Research Article
BibTex RIS Cite

Veritabanı Güvenliğini Sağlamak için Yeni Bir Veri Şifreleme Algoritması

Year 2023, Volume: 7 Issue: 1, 1 - 16, 02.01.2024
https://doi.org/10.26650/acin.1134979

Abstract

Günümüzde, özellikle internet üzerinde birçok bulut tabanlı uygulama geliştirilmekte ve insanların kullanımına sunulmaktadır. Bu uygulamaların çoğu veri tabanı sistemlerini kullanır ve özellikle çalışma hayatımızdaki iş veya kişisel bilgilerimizi içerebilir. Kritik bilgilerin bu veri depolarında tutulması yıkıcı elektronik saldırılar nedeniyle veri kaybı riskini artırır. Sonuç olarak, veri tabanlarını elektronik saldırılardan ve veri hırsızlığından korumak oldukça önemlidir ve veri güvenliği sistemlerinin kullanılmasını zorunlu hale getirir. Bu kapsamda çeşitli güvenlik algoritmalarına ihtiyaç vardır. Bu makalede, verilerin şifrelenmesi için yeni bir algoritma önerilmiştir. Üç anahtar ile çalışan algoritmada veriler ASCII Kodu kullanılarak şifrelenir. Çeşitli formüller sayesinde veri tabanına kaydettiğimiz metin ve rakam formundaki her veri şifrelenecektir. Geliştirilen algoritma, verilerin yüksek bir hızda şifrelenmesiyle kayıpsız aynı veriyi tekrar elde etmemizi sağlar. Yapılan testler algoritmanın yüksek veri boyutunda oldukça hızlı çalıştığını ortaya koymuştur.

