Database security at cache layer

Mamta Rani *

Department of Computer Science, Gopichand Arya Mahila College, South Avenue Hanumangarh Road, Abohar, Distt. Fazilka, Punjab, 152116, India.
 
Review
International Journal of Science and Research Archive, 2023, 09(02), 016–019.
Article DOI: 10.30574/ijsra.2023.9.2.0506
Publication history: 
Received on 18 May 2023; revised on 28 June 2023; accepted on 01 July 2023
 
Abstract: 
As database security is the main concern, we are going to place an encryption module at the cache layer. All the encryption and decryption will be done at the cache layer before storing that data to the database, which will provide more security to the database Higher level security should be provided to the database so here we are placing an idea of Elliptical Curve Cryptography. A database is a collection of data that helps us to collect, retrieve, organize and manage the data in an efficient and effective manner. Databases are critical assets. They store client details, financial information, personal files, company secrets and other data necessary for business. Today database security is getting greater importance than the past which is the amount of data is stored in a corporate database is increasing. People are depending more on the corporate data for making a decision, management of customer service and supply chain management etc. Data stored in databases is usually very vulnerable data so it becomes very important and crucial to maintain this data securely. There are many front end applications that fetch data from secondary storage to main memory for processing and from main memory, data is stored in cache for temporary processing. Any loss or unavailability of data may seriously affect its performance. The database security should provide protected access to the contents of a database and should preserve the integrity, availability, consistency, and quality of the data. In this paper, I present a model where data is protected even on cache layer. 
 
Keywords: 
Database; Security; Cache Layer; ECC; RSA
 
Full text article in PDF: