• Mar 27, 2019 News!Vol.11, No.2 has been published with online version.   [Click]
  • Aug 06, 2018 News!Vol.9, No.1-Vol.9, No.4 have been indexed by EI (Inspec).   [Click]
  • Mar 27, 2019 News!Vol.9, No.1-Vol. 10, No. 6 have been indexed by Crossref.
General Information
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2011 Vol.3(6): 789-793 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2011.V3.410

Performance Evaluation of Encryption Techniques for Confidentiality of Very Large Databases

Malik Sikander Hayat Khiyal, Member, IACSIT , Aihab Khan and Khansa Shabbir

Abstract—Many companies rely heavily on the functions of databases, hence database management and maintenance has become a vital component of their business models. There are many architectures, techniques, and tools available to ensure security. But to select the right solution for the right application is the most important issue of the time. This research is conducted with the objective to provide with the best encryption algorithms for confidentiality of very large databases. When different techniques were analyzed in terms of response time, memory usage and efficiency, 3DES (triple data encryption standard) performed better than advanced encryption standard (AES) and Blowfish. AES provides the highest security but to use it the organization would have to compromise on response time and resource usage. If the organization is short of resources and cannot spend much time in encrypting data though the confidentiality is not much required then 3DES provides the best solution. Blowfish holds the in between place. If neither the security is a maximum risk, nor the resources are a problem, then Blowfish should be preferred.

Index Terms—Databases, confidentiality, AES, 3DES, blowfish.

Authors are with Department of Software Engineering in Fatima Jinnah Women University (e-mail: m.sikandarhayat@yahoo.com; aihabkhan@yahoo.com; khansa@gmail.com).


Cite: Malik Sikander Hayat Khiyal, Aihab Khan and Khansa Shabbir, "Performance Evaluation of Encryption Techniques for Confidentiality of Very Large Databases," International Journal of Computer Theory and Engineering vol. 3, no. 6, pp. 789-793, 2011.

Copyright © 2008-2019. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@iacsitp.com