scispace - formally typeset
Search or ask a question
Topic

Database encryption

About: Database encryption is a research topic. Over the lifetime, 320 publications have been published within this topic receiving 10685 citations.


Papers
More filters
Proceedings ArticleDOI
01 May 2017
TL;DR: This paper presents a comparison of execution times for three algorithms using asymmetric keys, depending on the size of the encryption/decryption keys: RSA, ElGamal, and ECIES.
Abstract: Data security has become an issue of increasing importance, especially for Web applications and distributed databases. One solution is using cryptographic algorithms whose improvement has become a constant concern. The increasing complexity of these algorithms involves higher execution times, leading to an application performance decrease. This paper presents a comparison of execution times for three algorithms using asymmetric keys, depending on the size of the encryption/decryption keys: RSA, ElGamal, and ECIES. For this algorithms comparison, a benchmark using Java APIs and an application for testing them on a test database was created.

4 citations

Proceedings ArticleDOI
19 Dec 2014
TL;DR: The proposed framework focuses on securing database by supporting range queries and storing sensitive information with protection of memory leak by performs database encryption, query encryption and also supports range query over encrypted databases.
Abstract: DBaaS (Database as a Service) is a service provided and managed by the cloud provider and supports traditional database functionalities. The DBaaS use multi-tenant architecture to support multiple customers. The biggest problem concerned with DBaaS is the privacy and security of the data contained in the database stored in the cloud environment. The database is stored in a third party data center and it is assumed to be as untrusted. The database is therefore encrypted in order to prevent any data leaks on the third party data center. The result of any query to the database is decrypted at the service provider site before it is sent to the user. The above mentioned solution have two disadvantages. Firstly, the encryption and decryption are done at the server side and hence the cloud owner can extract information from the database. Secondly, the encryption of database does not support range queries on the database. The proposed framework focuses on securing database by supporting range queries and storing sensitive information with protection of memory leak. It performs database encryption, query encryption and also supports range query over encrypted databases. A double layered encryption mechanism is used for sensitive data and a single layer encryption is used for non-sensitive data. Order Preserving Encryption (OPE) is used for single layer encryption. OPE maintains the order in an encrypted database and so range query can be performed over encrypted database using an encrypted query. The drawback associated with OPE is the attacker can guess the value based on the ordering of data and so for sensitive attributes in the database, a double layered encryption using Format Preserving Encryption (FPE) followed by OPE symmetric key encryption algorithm is proposed.

4 citations

Proceedings ArticleDOI
21 Mar 2008
TL;DR: The bucket ID transformation is proposed that supports range queries without exposing the order of plaintext and is more powerful than the previous order-preserving methods and is expected to handle data more efficiently than other methods.
Abstract: Encryption is a well established technology for protecting sensitive data. Unfortunately, the integration of existing encryption techniques with database systems causes undesirable performance degradation. We propose the bucket ID transformation that supports range queries without exposing the order of plaintext. The Bucket ID Transformation is performed by modulo arithmetic or pseudo-random number generation. This method is more powerful than the previous order-preserving methods and is expected to handle data more efficiently than other methods. Experiment results show that our scheme outperforms other method in encryption and query speed.

4 citations

Journal ArticleDOI
15 Feb 2021
TL;DR: This paper designs the student database encryption application based on the name of the SMK Pembangunan using Visual Basic programming language and displays the IDEA Cryptographic key, the encryption and decryption change process is clearly visible.
Abstract: One of the algorithms in cryptography that can be used for school database security is the IDEA (International Data Encryption Algorithm) algorithm. The IDEA algorithm is one of the cryptographic algorithms that has various applications in secure data transmission in the scope of networks and distributed measurement systems. Encryption results appear in the form of a notepad. The Open data button is used to find data that will be used for the encryption process. The key checklist is used to input the key length that will be used for the encryption decryption security process. The system displays the IDEA Cryptographic key, can use the IDEA Cryptographic key, the encryption and decryption change process is clearly visible. Encryption is done on the SMK Pembangunan school database with IDEA algorithm and designing the student database encryption application based on the name of the SMK Pembangunan using Visual Basic programming language.

4 citations

Proceedings ArticleDOI
09 Jul 2010
TL;DR: To ensure the safety of mobile database, the identity authentication must be consummated, the access-control mechanism should be viaalilowo, the database Encryption must be enhanced, the audit, backups, and recover must be taken into account, the mobile client authentication should be enhanced and the wireless transmission must be encrypted.
Abstract: The mobile database may encounter a series of safety problems from the mobile client, the wireless network, the loophole of itself, the attacks from hacker, viruses and so on, in the actual application process, while the data security of backend database is under threat. To ensure the safety of mobile database, the identity authentication must be consummated, the access-control mechanism should be viaalilowo, the database Encryption must be enhanced, the audit, backups, and recover must be taken into account, the mobile client authentication should be enhanced and the wireless transmission must be encrypted.

4 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
70% related
Authentication
74.7K papers, 867.1K citations
68% related
Wireless sensor network
142K papers, 2.4M citations
67% related
Mobile computing
51.3K papers, 1M citations
67% related
Cryptography
37.3K papers, 854.5K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20214
202013
201923
201821
201718
201614