scispace - formally typeset
Search or ask a question
Topic

Database encryption

About: Database encryption is a research topic. Over the lifetime, 320 publications have been published within this topic receiving 10685 citations.


Papers
More filters
Proceedings ArticleDOI
13 Jul 2015
TL;DR: This paper makes an in depth review of various database encryption techniques and compare them on basis of their merits and demerits.
Abstract: Security of Data is the most important task in today's world. Over the years various encryption schemes have been developed in order to protect the database from various attacks by the intruders. This paper discuses the importance of database encryption and makes an in depth review of various database encryption techniques and compare them on basis of their merits and demerits.

14 citations

01 Jan 2004
TL;DR: This research presents a probabilistic procedure that can be used to estimate the strength of the encryption used in a particular system, as well as investigate its effectiveness and recommend methods to enhance the security of the system.
Abstract: Encryption is an important method for implementing confidentiality in information systems. Unfortunately applying encryption effectively can be quite complicated. Encryption, as well as other secur ...

14 citations

Journal ArticleDOI
TL;DR: This paper presents the first generic PCE in the standard model using smooth projective hash function (SPHF) and proves its s-priv1-cca security, which is independent of current unlink security, without any pairing operation.

13 citations

Patent
William C. Freeman1, Richard V. Hom1
30 Jul 2013
TL;DR: In this paper, the authors present a method, system, and computer program product for implementing user specific encryption in a database system, where a computer receives a query statement including a user specific key and data, the data including data needing encryption and non-encrypted data.
Abstract: Embodiments of the present invention disclose a method, system, and computer program product for implementing user specific encryption in a database system. A computer receives a query statement including a user specific key and data, the data including data needing encryption and non-encrypted data. The computer encrypts the data needing encryption using the user specific key. The computer inserts both the encrypted data and the non-encrypted data into a table row in a database. The computer creates a hash of the user specific key, and stores the hash of the user specific key in the table row with the data.

12 citations

Journal ArticleDOI
TL;DR: An enhanced ant-colony algorithm (named BACO) is proposed which aims to reduce the required processing efforts in multi-join query optimization problem alongside with reducing the total false-positive results generated in Bucket-based encrypted databases.
Abstract: One of the organizations' main concerns is to protect sensitive data in database systems, especially the ones outsourced to untrusted service providers. An effective solution for this issue is to employ database encryption methods. Among different encryption approaches, Bucket-based method has the advantage of balancing security and performance of database operations. However, generating false-positive results in executing queries is the main drawback of this method. On the other hand, multi-join queries are one of the most critical operations executed on these stored sensitive data. Hence, acceptable processing and response time in executing multi-join queries is required. In this paper, we propose an enhanced ant-colony algorithm (named BACO) which aims to reduce the required processing efforts in multi-join query optimization problem alongside with reducing the total false-positive results generated in Bucket-based encrypted databases. Our enhanced solution approach leads to much less response time without losing solutions' quality. Experimental results denote that our proposed solution can yield 75% decrease in multi-join queries processing efforts and 74% decrease in the total amount of false-positive results in a faster manner and with better performance than previous methods.

12 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
70% related
Authentication
74.7K papers, 867.1K citations
68% related
Wireless sensor network
142K papers, 2.4M citations
67% related
Mobile computing
51.3K papers, 1M citations
67% related
Cryptography
37.3K papers, 854.5K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20214
202013
201923
201821
201718
201614