Research Article


DOI :10.26650/acin.1134979   IUP :10.26650/acin.1134979    Full Text (PDF)

A Novel Data Encryption Algorithm To Ensure Database Security

Sivan İbrahimAhmet ZenginSelman HızalA F M Suaib AkhterCevat Altunkaya

Many people apply technologies gradually, moving towards new progress and development. Moreover, many of us utilize database systems to assist our work management; the database contains our work or personal information, which increases the risk of losing our data due to disruptive electronic attacks. As a result, protecting databases from electronic attacks and data seizures is crucial. One method of identifying data is through several algorithms so that no benefit is taken from our data during electronic attacks. In this paper, we explain a formula we created for data encryption. The data is encrypted using ASCII Code. Also, we used three keys in the main formula. Because of that formula, each data we save in the database will be encrypted. The data can be Text or numbers. And through using another coordinator with the three previous keys, we can render the data to our original style. The formula focuses on data size and recording speed so that we get the same data size as when the data is encrypted at a reasonable speed.

DOI :10.26650/acin.1134979   IUP :10.26650/acin.1134979    Full Text (PDF)

Veritabanı Güvenliğini Sağlamak için Yeni Bir Veri Şifreleme Algoritması

Sivan İbrahimAhmet ZenginSelman HızalA F M Suaib AkhterCevat Altunkaya

Günümüzde, özellikle internet üzerinde birçok bulut tabanlı uygulama geliştirilmekte ve insanların kullanımına sunulmaktadır. Bu uygulamaların çoğu veri tabanı sistemlerini kullanır ve özellikle çalışma hayatımızdaki iş veya kişisel bilgilerimizi içerebilir. Kritik bilgilerin bu veri depolarında tutulması yıkıcı elektronik saldırılar nedeniyle veri kaybı riskini artırır. Sonuç olarak, veri tabanlarını elektronik saldırılardan ve veri hırsızlığından korumak oldukça önemlidir ve veri güvenliği sistemlerinin kullanılmasını zorunlu hale getirir. Bu kapsamda çeşitli güvenlik algoritmalarına ihtiyaç vardır. Bu makalede, verilerin şifrelenmesi için yeni bir algoritma önerilmiştir. Üç anahtar ile çalışan algoritmada veriler ASCII Kodu kullanılarak şifrelenir. Çeşitli formüller sayesinde veri tabanına kaydettiğimiz metin ve rakam formundaki her veri şifrelenecektir. Geliştirilen algoritma, verilerin yüksek bir hızda şifrelenmesiyle kayıpsız aynı veriyi tekrar elde etmemizi sağlar. Yapılan testler algoritmanın yüksek veri boyutunda oldukça hızlı çalıştığını ortaya koymuştur.


