scispace - formally typeset
Open AccessJournal ArticleDOI

Performance Analysis of the Encryption Algorithms as Solution to Cloud Database Security

TLDR
Encryption techniques that provide strong security against attacks using Transparent Data Encryption (TDE) are presented that are effective, easy and provides high security levels to columns, tables and table space for data that require protection.
Abstract
As the amount of data and information received and sent electronically increases in various Small and Medium Enterprises, companies and organizations, the adoption of cloud Database as a Service is becoming popular in the global business community. The operational burden encountered by users of Traditional Database Systems (TDS), such as configuration, provisioning, performance tuning, scalability, privacy and security, backup and access control, are transferred by Database as a Service to the service provider/operator. This offers lower hardware and software costs, remote online access to databases and reliable applications. Despite all the benefits of Database as a Service, security and privacy issues of the cloud database can present significant challenges. With the increase of unauthorized access to confidential data in the cloud, this paper presents encryption techniques that provide strong security against attacks using Transparent Data Encryption (TDE). To protect the confidentiality of the cloud database, TDE is used to transparently encrypt and protect data at rest, on hard disk, in transit and on backup media. TDE is effective, easy and provides high security levels to columns, tables and table space for data that require protection. This paper studies the performance of encryption algorithms (AES128, AES192, AES256 and 3DES168) with regard to CPU time, execution time and elapsed time. AES128 is found to have a better performance than other encryption algorithms.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Performance of Encryption Techniques Using Dynamic Virtual Protocol Network Technology

TL;DR: The results of this study indicate that the AES encryption has better performance to provide optimum performance in the network.
Proceedings ArticleDOI

Measurements on encrypted and non-encrypted IoT datasets stored in relational and JSONB fields

TL;DR: In this paper authors study the encryption performance of an open source database containing relational as well as non-relational JSONB IoT data fields and summarize their experimental results.
References
More filters
Journal ArticleDOI

Cloud computing security issues and challenges

TL;DR: Security issues, requirements and challenges that cloud service providers (CSP) face during cloud engineering are discussed and recommended security standards and management models to address these are suggested for technical and business community.
Proceedings ArticleDOI

Security in wireless sensor networks: issues and challenges

TL;DR: The security threats are identified, proposed security mechanisms are reviewed and the holistic view of security for ensuring layered and robust security in wireless sensor networks is discussed.

Cloud Computing Security Issues and Challenges

TL;DR: A detailed analysis of the cloud computing security issues and challenges focusing on the cloud Computing types and the service delivery types is introduced.
Proceedings Article

Orthogonal Security With Cipherbase

TL;DR: The design of the Cipherbase secure hardware and its implementation using FPGAs is presented and how the hardware / software co-design was addressed in the cipherbase system is shown.
Related Papers (5)