Performance Analysis of the Encryption Algorithms as Solution to Cloud Database Security
TLDR
Encryption techniques that provide strong security against attacks using Transparent Data Encryption (TDE) are presented that are effective, easy and provides high security levels to columns, tables and table space for data that require protection.Abstract:
As the amount of data and information received and sent electronically increases in various Small and Medium Enterprises, companies and organizations, the adoption of cloud Database as a Service is becoming popular in the global business community. The operational burden encountered by users of Traditional Database Systems (TDS), such as configuration, provisioning, performance tuning, scalability, privacy and security, backup and access control, are transferred by Database as a Service to the service provider/operator. This offers lower hardware and software costs, remote online access to databases and reliable applications. Despite all the benefits of Database as a Service, security and privacy issues of the cloud database can present significant challenges. With the increase of unauthorized access to confidential data in the cloud, this paper presents encryption techniques that provide strong security against attacks using Transparent Data Encryption (TDE). To protect the confidentiality of the cloud database, TDE is used to transparently encrypt and protect data at rest, on hard disk, in transit and on backup media. TDE is effective, easy and provides high security levels to columns, tables and table space for data that require protection. This paper studies the performance of encryption algorithms (AES128, AES192, AES256 and 3DES168) with regard to CPU time, execution time and elapsed time. AES128 is found to have a better performance than other encryption algorithms.read more
Citations
More filters
Proceedings ArticleDOI
Performance of Encryption Techniques Using Dynamic Virtual Protocol Network Technology
TL;DR: The results of this study indicate that the AES encryption has better performance to provide optimum performance in the network.
Proceedings ArticleDOI
Measurements on encrypted and non-encrypted IoT datasets stored in relational and JSONB fields
George Kokkonis,Christodoulos Asiminidis,Ioannis Georgiadis,Dimitrios Syndoukas,Sotirios Kontogiannis +4 more
TL;DR: In this paper authors study the encryption performance of an open source database containing relational as well as non-relational JSONB IoT data fields and summarize their experimental results.
References
More filters
Journal ArticleDOI
Cloud computing security issues and challenges
Kresimir Popovic,Zeljko Hocenski +1 more
TL;DR: Security issues, requirements and challenges that cloud service providers (CSP) face during cloud engineering are discussed and recommended security standards and management models to address these are suggested for technical and business community.
Proceedings ArticleDOI
Security in wireless sensor networks: issues and challenges
TL;DR: The security threats are identified, proposed security mechanisms are reviewed and the holistic view of security for ensuring layered and robust security in wireless sensor networks is discussed.
Cloud Computing Security Issues and Challenges
TL;DR: A detailed analysis of the cloud computing security issues and challenges focusing on the cloud Computing types and the service delivery types is introduced.
Proceedings Article
Orthogonal Security With Cipherbase
Arvind Arasu,Spyros Blanas,Ken Eguro,Raghav Kaushik,Donald Kossmann,Ravishankar Ramamurthy,Ramarathnam Venkatesan +6 more
TL;DR: The design of the Cipherbase secure hardware and its implementation using FPGAs is presented and how the hardware / software co-design was addressed in the cipherbase system is shown.
Related Papers (5)
A Review of Attribute based Encryption Technique for Security in Cloud Computing
Etti Mathur,Manish Sharma +1 more