Sie sind auf Seite 1von 3

Secure Data Processing Issues And Solutions

Of Drawback
Muhammad Mubashir Ayub
PAF-KIET University
Karachi, Pakistan
mubashiraquarius@gmail.com

Abstract — A method or algorithm which encrypt data, it is also known as secure data communication
describes the different ways to resolve the issues or process, in this method, data are encrypted between the client
problem occur in data processing whatever it is and server during transfer of data (line encryption), the data is in
from sender to receiver or in data backups, in
encrypted form in the central point, and generally stored in
every data processing there are threads which can
effect data brutally but if we make any mechanism encrypted form in the database, there are some security gaps in
or algorithm which overcome these threads or these methods, since the administrative who have access to the
issues to very low level so our data can be secured. central database have rights to manipulate or read data. So the
In daily basis, the world is working on it and solution to this problem is given that the data should be stored in
trying their best to make the perfect algorithm encrypted form on the central server and also stored in encrypted
which can be used to secure data processing. form in the database.
I. INTRODUCTION
II. LITERATURE REVIEW
In data processing, we must make sure that the processing of
[1] Users of electronic devices must need to access
data is fully safe and secure. In other words, the data processing
database systems to get information of various types and/or
must be protected and not everyone is allowed to access the data
perform various operations. There are so many different
without authentication. In present creation concerns with
techniques have been devised to control retrieval of data items
protected information preparing technique and framework and is
and storage in database management systems. The confidential
of specific use of a monetary terminal. In information handling
data in database management systems is an ongoing concern. As
framework it is regular to give a programmable focal preparing
an example, concerns on security of data and data breaches may
unit, memory and other programming and equipment segments.
hinder the adoption technologies of cloud. The data can be
It is attractive to give a product and equipment condition where
unprotected and valuable asset in the cloud may be vulnerable to
the client and administrator of the framework can confide in all
hacker and/or snooping administrators.
the product and equipment segments of the framework.
Yet, with the evolution of cloud services and on line, services
[2]
and applications are moved to provider of a network
increasingly who perform some or all given services on the
behalf of the devices. In this case, the device user may be
concerned that who can access, or potentially worse, interface
with, the user data while it is uploaded to the service, while it is
processed by the server , while it is stored on the server or while
it is retrieved from the server. In simple words, when the data of
the user’s device leaves the domain of physical possession and
enters in environment of network which is away from the user,
there is a concern over malicious handling and security issues or
interface with the data with the third parties arises naturally.
Accordingly, it is desirable to increase the trust, privacy and
security for services of cloud and data handling in connection
with cloud services, or even within where the data of the user
leaves the region of user and enters in another or unknown
region.
According to the present era, there are so much threats for
data processing, for this purpose, there are some more methods
are defined to overcome this problem of secure data processing.
One of them is symmetric and asymmetric keys are used to
Fig: 1. Process for Secure Data Processing
This flow chart describes the flow that how can we make our suitable correspondence or potentially other handling capacities
data secure, 302 the method intercepts request for file systems as portrayed in this might be Substituted. precedent information
operations, 304 the method to analyze the attributes associated stockpiling frameworks incorporate, however are not restricted
with requested file system operation, 306 this will compare the to, circle drives (e.g., optical, attractive), tape drives, has,
attributes of previous method and security policy definition, 308 servers, customers, web servers, information warehousing,
this will check whether the condition is true or false, 310 the virtual capacity gadgets, Internet stockpiling gadgets, RAID
method perform appropriate operation of cryptography gadgets, or different gadgets having a proportional capacity or
(encryption or decryption) and file system (read or write) for capacity, regardless of whetherrecorded thus. Moreover, the
data application. creators perceive that recently created advances not presently
known might be substituted for the depicted parts and still not
[4] In spite of the fact that the present development has been leave from the extent of the present creation. All other portrayed
portrayed in this principally with reference to information things, including, however not constrained to has, controllers,
stockpiling frameworks, the gadgets what's more, procedures of servers, correspondences frameworks, and so on ought to
the present development might be connected to different sorts of additionally be considered in light of all accessible reciprocals.
frameworks having an information stockpiling part or having
information to be safely put away off site. In portraying favored
encapsulation of the present creation delineated in the
illustrations, explicit wording is utilized for clearness. Be that as
it may, the present innovation isn't planned to be constrained to
the particular wording so chose, and it is to be comprehended
that each explicit component incorporates every specialized
proportionate which work along these lines. For instance, while
depicting an information stockpiling framework, any gadget or
framework able to do putting away information, alongside

TABLE 1: SECURE DATA PROCESSING TECHNIQUES WITH THEIR ACCURACY RATE.

