A Comparison of Cloud Computing Database Security Algorithms