CFP last date
20 January 2025
Reseach Article

A Framework for Secure Mobile Database Transactions using Cryptographic Co-processor

by D. Sathiya, S. Albert Rabara, J. Ronald Martin
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 105 - Number 5
Year of Publication: 2014
Authors: D. Sathiya, S. Albert Rabara, J. Ronald Martin
10.5120/18375-9535

D. Sathiya, S. Albert Rabara, J. Ronald Martin . A Framework for Secure Mobile Database Transactions using Cryptographic Co-processor. International Journal of Computer Applications. 105, 5 ( November 2014), 25-30. DOI=10.5120/18375-9535

@article{ 10.5120/18375-9535,
author = { D. Sathiya, S. Albert Rabara, J. Ronald Martin },
title = { A Framework for Secure Mobile Database Transactions using Cryptographic Co-processor },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 105 },
number = { 5 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 25-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume105/number5/18375-9535/ },
doi = { 10.5120/18375-9535 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:36:56.800375+05:30
%A D. Sathiya
%A S. Albert Rabara
%A J. Ronald Martin
%T A Framework for Secure Mobile Database Transactions using Cryptographic Co-processor
%J International Journal of Computer Applications
%@ 0975-8887
%V 105
%N 5
%P 25-30
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The increase in the adoption of database systems by the Corporates in key data management technology for their day-to-day operations. So, decision-making becomes crucial for the security of data that is managed by these systems. The damage and misuse of data affects not only the single user or application, but it may have disastrous consequences for the entire organization as well. Accessing more secured information through client's mobile device is an important issue. In this paper, a framework for Secure Mobile Database Transactions using the Cryptographic Co-processor (CCP) is proposed. A dedicated coprocessor for encryption and decryption process enables high level security when compared to software based encrypting/decrypting process in corporate environment.

References
  1. Roshan Duraisamy, Salcic, Z. , Morales-Sandoval, M. , Feregrino-Uribe, C. 2006. A fast elliptic curve based key agreement protocol-on-chip (PoC) for securing networked embedded systems. IEEE, International Conference on Embedded and Real-Time Computing Systems and Applications.
  2. Miguel Morales-Sandoval, Claudia Feregrino-Uribe, Rene Cumplido and Ignacio Algredo-Badillo. 2009. A Run Time Recon?gurable Co-Processor for Elliptic Curve Scalar Multiplication. IEEE, Mexican International Conference on Computer Science.
  3. Barker, E. , Barker, W. , Burr, W. , Polk, W. , and Smid, M. 2007. "Recommendation for key management – part 1: General". National Institute of Standard Technology, Tech. Rep. , 201.
  4. Dan Yong-ping and He Hong-li per. 2012. Tradeoff design of Low-cost and Low-energy Elliptic Curve Crypto processor for Wireless Sensor Networks. Wireless Communications, Networking and Mobile Computing (WiCOM), 8th International Conference.
  5. Fan Mingyu, WangJinahua, and WangGuangweI. 2003. A Design of Hardware Cryptographic CO-Processor. Workshop on Information Assurance United States Military Academy, West Point, NY.
  6. MuthuKumar, B. and Jeevananthan, S. 2010. High Speed Hardware Implementation of an Elliptic Curve Cryptography (ECC) Co-Processor. IEEE, Trendz in Information Sciences & Computing (TISC), 17th-19th Dec, Chennai.
  7. Muthukumar, B. and Dr. Jeevananthan, S. 2009. Design of an Efficient Elliptic Curve Cryptography Coprocessor. First International Conference on Advanced Computing (ICAC 2009).
  8. SeongHan Shin, Kazukuni Kobara and Hideki Imai. 2006. Elliptic Curve based Authenticated Key Agreement Protocol for Wireless Security. IEEE, International Conference on Computational Intelligence and Security.
  9. Erez Shmueli, Ronen Vaisenberg, Ehud Gudes and Yuval Elovici. 2014. Implementing a database encryption solution, design and implementation issues. Computers & security, Volume 44, July 2014.
  10. Tutanescu, I. , Anton, C. , Ionescu, L. , Caragata, D. 2012. Elliptic Curves Cryptosystems Approaches. IEEE, International Conference on Information Society (i-Society 2012).
  11. Ravi Kishore Kodali. 2013. Implementation of ECDSA in WSN. IEEE, International Conference on Control Communication and Computing (ICCC).
Index Terms

Computer Science
Information Sciences

Keywords

Cryptographic Co-processor Mobile Database Elliptic Curve Cryptography Distributed Database Query optimization.