REFERENCE CLASSIFICATION ACCURACY % RECOMMENDED


TECHNIQUES DATA MINING TECHNIQUE

[1]Arasu, 2019 1. Data Encryption 90% Data Encryption


2. CIPHERBASE 85%
3. FPGA 80%

[2] El-Moussa, 2019 1. Encryption/Decryption 90% Encryption/Decryption


2. Cryptography 85%

[3] Auradkar, 2012 1. Encryption Techniques 90% Encryption Techniques

[4] Osaki, 2008 1. Remote Copy Remote Copy Configuration Information


Configuration Information (RCCI)
(RCCI) 85%

[5] Prihoda, 2004 1. Encryption 80% Cryptography


2. Cryptography 87%

[6] Marcinowski, 2018 1. API Concept 60% Secure Data Processing Methods
2. Secure Data Processing
Methods 90%

[7] Sion, 2019 1. Cipher text 80% Query Authentication


2. Query Authentication 85%

[8] Loftus, 2019 1. Secure Computation 80% Fully Homomorphic Encryption (FHE)
2. Fully Homomorphic
Encryption (FHE) 90%
III. METHODOLOGY [2] El-Moussa, Fadi, and Theo Dimitrakos. "Secure data
There are multiple methods have been discussed in storage." U.S. Patent Application 16/073,396, filed January
every research paper, all contains different ideas and 31, 2019.
methods to resolve the insecurity or drawback of data. [3] Auradkar, Rahul V., and Roy Peter D'souza. "Secure
Some of them talk about the insecurity between sender and and private backup storage and processing for trusted
receiver and some of give their theory on data backups. computing and data services." U.S. Patent 8,321,688, issued
If we combine the algorithms and techniques of all November 27, 2012.
papers and form a build a new technique to resolve the [4] Osaki, Nobuyuki, and Yuichi Yagawa. "Method and
problems in secure data processing so it will helpful in apparatus for encrypted remote copy for secure data backup
future or maybe it will be a unique as compared to other and restoration." U.S. Patent 7,383,462, issued June 3,
algorithms. 2008.
First of all we consider the data of sender and receiver, [5] Prihoda, Heinz, Volker Schmidt, Werner Striebel,
data backup, cloud data as one data. Now we make another Michael Becker, and Gregor De Lijzer. "Secure data
data storage where we store encrypted data which is based processing method." U.S. Patent 6,789,195, issued
on Key Generator mechanism through which the data can September 7, 2004.
be encrypted or decrypted. Now we apply a security plan [6] Marcinowski, Timothy Russell. "Systems and
which asks for the authentication of all end users (in case of methods of providing access to secure data." U.S. Patent
sender or receiver or could computing). And if the data is Application 10/121,020, filed November 6, 2018.
stored in any data storage so to access the data storage there [7] Sion, Radu, Sumeet Vijay Bajaj, and Jan Wojciech
must be a process in which the person who wants to access Kasiak. "Secure data management system and method."
the data must enter the key or password (generated by U.S. Patent Application 15/742,498, filed March 21, 2019.
mechanism) then he will be allowed to do manipulations in [8] Loftus, Jacob J., Michael Naehrig, Joppe Willem
data. There is also a big problem of third party data leakage Bos, and Kristin Estella Lauter. "Managed secure
(known as External Thread), to solve this problem we have computations on encrypted data." U.S. Patent Application
to put record of all data manipulations in the storage and if 10/211,975, filed February 19, 2019.
anyone wants to take data for any purpose so firstly he has
to take permission from the administrator or describe that
for what purpose he takes the data and for any leakage he
will be responsible in future. There will be more
advancement and more many other methods or solutions
will appear in future to resolve the insecurity of data but we
cannot overcome 100% the secure data processing.

IV. CONCLUSION AND FUTURE WORK


In this paper, each research paper uses different
techniques to secure data from every direction as much as
possible, each research paper contains particular method in
which they try to explain that what causes play role in
insecurity of data in whole time period from sender to
receiver or in data storage, then they try to resolve the
problem by their techniques.
All papers have different causes of data insecurity and
all defined different ways to resolve the but there are still
some drawbacks which can’t be permanently removed but
they can be overcome or reduced.

REFERENCES
[1] Arasu, Arvind, Kenneth Eguro, Manas Rajendra
Joglekar, Raghav Kaushik, Donald Kossmann, and
Ravishankar Ramamurthy. "Controlling secure processing
of confidential data in untrusted devices." U.S. Patent
Application 16/100,787, filed January 3, 2019.

Das könnte Ihnen auch gefallen