scispace - formally typeset
Search or ask a question
Topic

Database encryption

About: Database encryption is a research topic. Over the lifetime, 320 publications have been published within this topic receiving 10685 citations.


Papers
More filters
Journal Article
TL;DR: Based on the AES algorithm,rypt/decrypt process flows are proposed and corresponding modules are designed for air defense database and configuration file protection, showing that the proposed design method is efficient, easy to use and well applicable.
Abstract: In air defense system,a lot of data are stored in database or files in the form of plain text.In order to secure important data from malicious access,these data need to be encrypted before stored.The encryption mode and granularity of database are discussed,and high security AES encryption arithmetic is introduced.Based on the AES algorithm,encrypt/decrypt process flows are proposed and corresponding modules are designed for air defense database and configuration file protection.Exact application shows that the proposed design method is efficient,easy to use and well applicable.

1 citations

Journal Article
TL;DR: The characteristics and configuration of SQLite embedded database were introduced, and application of its dynamical interactions and database encryption between the user and embedded system were introduced.
Abstract: The characteristics and configuration of SQLite embedded database,replanting it into the arm-linux embedded system platform,and application of its dynamical interactions and database encryption between the user and embedded system were introduced.

1 citations

Proceedings ArticleDOI
18 Dec 2006
TL;DR: This paper applies Java Card to the database encryption system to solve the problem of key management and access control, and proposes a double-factor based indemnification, access control and data transfer scheme for the databaseryption system based on Java Card.
Abstract: The security of a system not only depends on the quality of the encryption algorithm it used, but also on the mechanism of key management. Traditional method layered key management is complex and inefficient for a database encryption system as well. In this paper, we apply Java Card to the database encryption system to solve the problem of key management and access control. By fully utilizing the cipher support of Java Card and its advantage of safe storage and portability, the complexity of layered key management is reduced. This paper also proposes a double-factor based indemnification, access control and data transfer scheme for the database encryption system based on Java Card. The most prominent advantage of our scheme is to enhance both efficiency and reliability of the system. Security analysis and simulation experiment is also given for supporting its validity.

1 citations

Patent
15 Dec 2017
TL;DR: In this article, the authors proposed a database encryption method and device, which includes the steps that firstly, whether data in a database changes or not is detected; secondly, when it is detected that the data in the database changes, the changed data is analyzed and encrypted by using a configuration file, wherein the configuration file comprises data identification information needing data encryption; finally, the encrypted data is stored.
Abstract: The embodiment of the invention provides a database encryption method and device. The method includes the steps that firstly, whether data in a database changes or not is detected; secondly, when it is detected that the data in the database changes, the changed data is analyzed and encrypted by using a configuration file, wherein the configuration file comprises data identification information needing data encryption; finally, the encrypted data is stored. By means of the method, the changed data in the database can be encrypted; meanwhile, the configuration file comprises the data identification information needing data encryption, the changed data can be selectively encrypted, and therefore on the premise that the data safety is achieved, the length of the data with the constant length cannot be changed during encryption.

1 citations

Book ChapterDOI
12 Sep 2013
TL;DR: This work presents a hash based method which provably allows the privacy constraint of an unencrypted database to be extended to the queries performed on the database, and identifies a privacy limitation, how it could be exploited using a known-query attack, and a counter-measure based on oblivious storage.
Abstract: With the advent of cloud computing there is an increased interest in outsourcing an organization’s data to a remote provider in order to reduce the costs associated with self-hosting. If that database contains information about individuals (such as medical information), it is increasingly important to also protect the privacy of the individuals contained in the database. Existing work in this area has focused on preventing the hosting provider from ascertaining individually identifiable sensitive data from the database, through database encryption or manipulating the data to provide privacy guarantees based on privacy models such as k-anonymity. Little work has been done to ensure that information contained in queries on the data, in conjunction with the data, does not result in a privacy violation. In this work we present a hash based method which provably allows the privacy constraint of an unencrypted database to be extended to the queries performed on the database. In addition, we identify a privacy limitation of such an approach, describe how it could be exploited using a known-query attack, and propose a counter-measure based on oblivious storage.

1 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
70% related
Authentication
74.7K papers, 867.1K citations
68% related
Wireless sensor network
142K papers, 2.4M citations
67% related
Mobile computing
51.3K papers, 1M citations
67% related
Cryptography
37.3K papers, 854.5K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20214
202013
201923
201821
201718
201614