Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit

To prevent unauthorized access to the databases and to ensure that the data of the databases is protected from intruders and insiders, the data is being encrypted at the storage locations. The same goal is achieved with Transparent Data Encryption, a feature that can be found in almost all database...

Full description

Bibliographic Details
Main Authors: Vaheedbasha Shaik, Dr. Natarajan K
Format: Article
Language:English
Published: Elsevier 2022-01-01
Series:MethodsX
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2215016122003016
_version_ 1811295167674580992
author Vaheedbasha Shaik
Dr. Natarajan K
author_facet Vaheedbasha Shaik
Dr. Natarajan K
author_sort Vaheedbasha Shaik
collection DOAJ
description To prevent unauthorized access to the databases and to ensure that the data of the databases is protected from intruders and insiders, the data is being encrypted at the storage locations. The same goal is achieved with Transparent Data Encryption, a feature that can be found in almost all database products. However, it has been observed that the non-datafiles are being ignored and there is no standard encryption for them like there is for datafiles. Moreover, there was no standard algorithm to encrypt them without relying on third-party tools. Therefore, • This study provides a robust algorithm to perform the encryption. This presentation also describes the importance of non-datafiles encryption, and how some non-datafiles can pose a threat to data and infrastructure without encryption. • The practical implementation of the non-data file encryption algorithm shows the authentic results. Further, unlike existing algorithms, the proposed algorithm gives the file owner full control over the encryption logic. • In the encryption process, two levels of encryption logics are combined with a passcode lock, while the same combination of two levels of reversing encryption and passcode is used in the decryption process to convert encoded data back into text format.
first_indexed 2024-04-13T05:29:20Z
format Article
id doaj.art-53b7aca43bed4688af2569e178a82a2e
institution Directory Open Access Journal
issn 2215-0161
language English
last_indexed 2024-04-13T05:29:20Z
publishDate 2022-01-01
publisher Elsevier
record_format Article
series MethodsX
spelling doaj.art-53b7aca43bed4688af2569e178a82a2e2022-12-22T03:00:30ZengElsevierMethodsX2215-01612022-01-019101924Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transitVaheedbasha Shaik0Dr. Natarajan K1Corresponding author.; Department of Computer Science & Engineering, School of Engineering & Technology, CHRIST (Deemed to be University), Bangalore, IndiaDepartment of Computer Science & Engineering, School of Engineering & Technology, CHRIST (Deemed to be University), Bangalore, IndiaTo prevent unauthorized access to the databases and to ensure that the data of the databases is protected from intruders and insiders, the data is being encrypted at the storage locations. The same goal is achieved with Transparent Data Encryption, a feature that can be found in almost all database products. However, it has been observed that the non-datafiles are being ignored and there is no standard encryption for them like there is for datafiles. Moreover, there was no standard algorithm to encrypt them without relying on third-party tools. Therefore, • This study provides a robust algorithm to perform the encryption. This presentation also describes the importance of non-datafiles encryption, and how some non-datafiles can pose a threat to data and infrastructure without encryption. • The practical implementation of the non-data file encryption algorithm shows the authentic results. Further, unlike existing algorithms, the proposed algorithm gives the file owner full control over the encryption logic. • In the encryption process, two levels of encryption logics are combined with a passcode lock, while the same combination of two levels of reversing encryption and passcode is used in the decryption process to convert encoded data back into text format.http://www.sciencedirect.com/science/article/pii/S22150161220030162-Levels of Non-Datafiles Encryption (NDE)
spellingShingle Vaheedbasha Shaik
Dr. Natarajan K
Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit
MethodsX
2-Levels of Non-Datafiles Encryption (NDE)
title Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit
title_full Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit
title_fullStr Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit
title_full_unstemmed Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit
title_short Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit
title_sort flexible and cost effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit
topic 2-Levels of Non-Datafiles Encryption (NDE)
url http://www.sciencedirect.com/science/article/pii/S2215016122003016
work_keys_str_mv AT vaheedbashashaik flexibleandcosteffectivecryptographicencryptionalgorithmforsecuringunencrypteddatabasefilesatrestandintransit
AT drnatarajank flexibleandcosteffectivecryptographicencryptionalgorithmforsecuringunencrypteddatabasefilesatrestandintransit