scispace - formally typeset
Search or ask a question
Topic

Database encryption

About: Database encryption is a research topic. Over the lifetime, 320 publications have been published within this topic receiving 10685 citations.


Papers
More filters
Journal Article
TL;DR: In order to offer a better key management strategy and a better access control scheme, a user identity code model is developed and by introducing it into the encryption system, the encryption key management can be enhanced and many problems in access control can be prevented effectively.
Abstract: This paper builds a center encryption server to provide centralized encryption services for entire database environment. This solution separates encryption keys from the encrypted data stored in the database and prevents intruders from stealing the crucial information. In order to offer a better key management strategy and a better access control scheme, a user identity code model is developed. By introducing the model into the encryption system, the encryption key management can be enhanced,and many problems in access control can be prevented effectively.

1 citations

Proceedings ArticleDOI
10 Jun 2019
TL;DR: It is essential for a developer to seriously take into account encryption-decryption queries overheads for big IoT data processing tasks, as well as extra time delays on encryption-Decryption operations, since these translate into idle or receiving states energy expenditures at the wireless IoT motes.
Abstract: Encrypted data transmitted from secure wireless channels as part of Internet of Things (IoT) infrastructures are mainly stored in database tables using plaintext records. As IoT data content confidence in supportive A.I. actions radically increases, the selection and use of database encryption is essential in terms of data integrity safety as well as IoT operations or decisions validity and non repudiation. Taking into account the amount of stored IoT data, data filtering and processing overhead needed for aptly decision making, it is essential for a developer to seriously take into account encryption-decryption queries overheads for big IoT data processing tasks, as well as extra time delays on encryption-decryption operations, since these translate into idle or receiving states energy expenditures at the wireless IoT motes.

1 citations

Journal ArticleDOI
TL;DR: This article will review best practices with real world solutions to protect the confidentiality and integrity of the database, and operational hurdles will be examined, such as multiple database deployments and heterogeneous environments.
Abstract: New business models rely on open networks with multiple access points to conduct business in real time, driving down costs and improving response times to revenue generating opportunities. By leveraging the ability to quickly exchange critical information and improve their competitive position, enterprises are introducing new vulnerabilities that can be exploited to gain unauthorized access to sensitive information. Furthermore, the insider threat is now considered by many to represent the greatest risk to enterprise resources. This article will review best practices with real world solutions to protect the confidentiality and integrity of your database. Operational hurdles will be examined, such as multiple database deployments and heterogeneous environments. New solutions are presented that save money by displacing multiple point solutions, are easy to implement, scalable, and require no application changes. These sophisticated integrated multi-tier solutions for application and data assurance are combining the strengths of database encryption, auditing controls and business activity monitoring. Although most DBMS security requirements will be met by native DBMS features, many DBMSes do not offer a comprehensive set of advanced security options; notably, many DBMSes do not have security assessment, intrusion detection and prevention, data-in-motion encryption, and intelligent auditing capabilities. DBMSes are not intelligent when it comes to security: for example, if a user has privileges, the DBMS does not stop the user or even determine why he or she might be trying to query the schema repeatedly or trying to access all private data. What if the user is a hacker or a disgruntled employee?

1 citations

Journal Article
TL;DR: The experiment shows that some methods put forward can solve problems which encountered in the process of encrypting and decrypting database encryption system.
Abstract: Database encryption engine is the core of database encryption system.It's security and efficiency has great effect on whole function of database encryption system.And some difficult problems in the process must be overcome.Those problems of it are discussed,and some methods are put forward to solve it.The experiment shows that these methods can solve these problems which encountered in the process of encrypting and decrypting.

1 citations

Book ChapterDOI
10 Jan 2019
TL;DR: This paper describes a modification to the Secure K-Nearest Neighbours (SkNN) technique to construct an encrypted database system and suggests an approach which combines RSA with the SkNN scheme.
Abstract: Database encryption is a process in which the data stored in the database are converted from plaintext (PT) to ciphertext (CT). The original data can be retrieved from the ciphertext with the help of a predefined key and a decryption scheme. This way, only the appropriate authority that has the key can access the data. Thus, encrypted databases help ensure data confidentiality and avoid data leaks. In this paper, we will describe a modification to the Secure K-Nearest Neighbours (SkNN) [3] technique to construct an encrypted database system. We briefly discuss some of the existing encryption models and the principles involved in their construction and look at some of the issues that plague these models. The motivation behind this paper is to devise a method that allows for strong database encryption, while at the same time facilitating efficient search over the encrypted data. In order to achieve this, we suggest an approach which combines RSA with the SkNN scheme.

1 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
70% related
Authentication
74.7K papers, 867.1K citations
68% related
Wireless sensor network
142K papers, 2.4M citations
67% related
Mobile computing
51.3K papers, 1M citations
67% related
Cryptography
37.3K papers, 854.5K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20214
202013
201923
201821
201718
201614