International Core Journal of Engineering 2020-26 | Page 74

x The algorithm applies only to relational databases. guarantee access to encrypted data; the proposal offers levels of scalability and availability of services [17], for to share the data located in a database, the authors propose Mylar, which distributes an encryption key to the users; for to prevent a pirate from tricking users, Mylar includes a browser extension that verifies the code downloaded from the server; they also included an identity provider service, who is a web certification authority; they used the proposal to ensure a variety of web applications, in the experiments increases the calculation time by 17 percent on average; is implemented at Newton Wellesley Hospital in Newton, Massachusetts, to help protect patients privacy [18], for to improve CryptDB, which is a database encryption model, the authors worked with the same Application Server, Proxy Server and DBMS Server architecture; they replaced the AES and BlowFish algorithms with the use of Format Preserving Encryption FPE, which preserves the length and format of plain text when encrypted; the project was called FP-CryptDB; over the encrypted data they used Random and Deterministic; the results of the tests in storage, obtained a 50 percent efficiency, the performance takes less time of execution [19], for to protect the database in the cloud, the authors propose to add indexing information to the table of the database and store them with the encrypted tables; where the DBMS use the indexing data; a data partition method defines the attributes that are used in all queries and also employs four techniques for data partitioning; frequency, space, three bisection, histogram [20], the authors propose a method of logical simplification to raise the performance of the 3DES algorithm, they updated the algorithm’s critical path through XOR to take them to a non-critical path; they reached up to 3.33Gbps in performance [21]. x Encryption is for plain text and at the level of columns in the tables for the database. x The result will be an encrypted database in a distributed environment and supports SQL operations: delete, insert, select, update. x To adopt a 3-level architecture. x To adopt encryption and decryption algorithms to apply to: request, response, SQL operations and database. In the basic scheme, architecture and algorithms were adopted as explained below: x The 3-level architecture of [19] was adopted, and they are: Application Server, Proxy Server and DBMS Server. x The 3DES encryption algorithm of [21] was adopted, to encrypt the request to the database and decrypt the response of the database, within the Proxy Server level. x The SQL-based encryption algorithm of [17] was adopted, to guarantee confidentiality and SQL operations on the data encrypted in the database, are the following: Random (Rand), Deterministic (Det), Order Preserving Encryption (OPE), Homomorphic Sum (Sum), Search and Plain; within the DBMS Server level. x The FPE algorithm of [19] was adopted, for the encryption of the database within the DBMS Server level. B. Methods A basic scheme was proposed to manage the security of DDB, with the following scope: The Fig. 1 describes the request, processing and response of data: x Define an abstract algorithm. Fig. 1. Proposal of basic security scheme for a DDB. request to the proxy server. III. R ESULTS It resulted an algorithm through flowchart techniques in Fig. 2. The general steps of the algorithm are described below: 2) The proxy server encrypts the received request. 3) The proxy server sends the encrypted request to the DBMS server. 1) The user through an application server, sends his 52