• Dec 24, 2021 News!Vol 10, No 1- Vol 10, No 2 has been indexed by IET-(Inspec)   [Click]
  • Aug 27, 2020 News!Welcome Prof. D. P. Sharma from India to join the Editorial board of IJFCC     [Click]
  • Aug 18, 2022 News!Vol.11, No.3 has been published with online version.     [Click]
General Information
Editor-in-chief

Prof. Pascal Lorenz
University of Haute Alsace, France
 
It is my honor to be the editor-in-chief of IJFCC. The journal publishes good papers in the field of future computer and communication. Hopefully, IJFCC will become a recognized journal among the readers in the filed of future computer and communication.

IJFCC 2014Vol.3(6): 436-443 ISSN: 2010-3751
DOI: 10.7763/IJFCC.2014.V3.343

Database Encryption Using Fuzzy Chaotic

Saad M. Darwish, Adel A. El-Zoghabi, and Mohammed A. Abdewi
Abstract—Database encryption is a fundamental technique in the security mechanisms of database that is characterized by both the fast speed of the conventional encryption and the convenience of key distribution of public key encryption. There are two problems with traditional database encryption schemes. They show tradeoff between efficiency and security. Furthermore, these schemes can’t solve the problem of storing multi-level encrypted elements into database besides having no ability for effective key management. In this paper, a new paradigm for database encryption is proposed in which database encryption can be provided as a service to applications with seamless access to encrypted database. The proposed system utilizes a chaotic encryption method based on cellular automata to realize higher complexity of crypt-analytical attacks. Cellular Automata rules are defined based on chaos mapping to generate a symmetric key. Furthermore, a fuzzy observer based scheme for synchronizing chaotic keys of encrypted signal is employed to enhance key distribution. The suggested system have some advantages such as confusion, diffusion, very large number of passwords helped in building of symmetric private key, key-dependent mapping and increasing system complexity with the impact of indefinite rules and chaos mapping. Simulation results obtained from some database demonstrate the strong performance of the proposed encryption system.

Index Terms—Database encryption, fuzzy chaotic, cellular automata, security.

Saad M. Darwish and Adel A. El-Zoghabi is with the Department of Information Technology, Institute of Graduate Studies and Research, Alexandria University, 163 Horreya Avenue, El-Shatby 21526, P.O. Box 832, Alexandria, Egypt (e-mail: saad.saad@alexu.edu.eg, zoghabi@gmail.com).
Mohammed A. Abdewi is with the Department of Computer and Information, Ministry of Education, Iraq (e-mail: mohammed.eyfan@yahoo.com).

[PDF]

Cite: Saad M. Darwish, Adel A. El-Zoghabi, and Mohammed A. Abdewi, "Saad M. Darwish, Adel A. El-Zoghabi, and Mohammed A. Abdewi," International Journal of Future Computer and Communication vol. 3, no. 6, pp. 436-443, 2014.

Copyright © 2008-2022. International Journal of Future Computer and Communication. All rights reserved.
E-mail: ijfcc@ejournal.net