scispace - formally typeset
Search or ask a question
Topic

Database encryption

About: Database encryption is a research topic. Over the lifetime, 320 publications have been published within this topic receiving 10685 citations.


Papers
More filters
Journal Article
TL;DR: The encryption of web-database based on hybrid cipher system is introduced and the result demonstrate that it is a good scheme because of its strength and rapidity.
Abstract: Web-database security problem is becoming more and more crucial on the Internet. After studying and analyzing different advanced secure technology, this paper introduces the encryption of web-database based on hybrid cipher system, the result demonstrate that it is a good scheme because of its strength and rapidity.

1 citations

Proceedings Article
01 Jun 2014
TL;DR: In this paper, the authors explore the space of designs studied in prior work on processing queries over encrypted data and discuss the security challenges that arise in both approaches and how they may be addressed.
Abstract: Data security is a serious concern when we migrate data to a cloud DBMS. Database encryption, where sensitive columns are encrypted before they are stored in the cloud, has been proposed as a mechanism to address such data security concerns. The intuitive expectation is that an adversary cannot “learn” anything about the encrypted columns, since she does not have access to the encryption key. However, query processing becomes a challenge since it needs to “look inside” the data. This tutorial explores the space of designs studied in prior work on processing queries over encrypted data. We cover approaches based on both classic client-server and involving the use of a trusted hardware module where data can be securely decrypted. We discuss the security challenges that arise in both approaches and how they may be addressed. Briefly, supporting the full complexity of a modern DBMS including complex queries, transactions and stored procedures leads to significant challenges that we survey.

1 citations

Journal ArticleDOI
08 Jul 2014
TL;DR: Privacy protection and issues that each organization should consider when it decides to outsource own data are determined and techniques that directly deal with the data that is encrypted without having to decrypt them first are determined.
Abstract: Utilizing database encryption to safeguard data in several conditions where access control is not sufficient is unavoidable. Database encryption offers an extra layer of security to traditional access control methods. It stops users that are unauthorized, such as hackers breaking into a system, and observing private data. Consequently, data is safe even when the database is stolen or attacked. Nevertheless, the process of data decryption and encryption causes degradation in the database performance. In conditions where the entire information is kept in an encrypted format, it is not possible to choose the database content any longer. The data must be first decrypted, and as such, the unwilling and forced tradeoff occurs between the function and the security. The suitable methods to improve the function are techniques that directly deal with the data that is encrypted without having to decrypt them first. In this study, we determined privacy protection and issues that each organization should consider when it decides to outsource own data.

1 citations

Journal Article
TL;DR: At last, some solutions for some functions in DBMS that are invalidation after database encryption are provided.
Abstract: Database encryption can be classified into physical encryption and logical encryption taking no account of the encryption in the kernel of DBMS. It must improve the commonly symmetrical key block cipher arithmetic for ensuring that the data length will not be increased after encryption. Forward shift bits mode is used in Triple DES with Two Keys, and cipher text stealing mode is used in RC5 with Cipher Block Chaining. The key of controlled encryption arithmetic that is the primary key can be created by random number and can be kept by person specially assigned, and the two dimensional matrix pattern formed by record lines and field rows can be adopted for the secondary key. At last, some solutions for some functions in DBMS that are invalidation after database encryption are provided.

1 citations

01 Jan 2011
TL;DR: This paper proposes a new method of transparently encryption of records, which supports conditional query on encrypted database data, and experimental results of a database-encryption system designed based on this method are reported.
Abstract: As the database is applied widely,a critical challenge is to preserve data privacy and prevent sensitive information from disclosure.The database encryption technology has been proven an effective method to preserve data security.However,as the original partially ordered relationship of database data would be lost while the database is encrypted,it is impossible to quicken the conditional query on the cipher-text data.This paper proposes a new method of transparently encryption of records,which supports conditional query on encrypted database data.Experimental results of a database-encryption system designed based on this method are reported.

1 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
70% related
Authentication
74.7K papers, 867.1K citations
68% related
Wireless sensor network
142K papers, 2.4M citations
67% related
Mobile computing
51.3K papers, 1M citations
67% related
Cryptography
37.3K papers, 854.5K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20214
202013
201923
201821
201718
201614