Secure Database Access and Transfer Using Public Key Cryptography
Main Article Content
Abstract
Nowadays many transactions on internet are implemented by security mechanisms.so authentication plays a vital role in securing data, not only in a single process but with varioustransactions.Many security initiatives are defensive strategiesâ€â€aimed at pro tectingthe perimeter of the network. But these works may ignore a crucial Things sensitive data stored on networked servers are at risk from attackers who only need to find one way inside the network to access this confidential information. Additionally, perimeter defenseslike firewalls cannot protect stored sensitive data from the internal threatâ€â€employees with the means to access and exploit this data.Encryption can provide strong security for data at rest, but developing a database encryption strategy must take many factors into consideration.RSA is a rather mature public key algorithm in that itcan be used to encrypt and sign. This paper examines the issues of implementing access and transferring the data using public key cryptog raphy.
Article Details
How to Cite
, M. C. F. A. F. (2013). Secure Database Access and Transfer Using Public Key Cryptography. International Journal on Recent and Innovation Trends in Computing and Communication, 1(8), 674–678. https://doi.org/10.17762/ijritcc.v1i8.2841
Section
Articles