| TITLE | Design and Implementation of a Hybrid Database Encryption Model |
|---|---|
| ABSTRACT | With the rapid growth of data-driven applications and cloud-based information systems, databases have become prime targets for cyberattacks and unauthorized access. Traditional database security mechanisms, such as access control and perimeter defenses, are no longer sufficient to protect sensitive data against advanced threats. Encryption has emerged as a fundamental technique for ensuring data confidentiality; however, single-layer encryption approaches often introduce performance bottlenecks, limited flexibility, and inadequate protection against insider attacks. This paper presents the design and implementation of a hybrid database encryption model that combines multiple cryptographic techniques to achieve enhanced security while maintaining acceptable performance. The proposed model integrates symmetric encryption, asymmetric encryption, and hashing mechanisms at different layers of the database system, including data-at-rest, data-in-transit, and data-access layers. The hybrid approach enables fine-grained security control, minimizes computational overhead, and improves resilience against both external and internal threats. The paper discusses the architectural design, encryption workflow, key management strategy, and implementation considerations. A comparative analysis highlights the advantages of the hybrid encryption model over traditional single-technique approaches, demonstrating its suitability for modern enterprise and cloud-based database environments. |
| AUTHOR | PRASANTH RAM C , SAI RAVALI K, SREE HARSHA VARDHAN S |
| VOLUME | 5 |
| ISSUE | 3 |
| 2_Design and Implementation of a Hybrid Database Encryption Model.pdf | |
| KEYWORDS | |
| References | 1. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126. 2. Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES—The Advanced Encryption Standard. Springer. 3. Stallings, W. (2010). Cryptography and network security: Principles and practice (5th ed.). Pearson. 4. Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C (2nd ed.). Wiley. 5. Anderson, R. (2008). Security engineering: A guide to building dependable distributed systems (2nd ed.). Wiley. 6. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. SIAM Journal on Computing, 32(3), 586–615. 7. Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1997). Handbook of applied cryptography. CRC Press. 8. Rivest, R. L., Shamir, A., & Tauman, Y. (2001). How to leak a secret. Advances in Cryptology—ASIACRYPT 2001, 552–565. 9. Katz, J., & Lindell, Y. (2007). Introduction to modern cryptography. CRC Press. 10. Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2009). Introduction to algorithms (3rd ed.). MIT Press. |
Copyright@IJMRSETM