References

  • Aamer N., Younus J., “A Performance Comparıson of Data Encryptıon Algorithms”, First International Conference on IEEEInformation and Communication Technologies (ICICT), Vol 1, Issue 6, 27-28 Aug. 2005, pp 84-89. google scholar
  • Agrawal M., Mıshra P., “A Comparative Survey on Symmetric Key Encryptıon Techniques” International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 05 May 2012, ISSN: 0975-3397. google scholar
  • Arya, E. S., & Kumar, A. (2017). Ascıı Based Encryptıon Decryption Technıque For Informatıon Security And Communıcatıon. In 3rd ınternatıonal conference on ınnovatıve trends ın science, Engineering and Management, YMCA connaught place, New Delhı, 7th January. google scholar
  • Basharat, I., Azam, F. and Muzaffar, A., Database Security and Encryptıon: A Survey Study, International Journal of Computer Applications, 47(12): 28-34 (2012). google scholar
  • Bertino, E., & Sandhu, R. (2005). Database security-concepts, approaches, and challenges. IEEE Transactions on Dependable and secure computing, 2(1), 2-19. google scholar
  • Dıaa E., Hatem K. and Mohıe H., “Performance Evaluatıon of Symmetnc Encryptıon Algorithms”, IJCSNS International Journal of Computer Science andNetwork Security, VOL.8 No.12, pp. 280-286, December 2008. google scholar
  • Elminaam, D. S. A., Kader, H. M. A., & Hadhoud, M. M. (2009). Energy efficlency of encryptıon schemes for wıreless devıces. International Journal of Computer Theory and Engineering, 1(3), 302. google scholar
  • Emad F. Khalaf and Mustafa M. Kadı., “A Survey of Access Control and Data Encryptıon for Database Security”, JKAU: Eng. Sci., Vol. 28 No. 1, pp: 19 - 30 (2017) Doİ: 10.4197/Eng. 28-1.2. google scholar
  • Eskicioğlu, Ö. C. & Isık, A. H. (2022). Mobil Uyumlu Çoklu Dil Destekli Hibrit Şifreleme Algoritması . Dokuz Eylül Üniversitesi Mühendislik Fakültesi Fen ve Mühendislik Dergisi , 24 (72) , 1007-1019 . DOI: 10.21205/deufmd.2022247228 google scholar
  • Hamdan.O. Alanazi, B.B. Zaidan, A.A. Zaidan, Hamid A. Jalab, M. Shabbir and Y. Al-Nabhani, “New Comparative Study Between DES, 3DES and AES within Nine Factors” Journal of Computing, Volume 2, ISSUE 3, March 2010, ISSN 2151-9617. google scholar
  • Kakkar A. and Bansal P. K., “Reliable Encryption Algorithm used for Communication”, M. E. Thesis, Thapar University, 2004. google scholar
  • Kaur, R., Kiranpreet and Verma, P., Survey on Database Security, International Journal of Computer Applications, 105(10): 27-31 (2014). google scholar
  • Kulkarni, S. and Urolagin, S., Review of Attacks on Databases and Database Security Techniques, International Journal of Emerging Technology and Advanced Engineering, 2(11): 253-263 (2012). google scholar
  • Luc B., Yanli GUO, “Database Encryption”, Article • January 2010 DOI: 10.1007/978-1-4419-5906-5_677. google scholar
  • Mathur A., “A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms”, google scholar
  • International Journal on Computer Science and Engineering (IJCSE), Vol. 4, pp. 1650-1657, Sep 2012 ISSN: 0975- 3397 google scholar
  • Mittal H., “Optimized Encryption Algorithm using Dynamic Keys”, Electronics and Communication Engineering Department, THAPAR UNIVERSITY PATIALA-147004, 2012 google scholar
  • Nadeem A., “A performance comparison of data encryption algorithms,” IEEE Information and Communication Technologies, pp. 84-89, 2006. google scholar
  • Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science, 78, 617-624. google scholar
  • Patil, A. and Meshram, B. B., Database Access Control Policies, International Journal ofEngineering Research and Applications, 2(3): 3150-3154 (2012). google scholar
  • Rohilla, S. and Mittal, P. K., Database Security: Threats and Challenges, International Journal of Advanced Research in Computer Science and Software Engineering, 3(5): 810-813 (2013). google scholar
  • Sesay, S., Yang, Z., Chen, J., & Xu, D. (2005, January). A secure database encryption scheme. In Second IEEE Consumer Communications andNetworking Conference, 2005. CCNC. 2005 (pp. 49-53). IEEE. google scholar
  • Seth, S. M., & Mishra, R. (2011). Comparative analysis of encryption algorithms for data communication. IJCST Vol. 2, Issue 2, June 2, 20H. google scholar
  • Shelly R., Pradeep Kumar M., Database Security: Threats and Challenges, International Journal ofAdvanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013. google scholar
  • Shinge, S. R., & Patil, R. (2014). An encryption algorithm based on ASCII value of data. International Journal of Computer Science and Information Technologies, 5(6), 7232-7234. google scholar
  • Silberschatz, A., Korth, H. F., & Sudarshan, S. (2002). Database system concepts (Vol. 5). New York: McGraw-Hill. google scholar
  • Singh, S. and Rai, R. K., A Review Report on Security Threats on Database, International Journal of Computer Science and Information Technologies, 5(3): 3215-3219 (2014). google scholar
  • Singh G., Supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security” International Journal of Computer Applications (0975 - 8887) Volume 67- No.19, April 2013. google scholar
  • Thuraisingham, B., Database Security: Past, Present, and Future, IEEE International Congress on Big Data, 772-774 (2015). google scholar

A Novel Data Encryption Algorithm To Ensure Database Security

Year 2023, Volume: 7 Issue: 1, 1 - 16, 02.01.2024
https://doi.org/10.26650/acin.1134979

Abstract

Many people apply technologies gradually, moving towards new progress and development. Moreover, many of us utilize database systems to assist our work management; the database contains our work or personal information, which increases the risk of losing our data due to disruptive electronic attacks. As a result, protecting databases from electronic attacks and data seizures is crucial. One method of identifying data is through several algorithms so that no benefit is taken from our data during electronic attacks. In this paper, we explain a formula we created for data encryption. The data is encrypted using ASCII Code. Also, we used three keys in the main formula. Because of that formula, each data we save in the database will be encrypted. The data can be Text or numbers. And through using another coordinator with the three previous keys, we can render the data to our original style. The formula focuses on data size and recording speed so that we get the same data size as when the data is encrypted at a reasonable speed.

