Strengthening Database Privacy: A Comprehensive Approach Using One Time Pad

Main Article Content

Alain Jean
Tossaporn Alherbe

Abstract

Securing sensitive data stored in database environments is a critical challenge faced by organizations across various industries. Inadequate database security can lead to devastating data breaches, compromising the privacy and confidentiality of crucial information. This research focuses on the importance of robust database security measures and the role of the Gid Crypto tool in addressing these concerns. Gid Crypto, a stand-alone application, efficiently encrypts and decrypts data using private, public, and shared keys. The previous version stored encryption keys and contact names directly in the MongoDB database, posing a security risk if attackers managed to hack the password. This research introduces a new mechanism leveraging One Time Pad (OTP)-based encryption to enhance security. By implementing OTP, the tool ensures that contact lists, private keys, and secret keys are encoded before storage, making the data incomprehensible without the appropriate decryption keys, even if unauthorized access occurs. The enhanced Gid Crypto application maintains data integrity, confidentiality, and authenticity, effectively protecting sensitive information in databases. Comprehensive testing confirmed the tool's robustness, accuracy, and efficiency, establishing it as a practical and cost-effective option for database security.

Article Details

How to Cite
Jean, A., & Alherbe, T. (2024). Strengthening Database Privacy: A Comprehensive Approach Using One Time Pad. Journal of Science and Science Education (JSSE), 7(2), 282–294. https://doi.org/10.14456/jsse.2024.22
Section
Research Articles in Science

References

Budiman, M. A., Zarlis, M. and Hafirzah (2021). Implement hybrid cryptosystem using Rabin-p algorithm and One Time Pad to secure images. Journal of Physics: Conference Series, 1898(1), 012037.

Evkan, H., Lahr, N., Niederhagen, R., Petri, R., Poller, A., Roskosch, P. and Troger, M. (2020). Security Evaluation of VeraCrypt. Bonn: Fraunhofer Institute for Secure Information Technology.

Fatima, S., Rehman, T., Fatima, M. Khan S. and Ali, M. A. (2022). Comparative analysis of Aes and Rsa Algorithms for Data Security in Cloud Computing. Journal of Engineering Proceedings, 20(1), 14.

Hammami, H., Obaidat, M. S. and Yahia, S. B. (2020). An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud Data. In Proceedings of the 17th International Conference on Security and Cryptography (SECRYPT 2020) (pp. 102-109).

Ibrahim, S., Zengin, A., Hizal, S., Akhter, A. F. M. S. and Altunkaya, C. (2023). A novel data encryption algorithm to ensure database security. Acta Infologica, 7(1), 1-16.

Indra, Z. and Nabila, R. C. (2023). Implementing the RSA Algorithm and the One Time Pad Algorithm for Text Message Security. Formosa Journal of Science and Technology, 2(1), 379-388.

James, T. (2024). Proton Mail Review 2024 – How is it in Reality?. Retrieved 5 May 2024, from Travelsecurely https://travelsecurely.com/protonmail-review/

Jean, A. and Alherbe, T. (2024). Gid Crypto: Application for End-to-End Encrypt and Decrypt E-mail and Data. Journal of Scientific and Technological Reports, 27(2), 90-102.

KakaSoft (2021). VeraCrypt Review 2021: Price, Feature and Alternatives. Retrieved 12 March 2024, from Kakasoft https://www.kakasoft.com/review/veracrypt-review/

Kumari, A. B., Balaji, H., and Lyengar, N. Ch. S. N. (2023). One Time Pad Encryption Technique in Cryptography. International Journal of Computational Learning & Intelligence, 2(1), 1-7.

Miguel, P. G. (2024). 18 Best Encryption Software. Reviewed For 2024. Retrieved 28 May 2024, from Thectoblub https://thectoclub.com/tools/best-encryption-software/

Ngaogate, W., Jean, A., Wattanataweekul, R., Janngam, K. and Alherbe, T. (2024). Hybrid Machine Learning Algorithm with Fixed Point Technique for Medical Data Classification Problems Incorporating Data Cryptography. Thai Journal of Mathematics, 22(2), 295-310.

Preveil (2024). Simple, Encrypted Email and File Collaboration. Retrieved 10 June 2024, from Preveil https://www.preveil.com/

Rubenking, N. J. (2024). The Best Email Encryption Services for 2024. Retrieved 3 June 2024, from Pcmag https://www.pcmag.com/picks/the-best-email-encryption-services

Shingari, N. and Mago, B. (2024). The Importance of Data Encryption in Ensuring the Confidentiality and Security of Financial Records of Medical Health. In 2024 IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI) (pp. 1-6). Gwalior: IEEE.

TrustRadius (2024). Make confident technology decision. Retrieved 7 March 2024, from TrustRadius https://www.trustradius.com/