2009 IEEE International Advance Computing Conference 2009
DOI: 10.1109/iadcc.2009.4809240
|View full text |Cite
|
Sign up to set email alerts
|

Numeric To Numeric Encryption of Databases: Using 3Kdec Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…(Goel & Hong, 2015) 3KDEC:To address the issue of converting numeric data into alphanumeric format and storing encrypted data in preexisting numeric fields, a symmetric key block encipherment algorithm is employed as a pragmatic solution. (K. Kaur, Dhindsa, & Singh, 2009) Privacy Protection techniques in big data: Big data platforms represent a convergence of various technological advancements pertaining to storage and processing capabilities. Consequently, the conventional security techniques employed in traditional systems prove ineffective and inadequate when directly applied in the context of big data.…”
Section: Endpointmentioning
confidence: 99%
“…(Goel & Hong, 2015) 3KDEC:To address the issue of converting numeric data into alphanumeric format and storing encrypted data in preexisting numeric fields, a symmetric key block encipherment algorithm is employed as a pragmatic solution. (K. Kaur, Dhindsa, & Singh, 2009) Privacy Protection techniques in big data: Big data platforms represent a convergence of various technological advancements pertaining to storage and processing capabilities. Consequently, the conventional security techniques employed in traditional systems prove ineffective and inadequate when directly applied in the context of big data.…”
Section: Endpointmentioning
confidence: 99%
“…If floating-point numbers are encrypted as strings, basic arithmetic calculations on strings are not supported. In addition, if using 3Kdec algorithm to realize numeric to numeric encryption for easily storing [17], there is no indication of enabling the arithmetic calculations on encrypted data as well. The method to expand the homomorphic encryption on the integer to the decimal by 'similar modular arithmetic' is proposed [18].…”
Section: Related Workmentioning
confidence: 99%
“…They further proposed a database encryption, according to which an database can be provided as a service. A feature which they proposed was to save th the encrypted data in order to enhance the sec [16] sed an encryption ption. This scheme security.…”
Section: A Standalone Encryption Approachesmentioning
confidence: 99%