Topic
Database encryption
About: Database encryption is a research topic. Over the lifetime, 320 publications have been published within this topic receiving 10685 citations.
Papers published on a yearly basis
Papers
More filters
01 Jan 2007
TL;DR: A new affine block cipher named Enhanced Affine Block Cipher technique is proposed for database encryption, which improves the weakness of the original affine cipher.
Abstract: Information inside the database is shared by multiple parties such as internal users, partners, contractors and others. Sensitive data stored in database could be a target to attackers. The attacker for data stored in database not only from external but also from within the organization. Adding the database encryption, valuable information in database becomes more secure since the encrypted data ensure the confidentiality of the data. A new affine block cipher named Enhanced Affine Block Cipher technique is proposed for database encryption. This algorithm improves the weakness of the original affine cipher. The new encoding schema and modification Cipher Block Chaining (CBC) mode of operation for block cipher is designed for the new algorithm and then the prototype of the system is built and implemented into existing system for protecting user password. The result has shown that the algorithm is working properly, where the decryption process produced similar output as the original plaintext and it ran through specified configuration and evaluated thoroughly with respect to database approach and algorithm technique to prove the design.
5 citations
•
TL;DR: It is critical to integrate various security mechanisms and trade off the security and the availability to build an outsourced database and looks ahead its future development.
Abstract: In the outsourced database model,organizations outsource their data management needs to an external service provider.The service provider offers mechanisms to create,store,update and query the database for the organizations.Since a server is almost never fully trusted,this model introduces several research issues related to data security.This paper discusses the classification of database security system,studies the architecture of outsourced database,overviews the state-of-the-art in database encryption,query policy of encrypted database,privacy protection,data integrity verification,and database copyright protection based on database watermarking,introduces the latest progress in security mechanisms of outsourced database,and looks ahead its future development.A conclusion is drawn at the end of this paper that it is critical to integrate various security mechanisms and trade off the security and the availability to build an outsourced database.
5 citations
••
04 Nov 2015TL;DR: This paper presents a new verifiable search scheme for outsourced database supporting data update operation without any pre-computation, and shows that this work cannot be effectively adoptable in dynamic database scenario.
Abstract: The notion of database outsourcing enables the data owner to delegate the database management to a cloud service provider (CSP) that provides various services to users of the database. It is inevitably to bring in new security challenges such as data privacy and query integrity. Although the issue of data privacy can be solved by database encryption techniques, query integrity is still an important challenge in database outsourcing scenario. Recently, some researchers present a verifiable auditing scheme, which can simultaneously achieve the correctness and completeness of search results even if the CSP intentionally returns an empty set. However, it requires the data owner to count the number of each identical item before outsourcing the database, which seems that this work cannot be effectively adoptable in dynamic database scenario. In this paper, we present a new verifiable search scheme for outsourced database supporting data update operation without any pre-computation.
5 citations
••
28 Jun 2013TL;DR: This paper tries to introduce a highly secure and flexible database encryption scheme allowing multiple users to perform more complex queries, including cross-table joins and still achieve acceptable performance by utilizing database's built-in indexing capabilities.
Abstract: While DaaS is becoming more and more popular enterprises start considering it as an option to reduce IT maintenance costs. But data privacy and security issues keep most of them from moving to the cloud. Existing schemes of encrypting the database usually either provide a very basic search only (e.g., SELECT * FROM t WHERE t.a = 5) and nothing more or give users more flexibility at a cost of data security. In this paper we try to introduce a highly secure and flexible database encryption scheme allowing multiple users to perform more complex queries, including cross-table joins and still achieve acceptable performance by utilizing database's built-in indexing capabilities. Several dedicated proxy servers in between the user and the database server help to achieve this and make it all transparent for the user. Developed solution shows acceptable performance level in most of the testing cases.
5 citations
•
11 Jun 2008TL;DR: A database encryption and query method keeping an order within a bucket partially, which encrypts and stores numeric data in a database, includes calculating a relative value of a plaintext within the bucket to which the plaintext is allocated as discussed by the authors.
Abstract: A database encryption and query method keeping an order within a bucket partially, which encrypts and stores numeric data in a database, includes calculating a relative value of a plaintext within a bucket to which the plaintext is allocated; generating a first key value by producing a random number within the bucket; generating a second key value for defining a function having a bucket range of the bucket as an input; and changing the relative value based on the first and the second key value with keeping an order of the relative value partially to store the changed relative value. The first key value may be a value of separating order informations on the relative value. Further, the second key value may be a resultant value obtained by applying a mod 2 operation to the bucket size of the bucket.
5 citations