References

  • Aamer N., Younus J., “A Performance Comparıson of Data Encryptıon Algorithms”, First International Conference on IEEEInformation and Communication Technologies (ICICT), Vol 1, Issue 6, 27-28 Aug. 2005, pp 84-89. google scholar
  • Agrawal M., Mıshra P., “A Comparative Survey on Symmetric Key Encryptıon Techniques” International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 05 May 2012, ISSN: 0975-3397. google scholar
  • Arya, E. S., & Kumar, A. (2017). Ascıı Based Encryptıon Decryption Technıque For Informatıon Security And Communıcatıon. In 3rd ınternatıonal conference on ınnovatıve trends ın science, Engineering and Management, YMCA connaught place, New Delhı, 7th January. google scholar
  • Basharat, I., Azam, F. and Muzaffar, A., Database Security and Encryptıon: A Survey Study, International Journal of Computer Applications, 47(12): 28-34 (2012). google scholar
  • Bertino, E., & Sandhu, R. (2005). Database security-concepts, approaches, and challenges. IEEE Transactions on Dependable and secure computing, 2(1), 2-19. google scholar
  • Dıaa E., Hatem K. and Mohıe H., “Performance Evaluatıon of Symmetnc Encryptıon Algorithms”, IJCSNS International Journal of Computer Science andNetwork Security, VOL.8 No.12, pp. 280-286, December 2008. google scholar
  • Elminaam, D. S. A., Kader, H. M. A., & Hadhoud, M. M. (2009). Energy efficlency of encryptıon schemes for wıreless devıces. International Journal of Computer Theory and Engineering, 1(3), 302. google scholar
  • Emad F. Khalaf and Mustafa M. Kadı., “A Survey of Access Control and Data Encryptıon for Database Security”, JKAU: Eng. Sci., Vol. 28 No. 1, pp: 19 - 30 (2017) Doİ: 10.4197/Eng. 28-1.2. google scholar
  • Eskicioğlu, Ö. C. & Isık, A. H. (2022). Mobil Uyumlu Çoklu Dil Destekli Hibrit Şifreleme Algoritması . Dokuz Eylül Üniversitesi Mühendislik Fakültesi Fen ve Mühendislik Dergisi , 24 (72) , 1007-1019 . DOI: 10.21205/deufmd.2022247228 google scholar
  • Hamdan.O. Alanazi, B.B. Zaidan, A.A. Zaidan, Hamid A. Jalab, M. Shabbir and Y. Al-Nabhani, “New Comparative Study Between DES, 3DES and AES within Nine Factors” Journal of Computing, Volume 2, ISSUE 3, March 2010, ISSN 2151-9617. google scholar
  • Kakkar A. and Bansal P. K., “Reliable Encryption Algorithm used for Communication”, M. E. Thesis, Thapar University, 2004. google scholar
  • Kaur, R., Kiranpreet and Verma, P., Survey on Database Security, International Journal of Computer Applications, 105(10): 27-31 (2014). google scholar
  • Kulkarni, S. and Urolagin, S., Review of Attacks on Databases and Database Security Techniques, International Journal of Emerging Technology and Advanced Engineering, 2(11): 253-263 (2012). google scholar
  • Luc B., Yanli GUO, “Database Encryption”, Article • January 2010 DOI: 10.1007/978-1-4419-5906-5_677. google scholar
  • Mathur A., “A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms”, google scholar
  • International Journal on Computer Science and Engineering (IJCSE), Vol. 4, pp. 1650-1657, Sep 2012 ISSN: 0975- 3397 google scholar
  • Mittal H., “Optimized Encryption Algorithm using Dynamic Keys”, Electronics and Communication Engineering Department, THAPAR UNIVERSITY PATIALA-147004, 2012 google scholar
  • Nadeem A., “A performance comparison of data encryption algorithms,” IEEE Information and Communication Technologies, pp. 84-89, 2006. google scholar
  • Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science, 78, 617-624. google scholar
  • Patil, A. and Meshram, B. B., Database Access Control Policies, International Journal ofEngineering Research and Applications, 2(3): 3150-3154 (2012). google scholar
  • Rohilla, S. and Mittal, P. K., Database Security: Threats and Challenges, International Journal of Advanced Research in Computer Science and Software Engineering, 3(5): 810-813 (2013). google scholar
  • Sesay, S., Yang, Z., Chen, J., & Xu, D. (2005, January). A secure database encryption scheme. In Second IEEE Consumer Communications andNetworking Conference, 2005. CCNC. 2005 (pp. 49-53). IEEE. google scholar
  • Seth, S. M., & Mishra, R. (2011). Comparative analysis of encryption algorithms for data communication. IJCST Vol. 2, Issue 2, June 2, 20H. google scholar
  • Shelly R., Pradeep Kumar M., Database Security: Threats and Challenges, International Journal ofAdvanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013. google scholar
  • Shinge, S. R., & Patil, R. (2014). An encryption algorithm based on ASCII value of data. International Journal of Computer Science and Information Technologies, 5(6), 7232-7234. google scholar
  • Silberschatz, A., Korth, H. F., & Sudarshan, S. (2002). Database system concepts (Vol. 5). New York: McGraw-Hill. google scholar
  • Singh, S. and Rai, R. K., A Review Report on Security Threats on Database, International Journal of Computer Science and Information Technologies, 5(3): 3215-3219 (2014). google scholar
  • Singh G., Supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security” International Journal of Computer Applications (0975 - 8887) Volume 67- No.19, April 2013. google scholar
  • Thuraisingham, B., Database Security: Past, Present, and Future, IEEE International Congress on Big Data, 772-774 (2015). google scholar
There are 29 citations in total.

