The Analysis of Database Security Requirements for Cryptographic Algorithm

Article Preview

Abstract:

The cloud environment is recently emphasized when we save a large amount of data with a minimum of maintenance. But the cloud is a variable environment that data is likely to be changed when which is transferred, and even doesn't permanently store. Besides it has the risk of phishing from a third party. A scalable storage space as one of the features of the cloud has to consist as more proactive access control, secure encryption, and key management in the aspect of the size of the database and the number of users. In this paper, we analyze about database security requirements of these environment and the provided encryption technologies of until now. And, even anyone who don't have the expertise for security assessment and management or CC could be easily accessible it.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

235-239

Citation:

Online since:

January 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] H.G. Lee, S.M. Lee, T.Y. Nam, Database Encryption Technology and Current Product Trend, Electronics and Telecommunications Trends, Vol. 22, no. 1, (2007).

Google Scholar

[2] Vic J.R. Winkler, Securing the Cloud: Cloud Computer Security Techniques and Tactics, Syngress, pp.130-135, (2011).

Google Scholar

[3] E.B. Jo, DATABASE SECURITY Design and Implementation, Life & Power Press, pp.27-35, (2011).

Google Scholar

[4] M.Y. Lee, Modern cryptography and applications, KIISC Press, Vol. 3, pp.24-27, 87.

Google Scholar

[5] http: /ko. wikipedia. org/wiki.

Google Scholar