Cargando…

Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit

To prevent unauthorized access to the databases and to ensure that the data of the databases is protected from intruders and insiders, the data is being encrypted at the storage locations. The same goal is achieved with Transparent Data Encryption, a feature that can be found in almost all database...

Descripción completa

Detalles Bibliográficos
Autores principales: Shaik, Vaheedbasha, K, Dr. Natarajan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Elsevier 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9692032/
https://www.ncbi.nlm.nih.gov/pubmed/36438858
http://dx.doi.org/10.1016/j.mex.2022.101924
_version_ 1784837169291984896
author Shaik, Vaheedbasha
K, Dr. Natarajan
author_facet Shaik, Vaheedbasha
K, Dr. Natarajan
author_sort Shaik, Vaheedbasha
collection PubMed
description To prevent unauthorized access to the databases and to ensure that the data of the databases is protected from intruders and insiders, the data is being encrypted at the storage locations. The same goal is achieved with Transparent Data Encryption, a feature that can be found in almost all database products. However, it has been observed that the non-datafiles are being ignored and there is no standard encryption for them like there is for datafiles. Moreover, there was no standard algorithm to encrypt them without relying on third-party tools. Therefore, • This study provides a robust algorithm to perform the encryption. This presentation also describes the importance of non-datafiles encryption, and how some non-datafiles can pose a threat to data and infrastructure without encryption. • The practical implementation of the non-data file encryption algorithm shows the authentic results. Further, unlike existing algorithms, the proposed algorithm gives the file owner full control over the encryption logic. • In the encryption process, two levels of encryption logics are combined with a passcode lock, while the same combination of two levels of reversing encryption and passcode is used in the decryption process to convert encoded data back into text format.
format Online
Article
Text
id pubmed-9692032
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Elsevier
record_format MEDLINE/PubMed
spelling pubmed-96920322022-11-26 Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit Shaik, Vaheedbasha K, Dr. Natarajan MethodsX Method Article To prevent unauthorized access to the databases and to ensure that the data of the databases is protected from intruders and insiders, the data is being encrypted at the storage locations. The same goal is achieved with Transparent Data Encryption, a feature that can be found in almost all database products. However, it has been observed that the non-datafiles are being ignored and there is no standard encryption for them like there is for datafiles. Moreover, there was no standard algorithm to encrypt them without relying on third-party tools. Therefore, • This study provides a robust algorithm to perform the encryption. This presentation also describes the importance of non-datafiles encryption, and how some non-datafiles can pose a threat to data and infrastructure without encryption. • The practical implementation of the non-data file encryption algorithm shows the authentic results. Further, unlike existing algorithms, the proposed algorithm gives the file owner full control over the encryption logic. • In the encryption process, two levels of encryption logics are combined with a passcode lock, while the same combination of two levels of reversing encryption and passcode is used in the decryption process to convert encoded data back into text format. Elsevier 2022-11-11 /pmc/articles/PMC9692032/ /pubmed/36438858 http://dx.doi.org/10.1016/j.mex.2022.101924 Text en © 2022 The Author(s) https://creativecommons.org/licenses/by/4.0/This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Method Article
Shaik, Vaheedbasha
K, Dr. Natarajan
Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit
title Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit
title_full Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit
title_fullStr Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit
title_full_unstemmed Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit
title_short Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit
title_sort flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit
topic Method Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9692032/
https://www.ncbi.nlm.nih.gov/pubmed/36438858
http://dx.doi.org/10.1016/j.mex.2022.101924
work_keys_str_mv AT shaikvaheedbasha flexibleandcosteffectivecryptographicencryptionalgorithmforsecuringunencrypteddatabasefilesatrestandintransit
AT kdrnatarajan flexibleandcosteffectivecryptographicencryptionalgorithmforsecuringunencrypteddatabasefilesatrestandintransit