z-logo
open-access-imgOpen Access
DATABASE SECURITY AND STUDY OF DATA ENCRYPTION METHODS IN CLOUD STORAGE
Author(s) -
Ye. Shcherbinina,
B. Martseniuk,
A. Filonenko
Publication year - 2020
Publication title -
sistemi upravlìnnâ, navìgacìï ta zvʼâzku
Language(s) - English
Resource type - Journals
ISSN - 2073-7394
DOI - 10.26906/sunz.2020.3.104
Subject(s) - encryption , computer security , cloud computing , computer science , cloud storage , cloud database , database , data breach , data security , hacker , client side encryption , cloud computing security , internet privacy , on the fly encryption , operating system
Purpose of the article is discusses the importance of database encryption and makes an in depth review of various encryption techniques. Security of Data is the most important task in today’s world. Governments, companies and other organizations have lost a lot of money and many others have closed down due to the activities of dubious hackers and attackers. Over the years various encryption schemes have been developed in order to protect the database from various attacks by the intruders. As data is the life wire of every organization, there is the need to remotely and securely store the data generated daily by these organizations in order to enable them recover quickly in the event of attach and hack. Cloud storage is needed here for the remote data storage. For many establishments, data security is one of their major concern when sending their files into the cloud. They worry about their files being seen or even compromised by malicious and dubious people because that’s what happened in the past. Data encryption techniques are required to protect the integrity of the stored data. In the past, many businesses felt comfortable allowing the cloud providers to manage all their data, believing that security risks could be managed through contracts, controls and audits. Over time it has become apparent, however, that cloud providers cannot honor such commitments when responding to government requests for information. This paper discuses, the importance of database encryption and makes an in depth review of various encryption techniques

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here