Skip to main content

Cryptographic Algorithms to Mitigate the Risks of Database in the Management of a Smart City

  • Conference paper
  • First Online:
Fourth International Congress on Information and Communication Technology

Abstract

It was analyzed the information of databases, encryption algorithms, and information security that are the main components of a Smart City. The problem is the lack of security of public or secret data that is stored in a repository, where there is access to the citizen, local government, and central government. The objective is to define a security prototype and adopt a cryptographic algorithm to mitigate the risks of the database in the management of a Smart City. It was used the deductive method and exploratory research to analyze the information of the reference articles. It turned out a general prototype of security; an algorithm to implement a database for Smart City; an algorithm of data protection expressed in flowcharts. It was concluded that information protected with an encryption algorithm, is a support to be more efficient, reduce costs, reduce the environmental footprint and improve the management of a Smart City.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nagar, S., Alshamma, S.: High speed implementation of RSA algorithm with modified keys exchange. In: 2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), pp. 639–642 (2012). https://doi.org/10.1109/setit.2012.6481987

  2. Hwang, G., Fu, S.: Proof of violation for trust and accountability of cloud database systems. In: 2016 16th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp. 425–433 (2016). https://doi.org/10.1109/ccgrid.2016.27

  3. Zhu, X., Li, J., Liu, Z., Yang, F.: A joint grid segmentation based affinity propagation clustering method for big data. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 144–151 (2016). https://doi.org/10.1109/hpcc-smartcity-dss.2016.0172

  4. Jasim, K., Al-Shaikhli, I.: Mobile technology generations and cryptographic algorithms: analysis study. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT), pp. 50–55 (2015). https://doi.org/10.1109/acsat.2015.26

  5. Biswas, K., Muthukkumarasamy, V.: Securing smart cities using blockchain technology. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), p. 1 (2016). Biswas, K., Muthukkumarasamy, V.: Securing smart cities using blockchain technology. In: Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science Systems; HPCC/SmartCity/DSS 2016, pp. 1392–1393 (2017). https://doi.org/10.1109/hpcc-smartcity-dss.2016.0198; https://doi.org/10.1109/hpcc-smartcity-dss.2016.0198

  6. Dubey, G., Khurana, V., Sachdeva, S.: Implementing security technique on generic database. In: 2015 Eighth International Conference on Contemporary Computing (IC3), pp. 370–376 (2015). https://doi.org/10.1109/ic3.2015.7346709

  7. Wenning, H., Hongjun, Z., Dengchao, H., Gang, C., Shuining, Z.: Design and implementation of database encrypting middleware. In: 2012 International Conference on Computer Science and Service System, pp. 1134–1137 (2012). https://doi.org/10.1109/csss.2012.287

  8. Boicea, A., Radulescu, F., Truica, C., Costea, C.: Database encryption using asymmetric keys: a case study. In: 2017 21st International Conference on Control Systems and Computer Science (CSCS), pp. 317–323 (2017). https://doi.org/10.1109/cscs.2017.50

  9. Cui, S., Asghar, M., Galbraith, S., Russello, G.: P-McDb: privacy-preserving search using multi-cloud encrypted databases. In: 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), pp. 144–151 (2017). https://doi.org/10.1109/cloud.2017.50

  10. Horio, K., Kawashima, H., Tatebe, O.: Efficient parallel summation on encrypted database system. In: 2017 IEEE International Conference on Big Data and Smart Compu-ting (BigComp), pp. 178–185 (2017). https://doi.org/10.1109/bigcomp.2017.7881735

  11. Bajaj, S., Sion, R.: TrustedDB: a trusted hardware-based database with privacy and data confidentiality. IEEE Trans. Knowl. Data Eng. 26(3), 752–765 (2014). https://doi.org/10.1109/tkde.2013.38

    Article  Google Scholar 

  12. Chandrashekar, P., Dara, S., Muralidhara, V.: Efficient format preserving encrypted databases. In: 2015 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), pp. 1–4 (2015). https://doi.org/10.1109/conecct.2015.7383885

  13. Chaudhury, P., Dhang, S., Roy, M., et al.: ACAFP: asymmetric key based cryptographic algorithm using four prime numbers to secure message communication. A review on RSA algorithm. In: 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), pp. 332–337 (2017). https://doi.org/10.1109/ie-mecon.2017.8079618

  14. Murali, G., Sivaram Prasad, R.: Comparison of cryptographic algorithms in cloud and local environment using quantum cryptography. In: International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017) Comparison, pp. 55–69 (2017). https://doi.org/10.1109/icecds.2017.8390165

  15. Inampudi, G., Shyamala, K., Ramachandram, S.: Parallel implementation of cryptographic algorithm: AES using OpenCL on GPUs. In: 2018 2nd International Conference on Inventive Systems and Control (ICISC), pp. 984–988 (2018). https://doi.org/10.1109/icisc.2018.8398949

  16. Singh, D., Nand, P., Astya, R., Dixit, P.: Improved DSA cryptographic protocol and its comparative study with RSA protocol. In: International Conference on Computing, Communication & Automation, pp. 755–759 (2015). https://doi.org/10.1109/ccaa.2015.7148511

  17. Aldoiu, S., Tapus, N.: Innovative infrastructure for SmartCity/SmartEnvironment applications. In: 2018 5th International Conference on Control, Decision and Information Technologies (CoDIT’18), pp. 767–772 (2018). https://doi.org/10.1109/codit.2018.8394822

  18. IESE Cities in Motion Índice 2014. IESE Business School, Centro de Globalización y Estrategia, Barcelona, España (2014)

    Google Scholar 

  19. IESE Cities in Motion Index: Barcelona. Center for Globalization and Strategy, España (2015)

    Google Scholar 

  20. Engler, A., Tange, C., Frank-Bertoncelj, M., Gay, R., Gay, S., Ospelt, C.: Regulation and function of SIRT1 in rheumatoid arthritis synovial fibroblasts. J. Mol. Med. 94(2), 1–74 (2016). https://doi.org/10.1007/s00109-015-1332-9

    Article  Google Scholar 

  21. Berrone, P., Ricart, J., Carrasco, C., Duch, A.: Cátedra Schneider Electric de Sostenibilidad y Estrategia. IESE Cities Motion Index 2017, 11–78 (2018). https://doi.org/10.15581/018.st-471

    Article  Google Scholar 

  22. Berrone, P., Ricart, J., Carrasco, C., Duch, A.: Cátedra Schneider Electric de Sostenibilidad y Estrategia. IESE Cities Motion Index 2018 (2018). https://doi.org/10.15581/018.st-471

  23. Barnett, T.: Cisco Global Cloud Index 2015–2020, p. 45. Cisco (2016)

    Google Scholar 

Download references

Acknowledgements

The authors thank to Universidad Politécnica Salesiana del Ecuador, to the research group of the Guayaquil Headquarters “Computing, Security and Information Technology for a Globalized World” (CSITGW) created according to resolution 142-06-2017-07-19 and Secretaría de Educación Superior Ciencia, Tecnología e Innovación (Senescyt).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Segundo Moisés Toapanta Toapanta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Toapanta, S.M.T., Quimi, F.G.M., Salazar, R.F.R., Gallegos, L.E.M. (2020). Cryptographic Algorithms to Mitigate the Risks of Database in the Management of a Smart City. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Fourth International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, vol 1027. Springer, Singapore. https://doi.org/10.1007/978-981-32-9343-4_36

Download citation

  • DOI: https://doi.org/10.1007/978-981-32-9343-4_36

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-32-9342-7

  • Online ISBN: 978-981-32-9343-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics