Abstract
It was analyzed the information of databases, encryption algorithms, and information security that are the main components of a Smart City. The problem is the lack of security of public or secret data that is stored in a repository, where there is access to the citizen, local government, and central government. The objective is to define a security prototype and adopt a cryptographic algorithm to mitigate the risks of the database in the management of a Smart City. It was used the deductive method and exploratory research to analyze the information of the reference articles. It turned out a general prototype of security; an algorithm to implement a database for Smart City; an algorithm of data protection expressed in flowcharts. It was concluded that information protected with an encryption algorithm, is a support to be more efficient, reduce costs, reduce the environmental footprint and improve the management of a Smart City.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nagar, S., Alshamma, S.: High speed implementation of RSA algorithm with modified keys exchange. In: 2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), pp. 639–642 (2012). https://doi.org/10.1109/setit.2012.6481987
Hwang, G., Fu, S.: Proof of violation for trust and accountability of cloud database systems. In: 2016 16th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp. 425–433 (2016). https://doi.org/10.1109/ccgrid.2016.27
Zhu, X., Li, J., Liu, Z., Yang, F.: A joint grid segmentation based affinity propagation clustering method for big data. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 144–151 (2016). https://doi.org/10.1109/hpcc-smartcity-dss.2016.0172
Jasim, K., Al-Shaikhli, I.: Mobile technology generations and cryptographic algorithms: analysis study. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT), pp. 50–55 (2015). https://doi.org/10.1109/acsat.2015.26
Biswas, K., Muthukkumarasamy, V.: Securing smart cities using blockchain technology. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), p. 1 (2016). Biswas, K., Muthukkumarasamy, V.: Securing smart cities using blockchain technology. In: Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science Systems; HPCC/SmartCity/DSS 2016, pp. 1392–1393 (2017). https://doi.org/10.1109/hpcc-smartcity-dss.2016.0198; https://doi.org/10.1109/hpcc-smartcity-dss.2016.0198
Dubey, G., Khurana, V., Sachdeva, S.: Implementing security technique on generic database. In: 2015 Eighth International Conference on Contemporary Computing (IC3), pp. 370–376 (2015). https://doi.org/10.1109/ic3.2015.7346709
Wenning, H., Hongjun, Z., Dengchao, H., Gang, C., Shuining, Z.: Design and implementation of database encrypting middleware. In: 2012 International Conference on Computer Science and Service System, pp. 1134–1137 (2012). https://doi.org/10.1109/csss.2012.287
Boicea, A., Radulescu, F., Truica, C., Costea, C.: Database encryption using asymmetric keys: a case study. In: 2017 21st International Conference on Control Systems and Computer Science (CSCS), pp. 317–323 (2017). https://doi.org/10.1109/cscs.2017.50
Cui, S., Asghar, M., Galbraith, S., Russello, G.: P-McDb: privacy-preserving search using multi-cloud encrypted databases. In: 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), pp. 144–151 (2017). https://doi.org/10.1109/cloud.2017.50
Horio, K., Kawashima, H., Tatebe, O.: Efficient parallel summation on encrypted database system. In: 2017 IEEE International Conference on Big Data and Smart Compu-ting (BigComp), pp. 178–185 (2017). https://doi.org/10.1109/bigcomp.2017.7881735
Bajaj, S., Sion, R.: TrustedDB: a trusted hardware-based database with privacy and data confidentiality. IEEE Trans. Knowl. Data Eng. 26(3), 752–765 (2014). https://doi.org/10.1109/tkde.2013.38
Chandrashekar, P., Dara, S., Muralidhara, V.: Efficient format preserving encrypted databases. In: 2015 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), pp. 1–4 (2015). https://doi.org/10.1109/conecct.2015.7383885
Chaudhury, P., Dhang, S., Roy, M., et al.: ACAFP: asymmetric key based cryptographic algorithm using four prime numbers to secure message communication. A review on RSA algorithm. In: 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), pp. 332–337 (2017). https://doi.org/10.1109/ie-mecon.2017.8079618
Murali, G., Sivaram Prasad, R.: Comparison of cryptographic algorithms in cloud and local environment using quantum cryptography. In: International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017) Comparison, pp. 55–69 (2017). https://doi.org/10.1109/icecds.2017.8390165
Inampudi, G., Shyamala, K., Ramachandram, S.: Parallel implementation of cryptographic algorithm: AES using OpenCL on GPUs. In: 2018 2nd International Conference on Inventive Systems and Control (ICISC), pp. 984–988 (2018). https://doi.org/10.1109/icisc.2018.8398949
Singh, D., Nand, P., Astya, R., Dixit, P.: Improved DSA cryptographic protocol and its comparative study with RSA protocol. In: International Conference on Computing, Communication & Automation, pp. 755–759 (2015). https://doi.org/10.1109/ccaa.2015.7148511
Aldoiu, S., Tapus, N.: Innovative infrastructure for SmartCity/SmartEnvironment applications. In: 2018 5th International Conference on Control, Decision and Information Technologies (CoDIT’18), pp. 767–772 (2018). https://doi.org/10.1109/codit.2018.8394822
IESE Cities in Motion Índice 2014. IESE Business School, Centro de Globalización y Estrategia, Barcelona, España (2014)
IESE Cities in Motion Index: Barcelona. Center for Globalization and Strategy, España (2015)
Engler, A., Tange, C., Frank-Bertoncelj, M., Gay, R., Gay, S., Ospelt, C.: Regulation and function of SIRT1 in rheumatoid arthritis synovial fibroblasts. J. Mol. Med. 94(2), 1–74 (2016). https://doi.org/10.1007/s00109-015-1332-9
Berrone, P., Ricart, J., Carrasco, C., Duch, A.: Cátedra Schneider Electric de Sostenibilidad y Estrategia. IESE Cities Motion Index 2017, 11–78 (2018). https://doi.org/10.15581/018.st-471
Berrone, P., Ricart, J., Carrasco, C., Duch, A.: Cátedra Schneider Electric de Sostenibilidad y Estrategia. IESE Cities Motion Index 2018 (2018). https://doi.org/10.15581/018.st-471
Barnett, T.: Cisco Global Cloud Index 2015–2020, p. 45. Cisco (2016)
Acknowledgements
The authors thank to Universidad Politécnica Salesiana del Ecuador, to the research group of the Guayaquil Headquarters “Computing, Security and Information Technology for a Globalized World” (CSITGW) created according to resolution 142-06-2017-07-19 and Secretaría de Educación Superior Ciencia, Tecnología e Innovación (Senescyt).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Toapanta, S.M.T., Quimi, F.G.M., Salazar, R.F.R., Gallegos, L.E.M. (2020). Cryptographic Algorithms to Mitigate the Risks of Database in the Management of a Smart City. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Fourth International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, vol 1027. Springer, Singapore. https://doi.org/10.1007/978-981-32-9343-4_36
Download citation
DOI: https://doi.org/10.1007/978-981-32-9343-4_36
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-32-9342-7
Online ISBN: 978-981-32-9343-4
eBook Packages: EngineeringEngineering (R0)