scispace - formally typeset
Search or ask a question
Topic

Database encryption

About: Database encryption is a research topic. Over the lifetime, 320 publications have been published within this topic receiving 10685 citations.


Papers
More filters
Journal Article
TL;DR: Generation, distribution, storage, transform and replacing of keys are discussed, and a concrete scheme of key management is proposed, showing that it is a practicable one, which can meet the security requirements of database encryption system.
Abstract: When a database encryption system is designed and implemented,key management is a vital problem which must be solved and which is very difficult to be solved.Key management is directly related to quality of the whole database encryption system and security of encrypted data.In this paper,generation,distribution,storage,transform and replacing of keys are discussed,and a concrete scheme of key management is proposed.Discussion on security of the scheme shows that it is a practicable one,which can meet the security requirements of database encryption system.

1 citations

Proceedings ArticleDOI
22 May 2019
TL;DR: This paper designs the database encryption system, analyzes the system structure diagram, and describes the specific module function; finally the data transmission is studied, and a part of the core code for the communication between the mobile phone and computer is given.
Abstract: With the more and more extensive using of the office automation system, people require more on the data security. This paper firstly introduces the theory knowledge of OA system, cryptology, network communication security and so on; then, on this basis, it designs the database encryption system, analyzes the system structure diagram, and describes the specific module function; finally the data transmission is studied, and a part of the core code for the communication between the mobile phone and computer is given. This paper has a positive effect for software developers and database administrators.

1 citations

Proceedings ArticleDOI
01 Dec 2019
TL;DR: In this paper, a simplified onion encryption model is designed and implemented, which can realize the full homomorphic encryption on the cloud database to a certain extent, and improve the efficiency of ciphertext operation to a Certain extent.
Abstract: Traditional cloud database directly stores user plaintext information, information security is directly related to the security of Cloud server, which will create a great security risk. The user's information security is not guaranteed. In this paper, a database encryption technology is designed, which can balance the problem of information security and use efficiency well. In this paper, a simplified onion encryption model is designed and implemented, which can realize the full homomorphic encryption on the cloud database to a certain extent, and improve the efficiency of ciphertext operation to a certain extent. Keywords-cloud; database; full homomorphic encryption

1 citations

Journal ArticleDOI
TL;DR: In this article, the authors constructed three kinds of databases such as plain-text, MS built-in encryption which is in-house model and custom AES (Advanced Encryption Standard).
Abstract: EMR(Electronic Medical Record) is an emerging technology that is highly-blended between non-IT and IT area. One of methodology to link non-IT and IT area is to construct databases. Nowadays, it supports before and after-treatment for patients and should satisfy all stakeholders such as practitioners, nurses, researchers, administrators and financial department and so on. In accordance with the database maintenance, DAS (Data as Service) model is one solution for outsourcing. However, there are some scalability and strategy issues when we need to plan to use DAS model properly. We constructed three kinds of databases such as plain-text, MS built-in encryption which is in-house model and custom AES (Advanced Encryption Standard) . DAS model scaling from 5K to 2560K records. To perform custom AES-DAS better, we also devised Bucket Index using Bloom Filter. The simulation showed the response times arithmetically increased in the beginning but after a certain threshold, exponentially increased in the end. In conclusion, if the database model is close to in-house model, then vendor technology is a good way to perform and get query response times in a consistent manner. If the model is DAS model, it is easy to outsource the database, however, some technique like Bucket Index enhances its utilization. To get faster query response times, designing database such as consideration of the field type is also important. This study suggests cloud computing would be a next DAS model to satisfy the scalability and the security issues.

1 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
70% related
Authentication
74.7K papers, 867.1K citations
68% related
Wireless sensor network
142K papers, 2.4M citations
67% related
Mobile computing
51.3K papers, 1M citations
67% related
Cryptography
37.3K papers, 854.5K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20214
202013
201923
201821
201718
201614