Topic
Database encryption
About: Database encryption is a research topic. Over the lifetime, 320 publications have been published within this topic receiving 10685 citations.
Papers published on a yearly basis
Papers
More filters
••
13 Jul 2015TL;DR: This paper makes an in depth review of various database encryption techniques and compare them on basis of their merits and demerits.
Abstract: Security of Data is the most important task in today's world. Over the years various encryption schemes have been developed in order to protect the database from various attacks by the intruders. This paper discuses the importance of database encryption and makes an in depth review of various database encryption techniques and compare them on basis of their merits and demerits.
14 citations
01 Jan 2004
TL;DR: This research presents a probabilistic procedure that can be used to estimate the strength of the encryption used in a particular system, as well as investigate its effectiveness and recommend methods to enhance the security of the system.
Abstract: Encryption is an important method for implementing confidentiality in information systems. Unfortunately applying encryption effectively can be quite complicated. Encryption, as well as other secur ...
14 citations
••
TL;DR: This paper presents the first generic PCE in the standard model using smooth projective hash function (SPHF) and proves its s-priv1-cca security, which is independent of current unlink security, without any pairing operation.
13 citations
•
IBM1
TL;DR: In this paper, the authors present a method, system, and computer program product for implementing user specific encryption in a database system, where a computer receives a query statement including a user specific key and data, the data including data needing encryption and non-encrypted data.
Abstract: Embodiments of the present invention disclose a method, system, and computer program product for implementing user specific encryption in a database system. A computer receives a query statement including a user specific key and data, the data including data needing encryption and non-encrypted data. The computer encrypts the data needing encryption using the user specific key. The computer inserts both the encrypted data and the non-encrypted data into a table row in a database. The computer creates a hash of the user specific key, and stores the hash of the user specific key in the table row with the data.
12 citations
••
TL;DR: An enhanced ant-colony algorithm (named BACO) is proposed which aims to reduce the required processing efforts in multi-join query optimization problem alongside with reducing the total false-positive results generated in Bucket-based encrypted databases.
Abstract: One of the organizations' main concerns is to protect sensitive data in database systems, especially the ones outsourced to untrusted service providers. An effective solution for this issue is to employ database encryption methods. Among different encryption approaches, Bucket-based method has the advantage of balancing security and performance of database operations. However, generating false-positive results in executing queries is the main drawback of this method. On the other hand, multi-join queries are one of the most critical operations executed on these stored sensitive data. Hence, acceptable processing and response time in executing multi-join queries is required. In this paper, we propose an enhanced ant-colony algorithm (named BACO) which aims to reduce the required processing efforts in multi-join query optimization problem alongside with reducing the total false-positive results generated in Bucket-based encrypted databases. Our enhanced solution approach leads to much less response time without losing solutions' quality. Experimental results denote that our proposed solution can yield 75% decrease in multi-join queries processing efforts and 74% decrease in the total amount of false-positive results in a faster manner and with better performance than previous methods.
12 citations