scispace - formally typeset
Search or ask a question

Showing papers on "Database encryption published in 2021"


Journal ArticleDOI
15 Feb 2021
TL;DR: This paper designs the student database encryption application based on the name of the SMK Pembangunan using Visual Basic programming language and displays the IDEA Cryptographic key, the encryption and decryption change process is clearly visible.
Abstract: One of the algorithms in cryptography that can be used for school database security is the IDEA (International Data Encryption Algorithm) algorithm. The IDEA algorithm is one of the cryptographic algorithms that has various applications in secure data transmission in the scope of networks and distributed measurement systems. Encryption results appear in the form of a notepad. The Open data button is used to find data that will be used for the encryption process. The key checklist is used to input the key length that will be used for the encryption decryption security process. The system displays the IDEA Cryptographic key, can use the IDEA Cryptographic key, the encryption and decryption change process is clearly visible. Encryption is done on the SMK Pembangunan school database with IDEA algorithm and designing the student database encryption application based on the name of the SMK Pembangunan using Visual Basic programming language.

4 citations


Journal ArticleDOI
01 Apr 2021
TL;DR: Wang et al. as discussed by the authors proposed a queryable database encryption storage scheme and a searchable multi-keyword encryption scheme under distributed environment, where the non-relational database is used in distributed storage in the form of key value to improve the query performance.
Abstract: In the information age, the explosive growth of data forces users to deliver the data to the database service provider to manage. This paper mainly studies the database construction of computer audit under the environment of big data. This paper proposes a queryable database encryption storage scheme and a searchable multi-keyword encryption scheme under distributed environment. In this paper, the non-relational database is used in distributed storage in the form of key-value to improve the query performance. For distributed database, this paper proposes a queryable database encryption scheme. In this scheme, there are two encryption query modes: exact matching mode and range matching mode. Users encrypt and store data to the corresponding server nodes in these two ways, which can support rich queries. In the process of query, the user generates the corresponding query password for each server node, and then the parallel query can be realized. While protecting data privacy, the performance of the scheme is also well guaranteed.

2 citations


Book ChapterDOI
23 Apr 2021
TL;DR: Wang et al. as mentioned in this paper proposed a searchable database encryption storage scheme and a multi keyword searchable encryption scheme in distributed environment, which uses the non-relational database in the form of key value to improve the query performance.
Abstract: With the rapid development of China's higher education and the continuous expansion of university teaching scale, all major universities have designed and used office automation system in line with their own characteristics. However, due to technical or economic constraints in the development process, the system pays too much attention to the convenience of use and ignores the security, resulting in many security risks. Based on the above, this paper proposes a searchable database encryption storage scheme and a multi keyword searchable encryption scheme in distributed environment. Among them, this paper uses the non-relational database in the form of key value to improve the query performance. The test results show that the method studied in this paper can meet the security requirements. When the number of server nodes reaches 8, the throughput reaches 265 kb, which can meet the query speed and performance requirements.

1 citations


DOI
15 Oct 2021
TL;DR: In this article, a power grid database encryption system was designed, and the access control module and the encryption module that should be written based on SQL statements were explained, which was developed using the Java language and deployed in the cloud environment.
Abstract: The power grid has high requirements for data security, and data security audit technology is facing challenges. Because the server in the power grid operating environment is considered untrustworthy and does not have the authority to obtain the secret key, the encrypted data cannot be parsed and the data processing ability of the data center is restricted. In response to the above problems, the power grid database encryption system was designed, and the access control module and the encryption module that should be written based on SQL statements were explained. The database encryption system was developed using the Java language and deployed in the cloud environment. Finally, the method was proved by experiments. feasibility.