Database Encryption Using TSFS Algorithm
Keywords:
Security, Transposition, Substitution, Folding, Shifting.Abstract
Security of databases has become increasingly crucial in all application areas. Database encryption is an important mechanism to secure databases from attacks and unauthorized access. The Transposition-Substitution-Folding-Shifting encryption algorithm (TSFS) is a symmetric database encryption algorithm that uses three keys with an expansion technique to provide high security: it improves the efficiency of query execution time by encrypting the sensitive data only. However, it applies merely for the alphanumeric characters. This paper extends the data set of the TSFS encryption algorithm to special characters as well, and corrects substitution and shifting processes by providing more than one modulo factor and four 16-arrays respectively in order to avoid the error that occurs in decryption steps. Experiment results show that enhanced TSFS encryption algorithm outperforms Data Encryption Standard algorithm (DES) and Advanced Encryption Standard algorithm (AES) in terms of query execution time and database added size.
References
- Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikanth, Yirong Xu,2002, Hippocratic databases, Proceedings of the 28th international conference on Very Large Data Bases.
- L Liu, J. Gai,2008, A new lightweight database encryption scheme transparent to applications, Proceedings of the 6th IEEE International Conference on Industrial Informatics.
- K Kaur, K. Dhindsa, G. Singh, 2009, Numeric to numeric encryption: using 3KDEC algorithm, Proceedings of IEEE International Conference on Advance Computing. [4] D.
- Manivannan, R. Sujarani, 2010, Light weight and secure database encryption using TSFS algorithm, Proceedings of the International Conference on Computing Communication and Networking Technologies.
- Hanan A. Al-Souly, Abeer S. Al-Sheddi, Heba A. Kurdi., 2013 Lightweight Symmetric Encryption Algorithm for Secure Database, (IJACSA) International Journal of Advanced Computer Science and Applications. [6] S. Bhatnagar, Securing Data-At-Rest, Literature by Tata Consultancy Services.
- Gang Chen, “A Database Encryption Scheme for Enhanced Security and Easy Sharing Computer Supported Cooperative Work in Design”, 2006. CSCWD „06. 10th International Conference on Publication Year: 2006.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.