scispace - formally typeset
Journal ArticleDOI

Implementing a database encryption solution, design and implementation issues

TLDR
Analysis and comparison of five traditional architectures for database encryption show that existing architectures may provide a high level of security, but have a significant impact on performance and impose major changes to the application layer, and a sixth novel architecture is suggested that outperforms the others.
About
This article is published in Computers & Security.The article was published on 2014-07-01. It has received 29 citations till now. The article focuses on the topics: Database encryption & Database tuning.

read more

Citations
More filters
Journal ArticleDOI

openPDS: Protecting the Privacy of Metadata through SafeAnswers

TL;DR: OpenPDS as mentioned in this paper is a personal metadata management framework that allows individuals to collect, store, and give fine-grained access to their metadata to third parties and SafeAnswers, a new and practical way of protecting the privacy of metadata at an individual level, turns a hard anonymization problem into a more tractable security one.
Journal Article

A framework for efficient storage security in RDBMS

TL;DR: This work analyzes issues in storage security and discusses a number of trade-offs between security and efficiency, and proposes a new secure storage model and a key management architecture which enable efficient cryptographic operations while maintaining a very high level of security.
Journal ArticleDOI

Integrity and Confidentiality in Cloud Outsourced Data

TL;DR: This study presents an overview of different cryptographic algorithms, based on different schemes in the outsourced database security and query authentication, and proposes a new architecture that achieves the confidentiality and integrity of query results of the outsourcing database.
Journal ArticleDOI

Design and Analysis of a Relational Database for Behavioral Experiments Data Processing

TL;DR: A comparative analysis between different approaches to experimental data storage and processing shows that the dynamic arrays and the local data sets approaches iterated much faster across all data records than the remote database approach.
Journal ArticleDOI

A survey on secure communication techniques for 5G wireless heterogeneous networks

Ajay Kakkar
- 01 Oct 2020 - 
TL;DR: This paper addresses encryption schemes with the focus on the challenges faced such as side channel and ciphertext attacks, inherent key generation, sharing and distribution, key escrow, analysis of various overheads, and potential techniques, and solutions to address such challenges by leveraging 5G network devices.
References
More filters
Proceedings ArticleDOI

Practical techniques for searches on encrypted data

TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Book

Database Management Systems

TL;DR: New to this edition are the early coverage of the ER model, new chapters on Internet databases, data mining, and spatial databases, and a new supplement on practical SQL assignments (with solutions for instructors' use).
Proceedings ArticleDOI

Executing SQL over encrypted data in the database-service-provider model

TL;DR: The paper explores an algebraic framework to split the query to minimize the computation at the client site, and explores techniques to execute SQL queries over encrypted data.
Proceedings ArticleDOI

Order preserving encryption for numeric data

TL;DR: This work presents an order-preserving encryption scheme for numeric data that allows any comparison operation to be directly applied on encrypted data, and is robust against estimation of the true value in such environments.
Proceedings ArticleDOI

Providing database as a service

TL;DR: A novel paradigm for data management in which a third party service provider hosts "database as a service", providing its customers with seamless mechanisms to create, store, and access their databases at the host site is explored.
Related Papers (5)