Loading

A Database Encryption Technique to Enhance Security Using Hill Cipher Algorithm
Jasdeep Singh Bhalla
Jasdeep Singh Bhalla, Department of Computer Science, Bharati Vidyapeeth‘s College Of Engineering, G.G.S.I.P.U, New Delhi, India.
Manuscript received on March 02, 2013. | Revised Manuscript received on April 13, 2013. | Manuscript published on April 30, 2013. | PP: 660-664 | Volume-2, Issue-4, April 2013. | Retrieval Number: D1570042413/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Data security has become one of the major challenges of the digital world. Security, privacy and integrity of data are required in every operation that is performed on the Internet. Therefore, in this paper, our focus will be on Database Security, as databases are considered as the storehouses of data. Generally, data of an organization or a company is stored in databases and is very crucial to the organization. Today, most of the organizations allow their clients to use their services (online banking, online shopping etc) by accessing their databases. This leads to a requirement of high level security to deal with information attackers. An information attacker tries to illegally acquire or modify the highly confidential data of the organization. In this paper, a new technique is being proposed for securing the database data items using Hill Encryption Algorithm which is being implemented in fortifying and strengthening the database. Database Security has become one of the most important challenges in database research. A lot of research is going on in building of new techniques for protecting database records.
Keywords: Database Security, Database Encryption, Hill encryption, Database Protection.