scispace - formally typeset
Search or ask a question
Topic

Database encryption

About: Database encryption is a research topic. Over the lifetime, 320 publications have been published within this topic receiving 10685 citations.


Papers
More filters
Journal Article
TL;DR: The results of the experimental shows that the encryption and decryption time of the proposed encryption algorithm REA has a very good performance compared to other encryption algorithms, and the correlation coefficient measure results depict that the proposed encryptor REA provides more security.
Abstract: provides strong security for databases. To develop a database encryption strategy, many factors must be taken into consideration. Organizations must balance between the requirement for security and the desire for excellent performance. In this paper a novel encryption algorithm is proposed "Reverse Encryption Algorithm (REA)". The proposed algorithm REA is simple and yet leads to a cipher. It has achieved security and is fast enough for most applications. REA algorithm is limiting the added time cost for encryption and decryption to not degrade the performance of a database system. Moreover, designing REA algorithm has enhanced security in data encryption. Besides, the secure and performance of the proposed encryption algorithm REA is evaluated and compare with the most common encryption algorithms. Experimental results show that the proposed encryption algorithm REA outperforms other encryption algorithms at performance and security in databases. Overall, the proposed encryption algorithm REA achieves balance between the security and the efficiency. This paper observes a method for evaluating the security and efficiency of the proposed encryption algorithm REA and compares with the most common encryption algorithms namely: DES, 3DES, RC2, AES and Blowfish. A comparison will be presented for those encryption algorithms for encryption and decryption times. Also, another comparison will be presented for the secure value (it is used to measure the information entropy). Furthermore, another measure of security is the correlation coefficient of encrypted fields with the proposed encryption algorithm REA. The results of the experimental shows that the encryption and decryption time of the proposed encryption algorithm REA has a very good performance compared to other encryption algorithms. The security measure (information entropy) results indicate that the proposed encryption algorithm REA and AES are more secure than DES, 3DES, RC2, and Blowfish. Also, the correlation coefficient measure results depict that the proposed encryption algorithm REA provides more security.

9 citations

Patent
20 Jul 2016
TL;DR: In this article, the equivalent encryption algorithm, the preserving encryption algorithm and the homomorphic encryption are specifically designed and introduced to classify and encrypt data in a database, the data is saved in a server database, and the hidden hazard that untrusted servers search for and leak confidential data is eliminated.
Abstract: The invention relates to a database encryption method. The equivalent encryption algorithm, the preserving encryption algorithm and the homomorphic encryption are specifically designed and introduced to classify and encrypt data in a database, the data is saved in a server database, the hidden hazard that untrusted servers search for and leak confidential data is eliminated, and data privacy is protected. The invention further relates to an encryption database query method based on the database encryption method. On the basis that the equivalent encryption algorithm, the preserving encryption algorithm and the homomorphic encryption are specifically designed and introduced to classify and encrypt data in the database, a processing method for directly executing query operation on ciphertext is provided, execution efficiency is improved, and communication and calculation cost is reduced for users.

9 citations

Patent
02 Jan 2013
TL;DR: In this paper, a field-level database encryption device is proposed for the field of information security, which comprises a user information storage unit, a database field encryption setting unit and a database access preprocessor.
Abstract: The invention is suitable for the field of information security and provides a field-level database encryption device, which comprises a user information storage unit, a database field encryption setting unit and a database access preprocessor, wherein the user information storage unit is used for storing database encryption symmetric keys which are encrypted through user public keys; the database field encryption setting unit is used for setting whether fields in a database are encrypted or not; and the database access preprocessor is used for conducting encryption conversion or decryption conversion to database access statements according to the decrypted database encryption symmetric keys and field encryption setting information in the database field encryption setting unit. By using the field-level database encryption device, a user can select different symmetric encryption algorithms supported by a database system according to demands for different encryption intensities, an application program does not need to conduct encryption or decryption operation to the database, all data encryption and decryption operations are completed by the database system, a full-text retrieval function of data items can be supported, and the original database access statements are not needed to be changed and can be directly and transparently used.

8 citations

Proceedings ArticleDOI
27 May 2011
TL;DR: This paper has discussed the application of database file in database security strategy and the related encryption technology, encryption algorithm and encryption method and data encryption technology.
Abstract: At present, the security issue of large amount of computer data storage, sensitive defense data theft and tamper-proof issue has attracted people's attention increasingly. Database system as the core component of computer information system, database files as information aggregation, and their safety will be the top priority of the information industry. The core of information security is the database security, and database encryption security is one of the core questions of database security, compared with other safety means, in comprehensive consideration of safety degree, price, use maintenance costs, upgrade cost etc., the performance-price ratio of database encryption is the highest security means. This paper on database security, has discussed the application of database file in database security strategy and the related encryption technology, encryption algorithm and encryption method and data encryption technology.

8 citations

Journal Article
TL;DR: A new searchable encryption protocol with a conjunctive keyword search based on a linked tree structure instead of public-key based techniques is proposed, which requires a remarkably small computational cost, particularly when applied to extremely large databases.
Abstract: Searchable encryption is a cryptographic protocol for searching a document in encrypted databases. A simple searchable encryption protocol, which is capable of using only one keyword at one time, is very limited and cannot satisfy demands of various applications. Thus, designing a searchable encryption with useful additional functions, for example, conjunctive keyword search, is one of the most important goals. There have been many attempts to construct a searchable encryption with conjunctive keyword search. However, most of the previously proposed protocols are based on public-key cryptosystems which require a large amount of computational cost. Moreover, the amount of computation in search procedure depends on the number of documents stored in the database. These previously proposed protocols are not suitable for extremely large data sets. In this paper, we propose a new searchable encryption protocol with a conjunctive keyword search based on a linked tree structure instead of public-key based techniques. The protocol requires a remarkably small computational cost, particularly when applied to extremely large databases. Actually, the amount of computation in search procedure depends on the number of documents matched to the query, instead of the size of the entire database.

8 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
70% related
Authentication
74.7K papers, 867.1K citations
68% related
Wireless sensor network
142K papers, 2.4M citations
67% related
Mobile computing
51.3K papers, 1M citations
67% related
Cryptography
37.3K papers, 854.5K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20214
202013
201923
201821
201718
201614