scispace - formally typeset
Search or ask a question

Showing papers on "Database encryption published in 2008"


Proceedings ArticleDOI
13 Jul 2008
TL;DR: A new paradigm for database encryption is proposed in which database encryption can be provided as a service to applications with seamless access to encrypted database, using such an encrypted data management model.
Abstract: Database encryption, as a mechanism for active security enhancement, is a crucial technique to protect data confidentiality. Two important objectives of designing an encrypted database are high security and performance. In this paper, a new paradigm for database encryption is proposed in which database encryption can be provided as a service to applications with seamless access to encrypted database. Using such an encrypted data management model, applications can concentrate on their core businesses and protect data privacy against both malicious outsiders and the untrusted database service users without need to know encryption details. We propose a novel database encryption architecture with flexible data granularity and safe key management for high security and performance of database access. Security dictionary is used to keep encryption metadata safe based on the threat model. Then the implementation details are given to show how to transparently store and query encrypted database fields with the proposed scheme.

24 citations


Patent
11 Jun 2008
TL;DR: A database encryption and query method keeping an order within a bucket partially, which encrypts and stores numeric data in a database, includes calculating a relative value of a plaintext within the bucket to which the plaintext is allocated as discussed by the authors.
Abstract: A database encryption and query method keeping an order within a bucket partially, which encrypts and stores numeric data in a database, includes calculating a relative value of a plaintext within a bucket to which the plaintext is allocated; generating a first key value by producing a random number within the bucket; generating a second key value for defining a function having a bucket range of the bucket as an input; and changing the relative value based on the first and the second key value with keeping an order of the relative value partially to store the changed relative value. The first key value may be a value of separating order informations on the relative value. Further, the second key value may be a resultant value obtained by applying a mod 2 operation to the bucket size of the bucket.

5 citations


Proceedings ArticleDOI
21 Mar 2008
TL;DR: The bucket ID transformation is proposed that supports range queries without exposing the order of plaintext and is more powerful than the previous order-preserving methods and is expected to handle data more efficiently than other methods.
Abstract: Encryption is a well established technology for protecting sensitive data. Unfortunately, the integration of existing encryption techniques with database systems causes undesirable performance degradation. We propose the bucket ID transformation that supports range queries without exposing the order of plaintext. The Bucket ID Transformation is performed by modulo arithmetic or pseudo-random number generation. This method is more powerful than the previous order-preserving methods and is expected to handle data more efficiently than other methods. Experiment results show that our scheme outperforms other method in encryption and query speed.

4 citations


Patent
04 Jun 2008
TL;DR: In this paper, the mating system of a mobile communication terminal and a mating system thereof is described, where a smart card used as a card or electronic label or any other carrier functions for information storage are provided on the mobile communication terminals.
Abstract: The invention relates to a mobile communication terminal and a mating system thereof, which relates to the electronic technical field. A smart card used as a card or electronic label or any other carrier functions for information storage are provided on the mobile communication terminal and the mating system of the mobile communication terminal is provided with a corresponding card reading device or card or any other information exchange devices. The information is exchanged between the mobile communication terminal and the mating system and between the mobile communication terminal and any other systems in the encryption or non-encryption mode; the encryption mode can be one-time pad or dynamic password or database encryption mode or any other encryption modes. The information exchange device and the mating system thereof are more convenient and safer.

3 citations


Journal Article
TL;DR: The personal understanding of layer,principle, arithmetic and key management on the security of DBMS is introduced, and the practice of designing encryption system with the purpose of applying improving security level ofDBMS is shown.
Abstract: For sharing the experience,the personal understanding of layer,principle,arithmetic and key management on the security of DBMS is introduced,how to design it is researched,and a concrete design model is given,and function and implementations of each module are discussed.Lastly,this system influence on database is provided,then shows the practice a designing encryption system with the purpose of applying improving security level of DBMS.

3 citations


Proceedings Article
02 May 2008
TL;DR: The result has shown that the algorithm is working properly, where the decryption process produced similar output as the original plaintext and it ran through specified configuration and evaluated thoroughly with respect to database approach and algorithm technique to prove the design.
Abstract: Databases are vulnerable to attack from internal and external threats. Sensitive data stored in database appeared as target to attackers. Adding the database encryption, valuable information in database becomes more secure since the encrypted data ensure the confidentiality of the data. A new affine block cipher named Enhanced Affine Block Cipher technique is proposed for database encryption. This algorithm improves the weakness of the original affine cipher. The new encoding schema and modification Cipher Block Chaining (CBC) mode of operation for block cipher is designed for the new algorithm. The result has shown that the algorithm is working properly, where the decryption process produced similar output as the original plaintext and it ran through specified configuration and evaluated thoroughly with respect to database approach and algorithm technique to prove the design.

2 citations


Patent
10 Dec 2008
TL;DR: A database encryption method based on Chinese residue theorem is provided in this paper, which comprises the following procedures: (1) Designating and storing a global key in the system table of the database; (2) Formulating and storing the table key and a key for each field for each piece of record in storing the data and completing the encrypted storage of data by combining the global key, table key, and the field key as well as transferring the encryption algorithm.
Abstract: A database encryption method based on Chinese residue theorem is provided, which comprises the following procedures: (1) Designating and storing a global key in the system table of the database; (2) Formulating and storing a table key and a key for each field in the system table of the database; (3) Generating a random record key for each piece of record in storing the data and completing the encrypted storage of data by combining the global key, the table key and the field key as well as transferring the encryption algorithm. Therefore, the invention provides a database encryption method that is based on Chinese residue theorem and can effectively enhance the deciphering efficiency.

1 citations


Journal Article
TL;DR: This work brings forward one kind of mixed encryption algorithm that can effectively resolve the problems such as encryption and key transmission, and finds that the algorithm has high secrecy intensity and the algorithm's operation efficiency matches the symmetry algorithm.
Abstract: To solve the problem,how to protect the security of Database system and the security,integrality and validity of Data,by researching both of the algorithm,asymmetric algorithm(RSA) and symmetric algorithm(Triple_DES) of database encryption,we bring forward one kind of mixed encryption algorithm.Furthermore,by testing this algorithm,we find that the algorithm can effectively resolve the problems such as encryption and key transmission,that the algorithm has high secrecy intensity and the algorithm's operation efficiency matches the symmetry algorithm.

1 citations


Journal Article
TL;DR: The safe threat, the database safe commonly used technology, the data security transmission commonly used agreement and the database security engineering research tendency are elaborated.

1 citations


Journal Article
TL;DR: An efficient query method is proposed to solve the problem of database performance in terms of computation time and the limited SQL query to protect data in the database.
Abstract: Recently, protection of personal information is getting more important. Many countries have legislated about the protection of personal information. Now, the protection of relevant personal information is required not for a simple image of enterprises but law obligation. Most databases in enterprises used to store customers' names, addresses and credit card numbers with no exceptions. The personal information about a person is sensitive, and this asset is strategic. Therefore, most enterprises make an effort to preserve personal information safely. If someone, however, hacks password information of DBMS manager, no one can trust this system. Therefore, encryption is required based in order to protect data in the database. Because of database encryption, however, it is the problem of database performance in terms of computation time and the limited SQL query. Thus, we proposed an efficient query method to solve the problem of encrypted data in this paper

1 citations