Date of Publication :7th February 2017
Abstract: Today, it is imperative for enterprises to know which specific threats they are trying to protect against and take stringent measures to address those threats. We have developed a proposed Networks to bring complete data privacy to the enterprise. With this Network Data Secure Platforms, an organizations can protect critical data from both internal and external threats, and ensure compliance with legislative and policy mandates for security. Data Secure features a dedicated security appliance and specialized software that enables organizations to encrypt data in applications and databases. File level encryption within databases provides protection largely against media theft and loss. Column level encryption provides protection against media theft along with a broad range of logical threats. While protecting against identified threats, enterprises must consider the type of encryption to deploy to protect sensitive data in databases. Effectively addressing all these factors will ensure enterprises can protect sensitive data, while minimizing the overall cost to the business. The process to migrate plaintext data to encrypted format is quite simple when we use this Network Connector; furthermore the process can be completely automated. The most important is that the integration is completely transparent to applications that interface with our sensitive data. Before deploying Data Secure, our sensitive data is encrypted, and applications can continue interacting with sensitive data using the same SQL statements; however, instead of interacting directly with that sensitive data, the application servers are actually interacting with a view of the data. In this thesis, I have an algorithm and try to implement in Java. The result can be shown in the encrypted form on command Prompt Scree. With this any data, either Numeric, Alphanumeric or Strings can be encrypted. . The percentage by which encrypted data is larger than plaintext data varies depending on the encryption algorithm that is used to perform the encrypt operation. In this thesis I used DESede cipher in CBC mode with PKCS5 padding, as such, a nine digit number Expands to 16 bytes of binary data and the results is shown in byte code. Its advantage is much faster than public key system and easy to implement in both hardware and software. Using this technique an organizations can protect critical data from both internal and external threats, and ensure compliance with legislative and policy mandates for security. Secure key management, backup, and administration are a few of the core elements for achieving true data privacy. I have built from the ground up with security in mind, implementing these policies and procedures is fast and easy, utilizing our unique management interface. We encourage administrators to focus on developing key management and administrative policies for their organizations that will provide maximum security and hope that this thesis will serve as a guide in this effort.
Reference :
-
- ‖Cryptography Decrypted ― By H.X Mel & Doris Baker, Publication Addison – Wesley
- ―Fundamentals of Network Seccurity.‖By Eric Maiwald, Dreamtech publication Edition –2004
- ―Crytography and Network Security Principle and Practice‖ By Stalling , William, 2ed edition , Pretice Hall ,1999 ,ISBN )-13-869017-0. Practical Discussion of Cryptographic principle.
- ―Computer Networks‖ By Tanenbaum , Andrews, Parentice Hall of India, New Delhi- 1987
- ”Data Communications and Networking”. By Behrouz A. Forouzans Tata McGraw-Hill Publishing Company Limited, Edition- 2000.
- ―Cryptography in C & C++‖ By Michael WelschenbBach, translated by David Kramer
- ―SQL,PL/SQL Progamming Language of oracle.‖ By – Ivan Bayross.
- ― Starting Out with Oracle covering Database. ― By John Day craig Van Slyke
- ―Beginning Oracle Programming‖ By Sean Dillon , Christopher Beck, Thomas Kyte, & Joel Kallman , Shroff Publishers & Distributors Pvt. Ltd.
- Internet & JAVA Programming‖ By R.Krishnamoorthy, S.Prabhu, New Age International(p)Limited, Publishers, New Delhi – 2003.
- ― Starting Out With JAVA‖ , By Tony Gaddis. , Published by Dreamtech , New Delhi-2004
- ―ICSA Guide to Crytography‖,By Nicholos, Randy , McGraw – Hill, !999. Comprehensive Discussion of Historical to Modern –day Cryptograpgy.
- http://ieee.org http://csrc.nist.gov/encryption/aes/
- http://www.ingrian.com
- http://www.cs.org http://www.airdefense.net.
- http://www.google.com,
- http://http//www.bitpipe.com/rlist/datasecurity.html.
- http://www.esat.kuleuven.ac.be/~rijmen/rijndael/
- http://www.cis.comell.edu,
- http://isaac.cs.berkeley.edu/mobicom.pdf.
- http://www.computeruser.com/resources/dictionary/dicti onary.html (reference for technical terms) .
- http://www.sciencedirect.com
- http://www.scirus.com
- http://wwwspringerlink.com
- http://ttp://www.computerworld.com (provides white papers, surveys, and reports ) .
- http://www.informationweek.com (provides information on wireless networks, wireless communications, and security solutions in the form of articles and other documents).
- http://www.infosecuritymagazine.com (provides white papers, surveys, and reports).