Security Framework for Distributed Database System

Alla Khamis, S. Subair
{"title":"Security Framework for Distributed Database System","authors":"Alla Khamis, S. Subair","doi":"10.4236/JDAIP.2019.71001","DOIUrl":null,"url":null,"abstract":"This research aims to study various Symmetrical Algorithms, while the main objective of this study is to find out a suitable algorithm for the encryption of any specific size of text file where the experiment of each algorithm is based on encryption of different sizes of the text files, which are in “10 KB to 5 MB”, and also to calculate the time duration that each algorithm takes to encrypt or to decrypt the particular size of each text file. There are many types of encryption algorithm, which can be used to encrypt the computerized information in different Organizations, whose all algorithms can encrypt and decrypt any size of text file, but the time duration of each Algorithm during the encryption or decryption process of specific file size is not fixed. Some of the algorithms are suitable for encryption of specific ranges of the file size, or some of algorithms are functional while encryption small size of files, and others algorithms are functional for encryption of big size of text files, based on the time duration disparity among symmetric algorithms during encryption of text files. In this study five symmetrical algorithms are merged in one program using classes and concept of inheritance in the form that if encryption is needed, the program will select the file and it checks the size of the text file. After this process the program automatically will select the suitable encryption algorithm to encrypt the specific text file according to the range of the file size. Knowing that the file size before or after encryption will not change or is stable, in this case of the decryption algorithm will apply the same process of encryption while decrypting files, the program of encryption and decryption code will write using visual Studio 2013. The result will be analyzed with R program (R software), the cipher text will appear in the format of UTF8 which means Unicode Transformation Format, “8” Means “8” bits to represent a character, the size format that will apply in the program will be in format of KB (kilo Byte).","PeriodicalId":71434,"journal":{"name":"数据分析和信息处理(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"数据分析和信息处理(英文)","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.4236/JDAIP.2019.71001","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

This research aims to study various Symmetrical Algorithms, while the main objective of this study is to find out a suitable algorithm for the encryption of any specific size of text file where the experiment of each algorithm is based on encryption of different sizes of the text files, which are in “10 KB to 5 MB”, and also to calculate the time duration that each algorithm takes to encrypt or to decrypt the particular size of each text file. There are many types of encryption algorithm, which can be used to encrypt the computerized information in different Organizations, whose all algorithms can encrypt and decrypt any size of text file, but the time duration of each Algorithm during the encryption or decryption process of specific file size is not fixed. Some of the algorithms are suitable for encryption of specific ranges of the file size, or some of algorithms are functional while encryption small size of files, and others algorithms are functional for encryption of big size of text files, based on the time duration disparity among symmetric algorithms during encryption of text files. In this study five symmetrical algorithms are merged in one program using classes and concept of inheritance in the form that if encryption is needed, the program will select the file and it checks the size of the text file. After this process the program automatically will select the suitable encryption algorithm to encrypt the specific text file according to the range of the file size. Knowing that the file size before or after encryption will not change or is stable, in this case of the decryption algorithm will apply the same process of encryption while decrypting files, the program of encryption and decryption code will write using visual Studio 2013. The result will be analyzed with R program (R software), the cipher text will appear in the format of UTF8 which means Unicode Transformation Format, “8” Means “8” bits to represent a character, the size format that will apply in the program will be in format of KB (kilo Byte).
分布式数据库系统的安全框架
本研究旨在研究各种对称算法,而本研究的主要目的是找到一种适合任何特定大小的文本文件加密的算法,其中每种算法的实验都是基于对不同大小的文本文件进行加密,大小在“10 KB到5 MB”,并且计算每种算法对特定大小的文本文件进行加密或解密所需的时间。加密算法有很多种,可以用于加密不同组织的计算机化信息,所有的算法都可以加密和解密任何大小的文本文件,但是每种算法在加密或解密特定文件大小的过程中所用的时间长度是不固定的。根据文本文件加密过程中对称算法的持续时间差异,有些算法适用于特定文件大小范围的加密,或者有些算法适用于小文件大小的加密,有些算法适用于大文件大小的加密。在本研究中,五种对称算法使用类和继承的概念合并在一个程序中,如果需要加密,程序将选择文件并检查文本文件的大小。经过这个过程后,程序会根据文件大小的范围自动选择合适的加密算法对特定的文本文件进行加密。知道加密前后的文件大小不会改变或稳定,在这种情况下,解密算法在解密文件时将采用相同的加密过程,加密和解密代码的程序将使用visual Studio 2013编写。结果将用R程序(R软件)进行分析,密文将以UTF8的格式出现,这意味着Unicode转换格式,“8”表示“8”位来表示一个字符,将应用于程序的大小格式将以KB(千字节)的格式。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
91
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信