General Information
    • ISSN: 1793-8201 (Print), 2972-4511 (Online)
    • Abbreviated Title: Int. J. Comput. Theory Eng.
    • Frequency: Quarterly
    • DOI: 10.7763/IJCTE
    • Editor-in-Chief: Prof. Mehmet Sahinoglu
    • Associate Editor-in-Chief: Assoc. Prof. Alberto Arteta, Assoc. Prof. Engin Maşazade
    • Managing Editor: Ms. Mia Hu
    • Abstracting/Indexing: Scopus (Since 2022), INSPEC (IET), CNKI,  Google Scholar, EBSCO, etc.
    • Average Days from Submission to Acceptance: 192 days
    • E-mail: ijcte@iacsitp.com
    • Journal Metrics:

    • SCImago Journal & Country Rank
Editor-in-chief
Prof. Mehmet Sahinoglu
Computer Science Department, Troy University, USA
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.

IJCTE 2011 Vol.3(6): 789-793 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2011.V3.410

Performance Evaluation of Encryption Techniques for Confidentiality of Very Large Databases

Malik Sikander Hayat Khiyal, Member, IACSIT , Aihab Khan and Khansa Shabbir

Abstract—Many companies rely heavily on the functions of databases, hence database management and maintenance has become a vital component of their business models. There are many architectures, techniques, and tools available to ensure security. But to select the right solution for the right application is the most important issue of the time. This research is conducted with the objective to provide with the best encryption algorithms for confidentiality of very large databases. When different techniques were analyzed in terms of response time, memory usage and efficiency, 3DES (triple data encryption standard) performed better than advanced encryption standard (AES) and Blowfish. AES provides the highest security but to use it the organization would have to compromise on response time and resource usage. If the organization is short of resources and cannot spend much time in encrypting data though the confidentiality is not much required then 3DES provides the best solution. Blowfish holds the in between place. If neither the security is a maximum risk, nor the resources are a problem, then Blowfish should be preferred.

Index Terms—Databases, confidentiality, AES, 3DES, blowfish.

Authors are with Department of Software Engineering in Fatima Jinnah Women University (e-mail: m.sikandarhayat@yahoo.com; aihabkhan@yahoo.com; khansa@gmail.com).

[PDF]

Cite: Malik Sikander Hayat Khiyal, Aihab Khan and Khansa Shabbir, "Performance Evaluation of Encryption Techniques for Confidentiality of Very Large Databases," International Journal of Computer Theory and Engineering vol. 3, no. 6, pp. 789-793, 2011.


Copyright © 2008-2024. International Association of Computer Science and Information Technology. All rights reserved.