scispace - formally typeset
Search or ask a question
Topic

Database encryption

About: Database encryption is a research topic. Over the lifetime, 320 publications have been published within this topic receiving 10685 citations.


Papers
More filters
Proceedings Article
01 Jan 2005
TL;DR: A policy driven solution that allows transparent data level encryption that does not change the data field type or length is presented, which minimizes the delays or burdens on the system that may occur from other bulk encryption methods.
Abstract: Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. Instead of building walls around servers or hard drives, a protective layer of encryption is provided around specific sensitive data items or objects. This prevents outside attacks as well as infiltration from within the server itself. This also allows the security administrator to define which data stored in databases are sensitive and thereby focusing the protection only on the sensitive data, which in turn minimizes the delays or burdens on the system that may occur from other bulk encryption methods. Encryption can provide strong security for data at rest, but developing a database encryption strategy must take many factors into consideration. We present column-level database encryption as the only solution that is capable of protecting against external and internal threats, and at the same time meeting all regulatory requirements. We use the key concepts of security dictionary, type transparent cryptography and propose solutions on how to transparently store and search encrypted database fields. Different stored data encryption strategies are outlined, so you can decide the best practice for each situation, and each individual field in your database, to handle different security and operating requirements. Application code and database schemas are sensitive to changes in the data type and data length, the paper presents a policy driven solution that allows transparent data level encryption that does not change the data field type or length.

2 citations

Patent
03 May 2019
TL;DR: In this article, the authors proposed a three-layered database security encryption scheme, in which the in-library key, the database main key and the server main key are managed by different responsible persons.
Abstract: The invention relates to the technical field of database security encryption, in particular to a database encryption method and device, and the method comprises the steps: carrying out the encryptionof different data in a database through employing different intra-library keys; for the different intra-library keys, encrypting the different intra-library keys by adopting different database masterkeys correspondingly; for the different database master keys, encrypting the different database master keys by adopting different server master keys correspondingly; the server master key is managed by a first responsible person, the database master key is managed by a second responsible person, and the in-library key is managed by a database administrator. According to the invention, three-layerencryption management is carried out on the data through the in-library key, the database main key and the server main key, and the database administrator and different superior responsible persons manage different keys respectively, so that the database administrator cannot directly obtain the corresponding data, the power of the database administrator is weakened, and the security of the database system is ensured.

2 citations

Journal Article
TL;DR: A database management system is taken as the research object and the Cunega sealing technology and library encryption technology and encryption system modules are introduced in order to reduce the possibility of information disclosure.
Abstract: with the development of database storage capacity increasing, more and more information and important data are stored in the database system, illegal users and hackers steal data storage brings serious safe hidden danger. In order to reduce the risk of information security safeguard system of information disclosure, this paper takes a database management system as the research object, in the system using the encryption technology, the important data information encryption processing, in order to reduce the possibility of information disclosure, and simply introduced the Cunega sealing technology and library encryption technology and encryption system modules.

2 citations

01 Jan 2014
TL;DR: QR-code which would be inspect by user ambulatory tool which overcome the weakness of traditional password based system and one time password (OTP) which hides inside QRcode is used.
Abstract: It describes implementation details of online banking identity structure. Security is an important concern for online banking application which can be implemented by various internet technologies. While executing online banking perturb, reliable data transfer need can be fulfilled by using https data transfer and database encryption techniques for secure storage of sensitive information. To eliminate threat of phishing and to confirm user identity we are going to use concept of QR-code with android feature. QR-code which would be inspect by user ambulatory tool which overcome the weakness of traditional password based system. We improve more security by using one time password (OTP) which hides inside QRcode.

2 citations

Journal Article
Zhu Jing-bo1
TL;DR: A novel database encryption scheme was proposed for enhanced data sharing inside a database, while preserving data privacy, characterized by both the fast speed of the conventional encryption and the convenience of key distribution of public key encryption.
Abstract: Inspired by the PGP technique,a novel database encryption scheme was proposed for enhanced data sharing inside a database,while preserving data privacy.It was characterized by both the fast speed of the conventional encryption and the convenience of key distribution of public key encryption.It also provided secured storage for sensitive data and effective key management.The scheme had been implemented and successfully applied on Oscar v5.1,a DBMS developed for aerospace application.

2 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
70% related
Authentication
74.7K papers, 867.1K citations
68% related
Wireless sensor network
142K papers, 2.4M citations
67% related
Mobile computing
51.3K papers, 1M citations
67% related
Cryptography
37.3K papers, 854.5K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20214
202013
201923
201821
201718
201614