scispace - formally typeset
Search or ask a question
Topic

Database encryption

About: Database encryption is a research topic. Over the lifetime, 320 publications have been published within this topic receiving 10685 citations.


Papers
More filters
Journal Article
Liu Guo-hua1
TL;DR: A complex-bucket-partition cryptographs index technology that adapts for unequal-probability query and cryptograph query strategy are proposed and a measure and an elimination method are presented focus on the detecting problem of cryptograph index.
Abstract: How to improve the query efficiency in cryptograph database is a primary problem of database encryption technology. Cryptograph index technology is one of the methods to improve cryptograph query efficiency in database,but there are many problems in cryptograph index methods such as low query hit rate and information disclosure measure. At first,basing on the actual distribute condition of query probability,the conception of whole-wrong-hit expectation is proposed,and a complex-bucket-partition cryptograph index technology that adapts for unequal-probability query and cryptograph query strategy are proposed. Then,a measure and an elimination method are presented focus on the detecting problem of cryptograph index. Finally,the algorithm is analyzed and validated by experiments.

2 citations

Proceedings ArticleDOI
01 Oct 2016
TL;DR: The database protection mechanisms proposed in this paper are based on attribute decomposition and encrypted cloud environment, which not only the server to minimize the number of encryption and decryption of the attribute field, but reduce the amount of computation and effectively encrypt the data of database as well.
Abstract: The combination of database and cloud environment prompted changes in the information industry and information service, while there exits any security issues. The database protection mechanisms proposed in this paper are based on attribute decomposition and encrypted cloud environment, which not only the server to minimize the number of encryption and decryption of the attribute field, but reduce the amount of computation and effectively encrypt the data of database as well.

2 citations

Journal ArticleDOI
TL;DR: The papers presents a policy driven solution that allows transparent data level encryption that does not change the data field type or length, and focuses on how to integrate modern cryptography technology into a relational database management system to solve some major security problems.
Abstract: Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. Instead of building walls around servers or hard drives, a protective layer of encryption is provided around specific sensitive data-items or objects. This prevents outside attacks as well as infiltration from within the server itself. This also allows the security administrator to define which data stored in databases are sensitive and thereby focusing the protection only on the sensitive data, which in turn minimizes the delays or burdens on the system that may occur from other bulk encryption methods. Encryption can provide strong security for data at rest, but developing a database encryption strategy must take many factors into consideration. This paper presents a practical implementation of field level encryption in enterprise database systems, based on research and practical experience from many years of commercial use of cryptography in database security. We presents how this column-level database encryption is the only solution that is capable of protecting against external and internal threats, and at the same time meeting all regulatory requirements. We use the key concepts of security dictionary, type transparent cryptography and propose solutions on how to transparently store and search encrypted database fields. In this paper we will outline the different strategies for encrypting stored data so you can make the decision that is best to use in each different situation, for each individual field in your database to be able to practically handle different security and operating requirements. Application code and database schemas are sensitive to changes in the data type and data length. The papers presents a policy driven solution that allows transparent data level encryption that does not change the data field type or length. We focus on how to integrate modern cryptography technology into a relational database management system to solve some major security problems.

2 citations

Journal Article
TL;DR: This scheme used of symmetry encryption and public key encryption which provided secured storage for sensitive data and effective key management and could effectively solve information of shared by many users and preferable security.
Abstract: To deal with security of sensitive data in database,encryption scheme is designed In virtue of digital certificate technique,the encryption scheme with the purpose of ensured data privacy as well as enhanced data sharing This scheme used of symmetry encryption and public key encryption which provided secured storage for sensitive data and effective key management The personal understanding of principle,arithmetic and key management on the security of database is introduced,in view of improving security level of Database Finally,analyses showed that the scheme could effectively solve information of shared by many users and preferable security

2 citations

Book ChapterDOI
01 Jan 2016
TL;DR: This paper proposes a new range query processing algorithm on the encrypted database that conceals the data access patterns while supporting efficient query processing by using the proposed encrypted index search scheme.
Abstract: Secure range query processing algorithms have been studied as the range query can be used as a baseline technique in various fields. However, when processing a range query, the existing methods fail to hide the data access patterns which can be used to derive the actual data items and the private information of a querying issuer. The problem is that the data access patterns can be exposed even though the data and query are encrypted. So, in this paper we propose a new range query processing algorithm on the encrypted database. Our method conceals the data access patterns while supporting efficient query processing by using our proposed encrypted index search scheme. Through the performance analysis, we show that the proposed range query processing algorithm can efficiently process a query while hiding the data access patterns.

2 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
70% related
Authentication
74.7K papers, 867.1K citations
68% related
Wireless sensor network
142K papers, 2.4M citations
67% related
Mobile computing
51.3K papers, 1M citations
67% related
Cryptography
37.3K papers, 854.5K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20214
202013
201923
201821
201718
201614