ghanaya
fYear :
2009
fDate :
6-7 March 2009
Firstpage :
1501
Lastpage :
1505
Abstract :
the volume of data storage capacity has changed a lot as compared with earlier times. As most computers were standalone and only the users had access to data, security was not a big concern. All this changed when computers became linked in networks, in form of small dedicated networks to large LANs, WANs and the World Wide Web. With the growth of networking the security of data became a big issue. Data passes through various networks, communication protocols, and devices to ultimately reach to the user which has made data security increasingly important. Security is becoming one of the most urgent challenges in database research and industry. Instead of building walls around servers, a protective layer of encryption should be provided around specific sensitive data-items. This also allows us to define which data stored in databases are sensitive and thereby focusing the protection only on the sensitive data, which in turn minimizes the delays or burdens on the system that may occur from other bulk encryption methods. This paper describes a highly original and new approach of securing numeric data of databases. It presents a practical solution to the problem where numeric data was converted to alphanumeric type and hence encrypted data was not possible to be stored in the existing numeric field. The proposed algorithm allows transparent record level encryption that does not change the data field type or fixed length.
Keywords :
authorisation; cryptography; database management systems; 3Kdec algorithm; access control mechanism; bulk encryption method; data storage capacity volume; database data security; numeric-to-numeric encryption; sensitive data protection; transparent record level encryption; Computer networks; Computer security; Cryptography; Data security; Databases; Memory; Network servers; Protection; Protocols; Web sites; AddKey; Block Cipher; Decryption; Encryption; Key Expansion; Row Shifting; Substitution box; Symmetric Encryption;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advance Computing Conference, 2009. IACC 2009. IEEE International
Conference_Location :
Patiala
Print_ISBN :
978-1-4244-2927-1
Electronic_ISBN :
978-1-4244-2928-8
Type :
conf
DOI :
10.1109/IADCC.2009.4809240
Filename :
4809240
Link To Document :
بازگشت