Encryption and Authentication in Database Systems
Encryption and Authentication in Database Systems
IN DATABASE SYSTEMS
By
Mrs.Subhasheni A
Assistant Professor
Sri Ramakrishna college of Arts & Science
INTRODUCTION
Both Encryption and Authentication are critical components
in ensuring the security of a database system. They protect
data from unauthorized access and help verify the identity
of users interacting with the system.
ENCRYPTION
Encryption is the process of converting data into a format that
cannot be easily read or understood by unauthorized individuals.
The goal is to protect sensitive information from unauthorized
access, especially when it is being stored or transmitted.
Data Encryption: Ensures that data stored in the database or
transmitted over the network is unreadable without the proper
decryption key.
Example: Encrypting credit card numbers or personal
information stored in the database.
CONTN..
Encryption Methods:
Symmetric Encryption: The same key is used for both
encryption and decryption.
Asymmetric Encryption: Uses a pair of keys—one for
encryption (public key) and another for decryption (private key).
Advantages:
Protects data in case of unauthorized access to physical devices
or breaches.
Secures data during data transmission, such as over the
internet (e.g., SSL/TLS).
AUTHENTICATION
Authentication is the process of verifying the identity of a user or
system before granting access to a database or application. It
ensures that only authorized users can perform actions on sensitive
data.
User Authentication:
The most common form of authentication is the use of a
username and password. The system compares the provided
credentials against stored credentials.
Multi-Factor Authentication (MFA) adds an additional layer
of security by requiring multiple forms of verification (e.g., a one-
time password sent via SMS or email, biometric verification).
CONTN..
Authentication Methods:
Password-based: A combination of a username and password.
Biometric authentication: Uses unique physical
characteristics, such as fingerprints or facial recognition.
Token-based authentication: The system issues a token after
initial login, which is used for subsequent access.
ADVANTAGES
Prevents unauthorized access by ensuring that only users with
proper credentials can access data.
Helps meet regulatory compliance standards (e.g., HIPAA, GDPR)
by ensuring only authorized users can interact with sensitive data.
CONCLUSION
Encryption secures data confidentiality during storage and
transmission.
Authentication verifies the identity of users to prevent
unauthorized access.
Both are essential to maintaining the integrity and privacy of data
within a database system.