Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit
- PMID: 36438858
- PMCID: PMC9692032
- DOI: 10.1016/j.mex.2022.101924
Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit
Abstract
To prevent unauthorized access to the databases and to ensure that the data of the databases is protected from intruders and insiders, the data is being encrypted at the storage locations. The same goal is achieved with Transparent Data Encryption, a feature that can be found in almost all database products. However, it has been observed that the non-datafiles are being ignored and there is no standard encryption for them like there is for datafiles. Moreover, there was no standard algorithm to encrypt them without relying on third-party tools. Therefore,•This study provides a robust algorithm to perform the encryption. This presentation also describes the importance of non-datafiles encryption, and how some non-datafiles can pose a threat to data and infrastructure without encryption.•The practical implementation of the non-data file encryption algorithm shows the authentic results. Further, unlike existing algorithms, the proposed algorithm gives the file owner full control over the encryption logic.•In the encryption process, two levels of encryption logics are combined with a passcode lock, while the same combination of two levels of reversing encryption and passcode is used in the decryption process to convert encoded data back into text format.
Keywords: Database configuration files encryption; Database internal files encryption; New database encryption method; Non-datafiles encryption.
© 2022 The Author(s).
Conflict of interest statement
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Figures

















References
-
- Trischler J., Westman Trischler J. Design for experience – a public service design approach in the age of digitalization. Publ. Manag. Rev. 2021:1–20.
-
- Ma Z., Yan L. Data modeling and querying with fuzzy sets: a systematic survey. Fuzzy Sets Systems. 2022
-
- M. E. Seinfeld and F. Lauderdale, “REVERSE REPLICATION TO ROLLBACK CORRUPTED FILES,” 10, 204, 113 B2, 30-Mar-2017.
-
- Shaukat S.K., Ribeiro V.J. 2018 10th International Conference on Communication Systems & Networks (COMSNETS) 2018. RansomWall: A layered defense system against cryptographic ransomware attacks using machine learning.
-
- Aidan T, Hughes and Paul C, Barr, “PRIORITIZED FILES,” 7,610,296 B2, 22-Jun-2006.
LinkOut - more resources
Full Text Sources