International Core Journal of Engineering 2020-26 | Page 76
reasonable security. For the implementation of the scheme
and algorithm, efficiency should be taken into account when
the volume of data increase.
[9]
[10]
A CKNOWLEDGMENT
The authors thanks to Universidad Politécnica Salesiana
del Ecuador, to the research group of the Guayaquil
Headquarters “Computing, Security and Information
Technology for a Globalized World” (CSITGW) created
according to resolution 142-06-2017-07-19 and Secretaría de
Educación Superior Ciencia, Tecnología e Innovación
(Senescyt).
[11]
[12]
[13]
R EFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[14]
R. Mandvikar, “Concurrency Control in Distributed Databases”, pp.
1–22, 2017.
Q. Sun, L. Fu, B. Deng, “An Efficient Transaction Processing Method
on the Distributed Database”, pp. 1916–1920, 2016.
X. Yuan, “Secure Multi-Client Data Access with Boolean Queries in
Distributed Key-Value Stores”, 2017.
C. Muscǎ, A. Ion, C. Leordeanu, V. Cristea, “Secure access to cloud
resources”, Proc. - 2013 8th Int. Conf. P2P, Parallel, Grid, Cloud
Internet Comput, 3PGCIC 2013, pp. 554-558, 2013.
K. Munir, “Security model for cloud database as a service (DBaaS)”,
Proc. 2015 Int. Conf. Cloud Comput. Technol. Appl. CloudTech 2015,
2015.
L. Ferretti, M. Colajanni, M. Marchetti, “Distributed, concurrent, and
independent access to encrypted cloud databases”, IEEE Trans.
Parallel Distrib. Syst., vol. 25, no. 2, pp. 437–446, 2014.
R. Chowdhury, S. Datta, S. K. Dey, S. Shaw, “Design and
implementation of Proposed Drawer Model Based Data Warehouse
Architecture incorporating DNA Translation cryptographic algorithm
for security enhancement,” Proc. 2014 Int. Conf. Contemp. Comput.
Informatics, IC3I 2014, pp. 55–60, 2014.
A. N. Albu-rghaif, A. J. Abboud, “A Data Structure Encryption
Algorithm based on Circular Queue to Enhance Data Security”, pp.
[15]
[16]
[17]
[18]
[19]
[20]
[21]
54
24–29, 2018.
S. J. Samuel, S. J. Jenitha, “Enhanced security and authentication
mechanism in cloud transactions using HMAC,” 2014 IEEE Int. Conf.
Comput. Intell. Comput. Res. IEEE ICCIC 2014, pp. 0–3, 2015.
A. Alsirhani, P. Bodorik, S. Sampalli, “Improving Database Security in
Cloud Computing by Fragmentation of Data,” 2017 Int. Conf. Comput.
Appl. ICCA 2017, no. c, pp. 43–49, 2017.
I. G. Amalarethinam, H. M. Leena, “Enhanced RSA Algorithm with
Varying Key Sizes for Data Security in Cloud”, Proc. - 2nd World
Congr. Comput. Commun. Technol. WCCCT 2017, pp. 172–175,
2017.
S. Xiang, J. He, “Database authentication watermarking scheme in
encrypted domain”, IET Inf. Secur, vol. 12, no. 1, pp. 42–51, 2018.
J. Hur, “Improving security and efficiency in attribute-based data
sharing”, IEEE Trans. Knowl. Data Eng., vol. 25, no. 10, pp.
2271–2282, 2013.
K. Luo, X. Tian, “A New Robust Watermarking Scheme Based on
Wavelet Transform”, 2008 Congr. Image Signal Process., pp. 312–316,
2008.
H. Yang, S. Member, W. Shin, “Private Information Retrieval for
Secure Distributed Storage Systems”, vol. 13, no. 12, pp. 2953–2964,
2018.
Candès, E., L. Demanet, D. Donoho, L. Ying, “Fast Discrete Curvelet
Transforms”, Multiscale Model. Simul., vol. 5, no. 3, pp. 861–899,
2006.
L. Ferretti, F. Pierazzi, M. Colajanni, M. Marchetti, “Performance and
cost evaluation of an adaptive encryption architecture for cloud
database services”, Ieeexplore.Ieee.Org, vol. 7161, no. c, pp. 1–1,
2014.
R. A. Popa, N. Zeldovich, “How to compute with data you can’t see”,
IEEE Spectr., vol. 52, no. 8, pp. 42–47, 2015.
P. Chandrashekar, S. Dara, V. N. Muralidhara, “Efficient Format
Preserving encrypted databases”, 2015 IEEE Int. Conf. Electron.
Comput. Commun. Technol. CONECCT 2015, pp. 4–7, 2016.
O. Omran, B. Panda, “Facilitating Secure Query Processing on
Encrypted Databases on the Cloud”, Proc. - 2016 IEEE Int. Conf.
Smart Cloud, SmartCloud 2016, pp. 307–312, 2016.
T. Fu, S. Li, “A 3DES ASIC Implementation with Feedback Path in the
CBC Mode”.