International Core Journal of Engineering 2020-26 | Page 73
Transforms [16], Performance and Cost Evaluation of an
Adaptive Encryption Architecture for Cloud Database
Services [17], How to Compute with Data You Can’t See [18],
Efficient Format Preserving Encrypted Databases [19],
Facilitating Secure Query Processing on Encrypted Databases
on the Cloud [20], A 3DES ASIC Implementation with
Feedback Path in the CBC Mode [21].
and several slave clouds; the algorithms used support the
queries of the users; they are: Advanced Encryption Standard
(AES), Order-Preserving Encryption (OPE), Homomorphic
Encryption (HOM), Search and Deterministic Encryption;
they also use a proxy to perform: encryption, decryption,
creation, insertion, query analysis and retrieval of results; they
also reviewed the total delay in ms per SQL request; they
results showed that the scheme gives greater security with
acceptable delays [10], the authors propose the ERSA
algorithm which is an improvement of the RSA algorithm,
where they added two prime numbers for the generation of
keys; the size of the key changes to increase the complexity of
the decryption; they used an equation proposed by another
work to calculate the size of the block; the encryption and
decryption indexes such as: speed, time and average speed,
improve by dividing the files into blocks that will be
encrypted; these indices are superior to the RSA algorithm
[11], for protection of the database in the cloud, a watermark
algorithm of database authentication is proposed; here the
database is encrypted with an OPE scheme for content
protection; the algorithm does not lose data in the OPE
application; it can also detect manipulations with the
combination of cryptography algorithm, DCT and watermark
quantification [12], the author proposes a scheme called
cipher text policy attribute –based encryption CP-ABE for a
secure system of data exchange when saving them in the
cloud; for key management, it uses a two-part computing
protocol (2PC) between the KGC key generation center and
the data storage center; cryptography is applied for the
confidentiality and privacy of the data; the management of
membership and revocation of the user is entrusted to the data
storage center; the author concludes that the proposed scheme
is efficient and scalable [13], with the aim of securing digital
images through watermark; the authors propose an algorithm
which decomposes the original image into a geometric
structure and texture through a polynomial decomposition
model; applies Discrete Cosine Transform DCT to strengthen
the quality of the image, with a formula inserts the watermark
in the DCT coefficients, the result is the watermarked image;
they achieved better results in robustness and imperceptibility
of the inserted watermark, in relation to other existing
methods [14], for to protect the DDB against spies, the
authors propose a secure coding scheme and the Private
Information Retrieval PIR scheme; they propose a first
scenario with a database algorithm without coordination,
where each database does not know the indexes of the secret
actions stored in the other database; the second scenario in
presented with an algorithm for the database with
coordination, where each database knows the indexes of the
actions in other databases; with the test they conclude that the
PIR rates are within a constant multiplicative gap [15], the
authors propose an ECG steganography architecture based on
Curve let transform to hide medical information from patients;
to transmit it in frequency sub-bands according to a numbers
of scales, then they are extracted when the watermark process
is reversed; the architecture has three components; threshold
selection, watermark incrustation and watermark extraction;
they conclude that as the size of the data increases, the
performance is reduced, but its invisibility is maintained [16],
for to protect the public database in the cloud, the authors
propose a new architecture; they adopted encryption
techniques without using an intermediate server, with a level
of security and confidentiality for the data, where they can
perform SQL operations; they also have security schemes that
The deductive method and exploratory research is used to
analyze of the reference articles.
The result is a basic scheme based on a three-level
architecture, with 3DES encryption algorithm applied to the
request and response; SQL-based encryption for data
manipulation; FPE encryption algorithm for storage in the
database. The scheme is presented with its scope and possible
limitations; besides obtaining an abstract algorithm expressed
with flowchart techniques.
It is concluded that basic scheme and abstract algorithm
presented as an alternative to control access to resources, by
adopting an architecture and encryption algorithms, it gives
reasonable security to a database in a distributed environment.
II. M ATERIALS AND M ETHODS
In a first instance in Materials, some security works for
DDB were reviewed. In the second instance in Methods, a
basic scheme was proposed to manage the security.
A. Materials
For to improve the security measures and the performance
of the data warehouse; the authors propose a model based on
ETL Data Warehouse with six fragmented steps; they
designed and incorporated the DNA Translation
cryptographic algorithm, which is in the architecture of the
data warehouse with a drawer model of two levels of security,
interconnected with each other; the algorithm begins in the
transition from the Operational Data Store to the Data Vault
and then in the transition from Data Vault to Data Mart; they
affirm a reduction of the time of access, in addition they
consider the recovery of the necessary data of the Data Vault
[7], the authors present a data security algorithm for text
messages, based on a circular queue data structure for the
encryption and decryption process; variable factors are
applied such as: numbers of rotations, size of circular queue,
start of keyword, these variables make it difficult for the spy
to decipher; in the process of encryption and decryption the
Fibonacci sequence is used; with this algorithm it is planned
to encrypt other types of data such as images, voice and video
[8], for to have secure transactions in DDB, when dealing
with policy inconsistency with inconsistency access problems
and inconsistencies of user credentials; the authors propose an
orthogonal encryption algorithm to store messages on the
server; where policies are updated at specific intervals, when a
user requests a resource, the transaction manager sends the
transaction and prepares the responses; the hash value is given
by the HMAC Algorithm to verify the reliability of the request;
to protect the archive of records against hackers, log
protection techniques are applied; the algorithm helps the
server to preserve the published services intact [9], for to
avoid the invasion of cloud providers in the owner database,
the authors propose a combination of encryption algorithms
and a fragmentation technique; where public clouds are
master clouds that have an encrypted replica of the database
51