We are currently experiencing intermittent issues impacting performance. We apologize for the inconvenience.
By Topic

A new image-database encryption based on a hybrid approach of data-at-rest and data-in-motion encryption protocol

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Sien, O.B. ; Sch. of Comput. Sci., Universiti Sains Malaysia, Penang, Malaysia ; Samsudin, A. ; Budiarto, R.

A database contains data ranging from different degree of confidentiality, and is widely accessed by variety of users. As the importance of database become more and more vital in business, database security turn up to be a nonnegligible issue in order to protect data from its vulnerability to potential attackers and cryptanalysts. Encryption adds an additional layer of security to make data unusable if, despite all efforts, someone does get unauthorized access to the raw data. Previous researchers had done a lot of efforts in database encryption, including encrypting "data-at-rest" and "data-in-motion". Although encryption is being shown as the strongest security alternative for data protection, there are still some drawbacks observed by implementing encryption of data-at-rest. Furthermore, implementing either one of the above-said strategies is not sufficient to keep data safe from exposure. And hence, combining the two approaches is necessary and emerges as a better choice. The main objective of designing this hybrid solution is to boost up the performance of a database engine when data encryption is requisite.

Published in:

Information and Communication Technologies: From Theory to Applications, 2004. Proceedings. 2004 International Conference on

Date of Conference:

19-23 April 2004