scispace - formally typeset
Search or ask a question
Topic

Database encryption

About: Database encryption is a research topic. Over the lifetime, 320 publications have been published within this topic receiving 10685 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper introduces an efficient algorithm to encrypt the credit card number without changing the format and type as well as drawingbacks in database encryption.
Abstract: The more highly used Internet world contains many sensitive information. Encryption is a process to secure information. An encrypted data requires more storage space for storing. It also needs many changes in queries and application programs. This paper we introduce an efficient algorithm to encrypt the credit card number without changing the format and type. Encryption is a process of converting the plaintext (clear text) to unreadable cipher text. Decryption is a reverse process in which the cipher text is converted into plaintext. We store and transmit much sensitive information through the internet. Encrypting data at flight means encryption is done in the sender side and decryption is done in the receiver side. Encrypting data at rest is used to protect confidential data stored on host from the privileged users. There are many database security policies like authentication, access rights, digital signature etc. But 45% of the attackers are insiders. The existing security techniques are not enough for protecting the data. So we need powerful encryption algorithm. Database encryption is the process of converting the plaintext in the database to unintelligible cipher text format. Database encryption is implemented using strong encryption such as AES, RSA or SHA256. II. DRAWBACKS IN DATABASE ENCRYPTION  Encrypted text requires more storage space than clear text data  Inserting encrypted text and decrypted queries are slower than the inserting plaintext.  SQL statements are slow down due to encryption.  Record searching is more complex in encrypted database.  Queries will be changed to handle the encrypted data.  An existing application programs are also changed to handle the encrypted database.  Cannot maintain intellectual property of the database such as index.

7 citations

Book ChapterDOI
01 Jan 2017
TL;DR: A model with two techniques that’s Data Obfuscation for server side to secure database details from outsiders and Encryption, authentication at client side is presented, implemented and testing of model towards performance and security are discussed.
Abstract: Now a day’s a user of internet wants a freedom to access their valuable data from anywhere any time. Here, Cloud computing comes with its numerous services where user can have get anything like system power, Storage, applications and many more with just less charges. Users of Cloud mainly use it for various purpose and currently storing the data on Cloud is the very important scenario to be consider. With lots of advantage to store data on cloud and free self from burden of maintain record other side, it is very important for user that the data must be secure even it is on rest or in transition. The researcher of Cloud working on their own to deal with this issue but in most of the research proposal consider client side security related issues i.e. Integrity checking, Authentication, Versioning etc. At other side some Research model gives more importance to security data related issue of Cloud service provider i.e. Database encryption, Security based on Metadata, Data Obfuscation etc. But both of above fundamental not make strong impact for Cloud users and Service providers. To have achieve best of them here in this paper we presented a model with two techniques that’s Data Obfuscation for server side to secure database details from outsiders and Encryption, authentication at client side. In this paper we have discussed implemented and testing of model towards performance and security. The proposed model ensures both users and service providers to bind trust on each other.

7 citations

Book ChapterDOI
30 Aug 2013
TL;DR: It is proved by reduction that breaking a cryptosystem by a query-enhanced adversary is at least as difficult as breaking the cryptos system by a common adversary.
Abstract: Encrypting data at rest has been one of the most common ways to protect the database data against honest but curious adversaries. In the literature there are more than a dozen mechanisms proposed on how to encrypt data to achieve different levels of confidentiality. However, a database system is more than just data. An inseparable aspect of a database system is its interaction with the users through queries. Yet, a query-enhanced adversary model that captures the security of user interactions with the encrypted database is missing. In this paper, we will first revisit a few well-known adversary models on the data encryption schemes. Also, to model the query-enhanced adversaries we additionally need new tools, which will be formally defined. Eventually, this paper introduces query-enhanced adversary models which additionally have access to the query logs or interact with the database in different ways. We will prove by reduction that breaking a cryptosystem by a query-enhanced adversary is at least as difficult as breaking the cryptosystem by a common adversary.

7 citations

Patent
25 Jun 2009
TL;DR: In this article, a seamless implementation method in a column unit cryptographic task of database for removing the loss of a user due to business stoppage is provided to supply a service without interruption of database service during a database encryption construction working time.
Abstract: A seamless implementation method in a column unit cryptographic task of database for removing the loss of a user due to the business stoppage is provided to supply a service without interruption of database service during a database encryption construction working time A copied table and an SQL Log table for ciphering an original copy table are generated during a service(S100) After the copy and encryption of the original copy tabular data are finished in the copy table, the changed contents recorded in the SQL Log table are encrypted The change is included in the copy table(S200) After the content of the SQL Log is reflected, the switching of the original copy table and copy table is performed(S300)

7 citations

Book ChapterDOI
20 Sep 2016
TL;DR: A new privacy-preserving Top-k query processing algorithm that protects the user query from the cloud and conceals data access patterns during query processing and provides good scalability without any information leakage.
Abstract: Cloud computing has emerged as a new platform for storing and managing databases. As a result, a database outsourcing paradigm has gained much interests. To prevent the contents of outsourced databases from being revealed to cloud computing, databases must be encrypted before being outsourced to the cloud. Therefore, various Top-k query processing techniques have been proposed for encrypted databases. However, there is no existing work that can not only hide data access patterns, but also preserve the privacy of user query. To solve the problems, in this paper, we propose a new privacy-preserving Top-k query processing algorithm. Our algorithm protects the user query from the cloud and conceals data access patterns during query processing. A performance analysis shows that the proposed scheme provide good scalability without any information leakage.

7 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
70% related
Authentication
74.7K papers, 867.1K citations
68% related
Wireless sensor network
142K papers, 2.4M citations
67% related
Mobile computing
51.3K papers, 1M citations
67% related
Cryptography
37.3K papers, 854.5K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20214
202013
201923
201821
201718
201614