Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Nov 11:9:101924.
doi: 10.1016/j.mex.2022.101924. eCollection 2022.

Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit

Affiliations

Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit

Vaheedbasha Shaik et al. MethodsX. .

Abstract

To prevent unauthorized access to the databases and to ensure that the data of the databases is protected from intruders and insiders, the data is being encrypted at the storage locations. The same goal is achieved with Transparent Data Encryption, a feature that can be found in almost all database products. However, it has been observed that the non-datafiles are being ignored and there is no standard encryption for them like there is for datafiles. Moreover, there was no standard algorithm to encrypt them without relying on third-party tools. Therefore,•This study provides a robust algorithm to perform the encryption. This presentation also describes the importance of non-datafiles encryption, and how some non-datafiles can pose a threat to data and infrastructure without encryption.•The practical implementation of the non-data file encryption algorithm shows the authentic results. Further, unlike existing algorithms, the proposed algorithm gives the file owner full control over the encryption logic.•In the encryption process, two levels of encryption logics are combined with a passcode lock, while the same combination of two levels of reversing encryption and passcode is used in the decryption process to convert encoded data back into text format.

Keywords: Database configuration files encryption; Database internal files encryption; New database encryption method; Non-datafiles encryption.

PubMed Disclaimer

Conflict of interest statement

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Figures

Image, graphical abstract
Graphical abstract
Fig 1
Fig. 1
Non-datafile encryption (NDE) algorithm.
Fig 2
Fig. 2
Process flow of non-datafile algorithm.
Fig 3
Fig. 3
Server details.
Fig 4
Fig. 4
The content of original file.
Fig 5
Fig. 5
The content of encrypted non-data file.
Fig 6
Fig. 6
The history details of server.
Fig 7
Fig. 7
The content of decrypted non-datafile.
Fig 8
Fig. 8
The process of keycode generation.
Fig 9
Fig. 9
The keycodes of original file keys.
Fig 10
Fig. 10
The keycodes of level-1 encrypted text keys.
Fig 11
Fig. 11
The keycodes of level-2 encrypted text keys.
Fig 12
Fig. 12
The keycodes of text after completion of level -2 decryption.
Fig 13
Fig. 13
The keycodes of text after completion of level -1 decryption.
Fig 14
Fig. 14
The keycodes of decrypted file keys.
Fig 15
Fig. 15
Comparison of keycodes of original and decrypted files.
Fig 16
Fig. 16
Representation of disk storage space utilization.

References

    1. Trischler J., Westman Trischler J. Design for experience – a public service design approach in the age of digitalization. Publ. Manag. Rev. 2021:1–20.
    1. Ma Z., Yan L. Data modeling and querying with fuzzy sets: a systematic survey. Fuzzy Sets Systems. 2022
    1. M. E. Seinfeld and F. Lauderdale, “REVERSE REPLICATION TO ROLLBACK CORRUPTED FILES,” 10, 204, 113 B2, 30-Mar-2017.
    1. Shaukat S.K., Ribeiro V.J. 2018 10th International Conference on Communication Systems & Networks (COMSNETS) 2018. RansomWall: A layered defense system against cryptographic ransomware attacks using machine learning.
    1. Aidan T, Hughes and Paul C, Barr, “PRIORITIZED FILES,” 7,610,296 B2, 22-Jun-2006.

LinkOut - more resources