Details

Primary Language English
Subjects Software Engineering (Other)
Journal Section Research Article
Authors

Sıvan Ibrahım 0000-0003-4707-0578

Ahmet Zengin 0000-0003-0384-4148

Selman Hızal 0000-0001-6345-0066

A.f.m Suaib Akhter 0000-0002-2675-1684

Cevat Altunkaya 0000-0001-5118-2711

Publication Date January 2, 2024
Submission Date June 24, 2022
Published in Issue Year 2023 Volume: 7 Issue: 1

Cite

APA Ibrahım, S., Zengin, A., Hızal, S., Akhter, A. S., et al. (2024). A Novel Data Encryption Algorithm To Ensure Database Security. Acta Infologica, 7(1), 1-16. https://doi.org/10.26650/acin.1134979
AMA Ibrahım S, Zengin A, Hızal S, Akhter AS, Altunkaya C. A Novel Data Encryption Algorithm To Ensure Database Security. ACIN. January 2024;7(1):1-16. doi:10.26650/acin.1134979
Chicago Ibrahım, Sıvan, Ahmet Zengin, Selman Hızal, A.f.m Suaib Akhter, and Cevat Altunkaya. “A Novel Data Encryption Algorithm To Ensure Database Security”. Acta Infologica 7, no. 1 (January 2024): 1-16. https://doi.org/10.26650/acin.1134979.
EndNote Ibrahım S, Zengin A, Hızal S, Akhter AS, Altunkaya C (January 1, 2024) A Novel Data Encryption Algorithm To Ensure Database Security. Acta Infologica 7 1 1–16.
IEEE S. Ibrahım, A. Zengin, S. Hızal, A. S. Akhter, and C. Altunkaya, “A Novel Data Encryption Algorithm To Ensure Database Security”, ACIN, vol. 7, no. 1, pp. 1–16, 2024, doi: 10.26650/acin.1134979.
ISNAD Ibrahım, Sıvan et al. “A Novel Data Encryption Algorithm To Ensure Database Security”. Acta Infologica 7/1 (January 2024), 1-16. https://doi.org/10.26650/acin.1134979.
JAMA Ibrahım S, Zengin A, Hızal S, Akhter AS, Altunkaya C. A Novel Data Encryption Algorithm To Ensure Database Security. ACIN. 2024;7:1–16.
MLA Ibrahım, Sıvan et al. “A Novel Data Encryption Algorithm To Ensure Database Security”. Acta Infologica, vol. 7, no. 1, 2024, pp. 1-16, doi:10.26650/acin.1134979.
Vancouver Ibrahım S, Zengin A, Hızal S, Akhter AS, Altunkaya C. A Novel Data Encryption Algorithm To Ensure Database Security. ACIN. 2024;7(1):1-16.