scispace - formally typeset
Search or ask a question
Topic

Database encryption

About: Database encryption is a research topic. Over the lifetime, 320 publications have been published within this topic receiving 10685 citations.


Papers
More filters
Proceedings ArticleDOI
20 Feb 2009
TL;DR: A new cryptograph index method based on the probability distribution of queries, which is used for nonequiprobable query, and a cryptograph query strategy are presented and information disclosure can be measured and eliminated using a k-anonymity based method.
Abstract: How to improve query efficiency in cryptograph database is an essential problem in database encryption technology. As one kind of methods for improving cryptograph query efficiency in database, existing cryptograph index technologies suffer from two main problems: low query hit rate and lack of information disclosure measures. In this paper, we propose a new cryptograph index method based on the probability distribution of queries. We first define the conception of whole-wrong-hit expectation. Then a complex bucket-partition cryptograph index technology, which is used for nonequiprobable query, and a cryptograph query strategy are presented. Finally, information disclosure can be measured and eliminated using a k-anonymity based method. Experimental results demonstrate the improvement of our proposed method over the existing partition algorithms.

5 citations

Journal Article
Liu Ming-kun1
TL;DR: The design integrates the identity verification, access control, encrypted transmission and data encryption in the network encrypted Data Base Safety Middleware, which provides the safe access service of the database information to ensure data confidentiality, integrity and availability.
Abstract: An effective method to realize database information security is to use middlewareThe design integrates the identity verification,access control,encrypted transmission and data encryption in the network encrypted Data Base Safety Middleware(DBSAPI),which provides the safe access service of the database information to ensure data confidentiality,integrity and availability,and consequently guarantee the legal rights and interests of the owners and users

5 citations

Patent
07 Jul 2017
TL;DR: In this paper, the authors proposed a general database transparent encryption system, which consists of an SQL gateway module and an encryption plug-in module, where the gateway module is used for receiving and rewriting an SQL statement sent by a client, sending the SQL statement to a database server and forwarding a result returned by the database server to the client.
Abstract: The invention relates to a general database transparent encryption system and belongs to the fields of information security and database encryption technologies. According to the system, first, an existing data table is subjected to encryption transformation, the table where an encrypted field P1 exists is recorded as T1, and a ciphertext index field I1 is established based on the encrypted field P1; and then, the content of a to-be-encrypted field is mapped to a Hash value based on an order-preserving Hash function, and the Hash value is used as an index value to be interposed into the field I1. The system comprises an SQL gateway module and an encryption plug-in module, wherein the SQL gateway module is used for receiving and rewriting an SQL statement sent by a client, sending the SQL statement to a database server and forwarding a result returned by the database server to the client; and the encryption plug-in module is located in a database, mainly comprises a series of user-defined functions (UDFs) and achieves encryption, decryption and ciphertext indexing functions according to the SQL statement obtained after rewriting. Compared with the prior art, the truly-general database encryption system is realized.

5 citations

Proceedings ArticleDOI
05 Apr 2004
TL;DR: An improved database encryption scheme with a consideration of fault tolerance and an authentication approach that can not only check the data integrity of a record, but also ensure the data origin of arecord in database systems are presented.
Abstract: This paper proposes a systematic approach to integrate database security (including database encryption and authentication) and fault tolerance so that the total overheads can be significantly reduced. An improved database encryption scheme with a consideration of fault tolerance are also presented and analyzed. The authentication and fault tolerance are realized by carefully designed checksums using redundant residue number systems (RRNS). The proposed authentication approach can not only check the data integrity of a record, but also ensure the data origin of a record in database systems. The integrated approach is able to correct a single error within each record. The proposed approach is ideal for many database applications in which both authentication and fault tolerance are required.

5 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
70% related
Authentication
74.7K papers, 867.1K citations
68% related
Wireless sensor network
142K papers, 2.4M citations
67% related
Mobile computing
51.3K papers, 1M citations
67% related
Cryptography
37.3K papers, 854.5K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20214
202013
201923
201821
201718
201614