Open Access Open Access  Restricted Access Subscription or Fee Access

A Secured Distributed Database System Using Rijndael Encryption Algorithm

Mfon Edet, Daniel Matthias, N. D. Nwiabu

Abstract


There is a pressing need to secure distributed database system in order to address effectively some challenges, such as, no encryption of users’ access details in the database, which could be hacked by skilled hands, and also the security of the data is highly and threateningly compromised when using data encryption standard (DES) algorithm. This is because it has weak or semi-weak keys, inability of DES algorithm to eliminate the possibility of equivalent keys due to linearity of the key expansion and it requires high computational machines when encrypting large data and the data encryption is applied only on textual data. This paper aims to develop a secure distributed database system using the Rijndael encryption algorithm, also known as the advanced encryption standard (AES). The primary and secondary sources of research methodologies in gathering data or information were employed and rapid application development (RAD) was adopted as system development methodology. The proposed system employed an approach that uses secured hash algorithm (SHA-3) for encrypting login details of users, Rijndael algorithm to encrypt and re-encrypt text and image data, in order to improve the security strength and make it difficult for unauthorized personnel to have access to data stored in the database. Based on the results of the proposed system, the system has the capability of capturing the user’s details for registration and encrypting the user’s password with SHA-3 algorithm. The user can send encrypted text and/or image data with less amount of time and can also receive encrypted data, decrypt it without any changes in quality of the data. Conclusively, with this system, it is impossible for intruders to gain access to the application or compromise the security of the text or image data and users can share (send and receive) sensitive data/information in a secured manner without any interception.


Full Text:

PDF

References


Toapanta SM, Quimis OA, Gallegos LE, Arellano MR. Analysis for the evaluation and security management of a database in a public organization to mitigate cyber attacks. IEEE Access. 2020; 8: 169367–169384.

Karthick S. Preserving data and managing concurrency in distributed database. Int J Computer Eng Technol. 2018; 9: 243–249.

Ferretti L, Colajanni M, Marchetti M. Distributed, concurrent, and independent access to encrypted cloud databases. IEEE Trans Parallel Distrib Syst. 2013; 25 (2): 437–446.

Gupta H, Sharma VK. Multiphase encryption: a new concept in modern cryptography. Int J Computer Theory Eng. 2013; 5 (4): 638–640.

Bouganim L, Guo Y. Database encryption. In: van Tilborg HCA, Jajodia S, editors. Encyclopedia of Cryptography and Security. New York, NY, USA: Springer; 2011. pp. 307–312.

Xiang S, Ruan G, Li H, He J. Robust watermarking of databases in order-preserving encrypted domain. Front Computer Sci. 2021; 16: 162804.

Guclu M, Bakir C, Hakkoymaz V. A new scalable and expandable access control model for distributed database systems in data security. Sci Programm. 2020; 2020: Article 8875069.

Sawiris BS, Abdel-Fattah MA. A novel solution for distributed database problems. Int J Adv Computer Sci Appl. 2020; 11 (10): 468–474.

Amer AA, Sewisy AA, Elgendy TM. An optimized approach for simultaneous horizontal data fragmentation and allocation in distributed database systems (DDBSs). Heliyon. 2017;3 (12): e00487.

Alslman Y, Alnagi E, Ahmad A, AbuHour Y, Younisse R, Abu Al-haija Q. Hybrid encryption scheme for medical imaging using AutoEncoder and advanced encryption standard. Electronics. 2022; 11 (23): 3967.


Refbacks

  • There are currently no refbacks.