scispace - formally typeset
Proceedings ArticleDOI

Security and Encryption at Modern Databases

TLDR
Traditional ways of database encryption, modern concept of securing data and some possible concepts how to secure the data using encryption are described from high-level point of view to show their impact on security of entire system.
Abstract
Data is a most valuable part of most of nowadays system. A lot of hackers and criminals are trying to steal this data all the time. Due to that data should also be the best protected part of every company's systems. We would like our systems to be impenetrable, but that is not possible. If we want to protect the data, in case our system is compromised, we need to use encryption. This article describes traditional ways of database encryption, modern concept of securing data and some possible concepts how to secure the data using encryption. All of these approaches are discussed from high-level point of view to show their impact on security of entire system.

read more

Citations
More filters
Journal ArticleDOI

Access Control Design Practice and Solutions in Cloud-Native Architecture: A Systematic Mapping Study

TL;DR: In this paper , the authors present a systematic mapping study that extracts current approaches, categorizes access control patterns, and provides developers guidance to meet security principles in cloud-native architectures.
Book ChapterDOI

Privacy Preserving Authentication and Access Control Scheme in Data Markets

TL;DR: Wang et al. as discussed by the authors implemented privacy preserving and authentication and access control scheme in data markets, in which the raw data will be authenticated using authenticated data encryption technique, and this encrypted data will then be processed using data processing.
References
More filters
Proceedings ArticleDOI

Fully homomorphic encryption using ideal lattices

TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.

On data banks and privacy homomorphisms

TL;DR: It appears likely that there exist encryption functions which permit encrypted data to be operated on without preliminary decryption of the operands, for many sets of interesting operations.
Proceedings ArticleDOI

Searchable symmetric encryption: improved definitions and efficient constructions

TL;DR: In this paper, the authors proposed a searchable symmetric encryption (SSE) scheme for the multi-user setting, where queries to the server can be chosen adaptively during the execution of the search.
Posted Content

Intel SGX Explained.

TL;DR: In this article, the authors present a detailed and structured presentation of the publicly available information on SGX, a series of intelligent guesses about some important but undocumented aspects of SGX.
Proceedings ArticleDOI

VC3: Trustworthy Data Analytics in the Cloud Using SGX

TL;DR: VC3 is the first system that allows users to run distributed MapReduce computations in the cloud while keeping their code and data secret, and ensuring the correctness and completeness of their results.