
Evaluating the Performance of Reverse Encryption Algorithm (REA) on the Databases
Database encryption is a well established technolog y for protecting sensitive data. Unfortunately, the integration of existing encryption techniques with database system s causes undesirable performance degradation. It is a crucial technique in the security mechanisms of database. In this paper we propose a new encryption algorithm, which we cal l Reverse Encryption Algorithm (REA). Our new encryption algorithm REA i s simple and yet leads to a cipher. It has achieved security requirements and is fast enough for most applications. REA algor ithm is limiting the added time cost for encryption and decryption to don't degrade the performance of a database system. Also, we evaluate the performance of the proposed encryp tion algorithm REA and compare with the most common encryption algorit hms. The performance measure of encryption schemes will be conducted in terms of encryption / decryption time. Experimen t results show that our new algorithm outperforms o ther algorithms at encryption and decryption time.
[1] Bouganim L. and Pucheral P., “Chip-Secured Data Access: Confidential Data on Untrusted Servers,” in Proceedings of the 28 th International Conference on Very Large Data Bases , China, pp. 131-142, 2002. Elapsed Time Elapsed Time Evaluating the Performance of Reverse Encryption Algorithm (REA) on the Databases 569
[2] Castano S., Fugini M., Martella G., and Samarati P., Database Security , Addison-Wesley, USA, 1995.
[3] Chen G., Chen K., and Dong J., “A Database Encryption Scheme for Enhanced Security and Easy Sharing,” in Proceedings of the 10 th International Conference on Computer Supported Cooperative Work in Design , Nanjing pp. 1-6, 2006.
[4] Coppersmith D., “The Data Encryption Standard and Its Strength Against Attacks,” IBM Journal of Research and Development , vol. 38, no. 3, pp. 243-250, 1994.
[5] Daemen J. and Rijmen V., “Rijndael: The Advanced Encryption Standard,” Dr. Dobb's Journal , pp.137-139, 2001.
[6] Damiani E., Vimercati S., and Foresti S., “Key Management for Multi-User Encrypted Databases,” in Proceedings of ACM Storage , Italy , pp. 74-83, 2005.
[7] El-Fishawy N., “Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms,” International Journal of Network Security , vol. 5, no. 3 pp. 241-251, 2007.
[8] Ferraiolo D. and Kuhn R., “Role-Based Access Controls,” in Proceedings of NIST-NCSC , Baltim, pp. 554-563, 2002.
[9] Jingmin H. and Wang M., “Cryptography and Relational Database Management Systems,” in Proceedings of IEEE Symposium on the International Database Engineering and Applications , USA, pp. 273-284, 2001.
[10] Kim Y. and Hong E., “A Study of UniSQL Encryption System: Case Study of Developing SAMS,” in Proceedings of the 9 th International Conference on Advanced Communication Technology , Gangwon, vol. 1, pp. 577-582, 2007.
[11] Mattsson U., “A Database Encryption Solution that is Protecting Against External and Internal Threats, and Meeting Regulatory Requirements: A Practical Implementation of Field Level Privacy,” in Proceedings of the 7 th IEEE International Conference on E-Commerce Technology , USA, pp. 559–565, 2005.
[12] Salama D., Abdual-Kader H., and Hadhoud M., “Studying the Effects of Most Common Encryption Algorithms,” International Arab Journal of e-Technology , vol. 2, no. 1, pp. 1-10 2011.
[13] Salama D., Abdual-Kader H., and Hadhoud M., “Wireless Network Security Still Has no Clothes,” International Arab Journal of e- Technology , vol. 2, no. 2, pp. 112-123, 2011.
[14] Schneier B., Applied Cryptography Second Edition: Protocols, Algorithms, and Source , China Machine Press, Beijing, 2000.
[15] Schneier B., “The Blowfish Encryption Algorithm,” available at: http://pocketbrief.net /related/BlowfishEncryption.pdf, last visited: 2008.
[16] Stallings W., Cryptography and Network Security Principles and Practice , Prentice-Hill, 2005.