PDF View

References

  • Aamer N., Younus J., “A Performance Comparıson of Data Encryptıon Algorithms”, First International Conference on IEEEInformation and Communication Technologies (ICICT), Vol 1, Issue 6, 27-28 Aug. 2005, pp 84-89. google scholar
  • Agrawal M., Mıshra P., “A Comparative Survey on Symmetric Key Encryptıon Techniques” International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 05 May 2012, ISSN: 0975-3397. google scholar
  • Arya, E. S., & Kumar, A. (2017). Ascıı Based Encryptıon Decryption Technıque For Informatıon Security And Communıcatıon. In 3rd ınternatıonal conference on ınnovatıve trends ın science, Engineering and Management, YMCA connaught place, New Delhı, 7th January. google scholar
  • Basharat, I., Azam, F. and Muzaffar, A., Database Security and Encryptıon: A Survey Study, International Journal of Computer Applications, 47(12): 28-34 (2012). google scholar
  • Bertino, E., & Sandhu, R. (2005). Database security-concepts, approaches, and challenges. IEEE Transactions on Dependable and secure computing, 2(1), 2-19. google scholar
  • Dıaa E., Hatem K. and Mohıe H., “Performance Evaluatıon of Symmetnc Encryptıon Algorithms”, IJCSNS International Journal of Computer Science andNetwork Security, VOL.8 No.12, pp. 280-286, December 2008. google scholar
  • Elminaam, D. S. A., Kader, H. M. A., & Hadhoud, M. M. (2009). Energy efficlency of encryptıon schemes for wıreless devıces. International Journal of Computer Theory and Engineering, 1(3), 302. google scholar
  • Emad F. Khalaf and Mustafa M. Kadı., “A Survey of Access Control and Data Encryptıon for Database Security”, JKAU: Eng. Sci., Vol. 28 No. 1, pp: 19 - 30 (2017) Doİ: 10.4197/Eng. 28-1.2. google scholar
  • Eskicioğlu, Ö. C. & Isık, A. H. (2022). Mobil Uyumlu Çoklu Dil Destekli Hibrit Şifreleme Algoritması . Dokuz Eylül Üniversitesi Mühendislik Fakültesi Fen ve Mühendislik Dergisi , 24 (72) , 1007-1019 . DOI: 10.21205/deufmd.2022247228 google scholar
  • Hamdan.O. Alanazi, B.B. Zaidan, A.A. Zaidan, Hamid A. Jalab, M. Shabbir and Y. Al-Nabhani, “New Comparative Study Between DES, 3DES and AES within Nine Factors” Journal of Computing, Volume 2, ISSUE 3, March 2010, ISSN 2151-9617. google scholar
  • Kakkar A. and Bansal P. K., “Reliable Encryption Algorithm used for Communication”, M. E. Thesis, Thapar University, 2004. google scholar
  • Kaur, R., Kiranpreet and Verma, P., Survey on Database Security, International Journal of Computer Applications, 105(10): 27-31 (2014). google scholar
  • Kulkarni, S. and Urolagin, S., Review of Attacks on Databases and Database Security Techniques, International Journal of Emerging Technology and Advanced Engineering, 2(11): 253-263 (2012). google scholar
  • Luc B., Yanli GUO, “Database Encryption”, Article • January 2010 DOI: 10.1007/978-1-4419-5906-5_677. google scholar
  • Mathur A., “A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms”, google scholar
  • International Journal on Computer Science and Engineering (IJCSE), Vol. 4, pp. 1650-1657, Sep 2012 ISSN: 0975- 3397 google scholar
  • Mittal H., “Optimized Encryption Algorithm using Dynamic Keys”, Electronics and Communication Engineering Department, THAPAR UNIVERSITY PATIALA-147004, 2012 google scholar
  • Nadeem A., “A performance comparison of data encryption algorithms,” IEEE Information and Communication Technologies, pp. 84-89, 2006. google scholar
  • Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science, 78, 617-624. google scholar
  • Patil, A. and Meshram, B. B., Database Access Control Policies, International Journal ofEngineering Research and Applications, 2(3): 3150-3154 (2012). google scholar
  • Rohilla, S. and Mittal, P. K., Database Security: Threats and Challenges, International Journal of Advanced Research in Computer Science and Software Engineering, 3(5): 810-813 (2013). google scholar
  • Sesay, S., Yang, Z., Chen, J., & Xu, D. (2005, January). A secure database encryption scheme. In Second IEEE Consumer Communications andNetworking Conference, 2005. CCNC. 2005 (pp. 49-53). IEEE. google scholar
  • Seth, S. M., & Mishra, R. (2011). Comparative analysis of encryption algorithms for data communication. IJCST Vol. 2, Issue 2, June 2, 20H. google scholar
  • Shelly R., Pradeep Kumar M., Database Security: Threats and Challenges, International Journal ofAdvanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013. google scholar
  • Shinge, S. R., & Patil, R. (2014). An encryption algorithm based on ASCII value of data. International Journal of Computer Science and Information Technologies, 5(6), 7232-7234. google scholar
  • Silberschatz, A., Korth, H. F., & Sudarshan, S. (2002). Database system concepts (Vol. 5). New York: McGraw-Hill. google scholar
  • Singh, S. and Rai, R. K., A Review Report on Security Threats on Database, International Journal of Computer Science and Information Technologies, 5(3): 3215-3219 (2014). google scholar
  • Singh G., Supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security” International Journal of Computer Applications (0975 - 8887) Volume 67- No.19, April 2013. google scholar
  • Thuraisingham, B., Database Security: Past, Present, and Future, IEEE International Congress on Big Data, 772-774 (2015). google scholar

