International Core Journal of Engineering 2020-26 | Page 76

reasonable security. For the implementation of the scheme and algorithm, efficiency should be taken into account when the volume of data increase. [9] [10] A CKNOWLEDGMENT The authors thanks to Universidad Politécnica Salesiana del Ecuador, to the research group of the Guayaquil Headquarters “Computing, Security and Information Technology for a Globalized World” (CSITGW) created according to resolution 142-06-2017-07-19 and Secretaría de Educación Superior Ciencia, Tecnología e Innovación (Senescyt). [11] [12] [13] R EFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [14] R. Mandvikar, “Concurrency Control in Distributed Databases”, pp. 1–22, 2017. Q. Sun, L. Fu, B. Deng, “An Efficient Transaction Processing Method on the Distributed Database”, pp. 1916–1920, 2016. X. Yuan, “Secure Multi-Client Data Access with Boolean Queries in Distributed Key-Value Stores”, 2017. C. Muscǎ, A. Ion, C. Leordeanu, V. Cristea, “Secure access to cloud resources”, Proc. - 2013 8th Int. Conf. P2P, Parallel, Grid, Cloud Internet Comput, 3PGCIC 2013, pp. 554-558, 2013. K. Munir, “Security model for cloud database as a service (DBaaS)”, Proc. 2015 Int. Conf. Cloud Comput. Technol. Appl. CloudTech 2015, 2015. L. Ferretti, M. Colajanni, M. Marchetti, “Distributed, concurrent, and independent access to encrypted cloud databases”, IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 437–446, 2014. R. Chowdhury, S. Datta, S. K. Dey, S. Shaw, “Design and implementation of Proposed Drawer Model Based Data Warehouse Architecture incorporating DNA Translation cryptographic algorithm for security enhancement,” Proc. 2014 Int. Conf. Contemp. Comput. Informatics, IC3I 2014, pp. 55–60, 2014. A. N. Albu-rghaif, A. J. Abboud, “A Data Structure Encryption Algorithm based on Circular Queue to Enhance Data Security”, pp. [15] [16] [17] [18] [19] [20] [21] 54 24–29, 2018. S. J. Samuel, S. J. Jenitha, “Enhanced security and authentication mechanism in cloud transactions using HMAC,” 2014 IEEE Int. Conf. Comput. Intell. Comput. Res. IEEE ICCIC 2014, pp. 0–3, 2015. A. Alsirhani, P. Bodorik, S. Sampalli, “Improving Database Security in Cloud Computing by Fragmentation of Data,” 2017 Int. Conf. Comput. Appl. ICCA 2017, no. c, pp. 43–49, 2017. I. G. Amalarethinam, H. M. Leena, “Enhanced RSA Algorithm with Varying Key Sizes for Data Security in Cloud”, Proc. - 2nd World Congr. Comput. Commun. Technol. WCCCT 2017, pp. 172–175, 2017. S. Xiang, J. He, “Database authentication watermarking scheme in encrypted domain”, IET Inf. Secur, vol. 12, no. 1, pp. 42–51, 2018. J. Hur, “Improving security and efficiency in attribute-based data sharing”, IEEE Trans. Knowl. Data Eng., vol. 25, no. 10, pp. 2271–2282, 2013. K. Luo, X. Tian, “A New Robust Watermarking Scheme Based on Wavelet Transform”, 2008 Congr. Image Signal Process., pp. 312–316, 2008. H. Yang, S. Member, W. Shin, “Private Information Retrieval for Secure Distributed Storage Systems”, vol. 13, no. 12, pp. 2953–2964, 2018. Candès, E., L. Demanet, D. Donoho, L. Ying, “Fast Discrete Curvelet Transforms”, Multiscale Model. Simul., vol. 5, no. 3, pp. 861–899, 2006. L. Ferretti, F. Pierazzi, M. Colajanni, M. Marchetti, “Performance and cost evaluation of an adaptive encryption architecture for cloud database services”, Ieeexplore.Ieee.Org, vol. 7161, no. c, pp. 1–1, 2014. R. A. Popa, N. Zeldovich, “How to compute with data you can’t see”, IEEE Spectr., vol. 52, no. 8, pp. 42–47, 2015. P. Chandrashekar, S. Dara, V. N. Muralidhara, “Efficient Format Preserving encrypted databases”, 2015 IEEE Int. Conf. Electron. Comput. Commun. Technol. CONECCT 2015, pp. 4–7, 2016. O. Omran, B. Panda, “Facilitating Secure Query Processing on Encrypted Databases on the Cloud”, Proc. - 2016 IEEE Int. Conf. Smart Cloud, SmartCloud 2016, pp. 307–312, 2016. T. Fu, S. Li, “A 3DES ASIC Implementation with Feedback Path in the CBC Mode”.