Citations

Copy and paste a formatted citation or use one of the options to export in your chosen format


EXPORT



APA

İbrahim, S., Zengin, A., Hızal, S., Akhter, A.S., & Altunkaya, C. (2023). A Novel Data Encryption Algorithm To Ensure Database Security. Acta Infologica, 7(1), 1-16. https://doi.org/10.26650/acin.1134979


AMA

İbrahim S, Zengin A, Hızal S, Akhter A S, Altunkaya C. A Novel Data Encryption Algorithm To Ensure Database Security. Acta Infologica. 2023;7(1):1-16. https://doi.org/10.26650/acin.1134979


ABNT

İbrahim, S.; Zengin, A.; Hızal, S.; Akhter, A.S.; Altunkaya, C. A Novel Data Encryption Algorithm To Ensure Database Security. Acta Infologica, [Publisher Location], v. 7, n. 1, p. 1-16, 2023.


Chicago: Author-Date Style

İbrahim, Sivan, and Ahmet Zengin and Selman Hızal and A F M Suaib Akhter and Cevat Altunkaya. 2023. “A Novel Data Encryption Algorithm To Ensure Database Security.” Acta Infologica 7, no. 1: 1-16. https://doi.org/10.26650/acin.1134979


Chicago: Humanities Style

İbrahim, Sivan, and Ahmet Zengin and Selman Hızal and A F M Suaib Akhter and Cevat Altunkaya. A Novel Data Encryption Algorithm To Ensure Database Security.” Acta Infologica 7, no. 1 (Mar. 2024): 1-16. https://doi.org/10.26650/acin.1134979


Harvard: Australian Style

İbrahim, S & Zengin, A & Hızal, S & Akhter, AS & Altunkaya, C 2023, 'A Novel Data Encryption Algorithm To Ensure Database Security', Acta Infologica, vol. 7, no. 1, pp. 1-16, viewed 3 Mar. 2024, https://doi.org/10.26650/acin.1134979


Harvard: Author-Date Style

İbrahim, S. and Zengin, A. and Hızal, S. and Akhter, A.S. and Altunkaya, C. (2023) ‘A Novel Data Encryption Algorithm To Ensure Database Security’, Acta Infologica, 7(1), pp. 1-16. https://doi.org/10.26650/acin.1134979 (3 Mar. 2024).


MLA

İbrahim, Sivan, and Ahmet Zengin and Selman Hızal and A F M Suaib Akhter and Cevat Altunkaya. A Novel Data Encryption Algorithm To Ensure Database Security.” Acta Infologica, vol. 7, no. 1, 2023, pp. 1-16. [Database Container], https://doi.org/10.26650/acin.1134979


Vancouver

İbrahim S, Zengin A, Hızal S, Akhter AS, Altunkaya C. A Novel Data Encryption Algorithm To Ensure Database Security. Acta Infologica [Internet]. 3 Mar. 2024 [cited 3 Mar. 2024];7(1):1-16. Available from: https://doi.org/10.26650/acin.1134979 doi: 10.26650/acin.1134979


ISNAD

İbrahim, Sivan - Zengin, Ahmet - Hızal, Selman - Akhter, A F MSuaib - Altunkaya, Cevat. A Novel Data Encryption Algorithm To Ensure Database Security”. Acta Infologica 7/1 (Mar. 2024): 1-16. https://doi.org/10.26650/acin.1134979



TIMELINE


Submitted24.06.2022
Accepted11.02.2023
Published Online09.05.2023

LICENCE


Attribution-NonCommercial (CC BY-NC)

This license lets others remix, tweak, and build upon your work non-commercially, and although their new works must also acknowledge you and be non-commercial, they don’t have to license their derivative works on the same terms.


SHARE




Istanbul University Press aims to contribute to the dissemination of ever growing scientific knowledge through publication of high quality scientific journals and books in accordance with the international publishing standards and ethics. Istanbul University Press follows an open access, non-commercial, scholarly publishing.