scispace - formally typeset
Search or ask a question
Topic

Database encryption

About: Database encryption is a research topic. Over the lifetime, 320 publications have been published within this topic receiving 10685 citations.


Papers
More filters
Proceedings ArticleDOI
26 Jun 2012
TL;DR: A high speed database encryption model using Graphics Processing Units that can perform parallel data processing is proposed and implemented that can be used to increase the encryption performance of database.
Abstract: Recently, the requirement of database encryption has increased. But many companies are not willing to adopt the use of encryption in their existing DBs due to the degradation in performance. In this paper, we proposed and implemented a high speed database encryption model using Graphics Processing Units(GPU) that can perform parallel data processing. As a result, there was a performance improvement of about 40% to 60% compared to the CPU case. We expect our paper can be used to increase the encryption performance of database.
Journal ArticleDOI
31 Aug 2014
TL;DR: An efficient and searchable encryptio n method using variable length bloom filter under limited resource circumstances(e.g., a smartphone) and has over a 70% space saving compared to the method of fixed length Bloom filter with the same false positive rate.
Abstract: We are using our smartphone for our business as well as ours li ves. Thus, user’s privacy data and a company secret are stored at smartphone. By the way, the saved data on smartphone database can be exposed to a malicous attacker when a malicous app is installed in the smartphone or a user lose his/her smartphone because all data are stored as form of plaintext in the database. To prevent this disclosure of personal information, we need a database encryption method. However, if a database is encrypted, it causes of declining the performance. For example, when we search specific data in condition with encrypted database, we should decrypt all data stored in the da tabase or search sequentially the data we want with accompanying overhead[1].In this paper, we propose an efficient and searchable encryptio n method using variable length bloom filter under limited resource circumstances(e.g., a smartphone). We compare with exi sting searchable symmetric encryption. Also, we implemented the proposed method in android smartphone and evaluated the per formance the proposed method. As a result through the implementation, We can confirm that our method has over a 50% i mprovement in the search speed compared to the simple search method about encrypted database and has over a 70% space saving compared to the method of fixed length bloom filter with the same false positive rate.Keywords: Searchable Encryption, Bloom filter, Smartphone
Journal ArticleDOI
TL;DR: A new database encryption scheme for DBaaS is proposed that enables the execution of range queries without severe performance degradation and without leakage of information other than order information.
Abstract: Computing-as-a-service is gaining ground. Clients may use the service without purchasing the system supporting the service. Database-as-a-Service (DBaaS) is an important area of computing-as-a-service. DBaaS allows clients to use an expensive database management system without purchasing it. In a DBaaS environment, database Tables are stored on servers belonging to a service provider, and hence, they must be encrypted in order to ensure data confidentiality. However, the encryption introduces performance degradation in the execution of queries over encrypted data. The execution of range queries, in particular, undergoes severe performance degradation. Several encryption schemes to alleviate this problem have been proposed. However, most of these schemes leak other information in addition to order information. In this study, a new database encryption scheme for DBaaS is proposed. The proposed scheme enables the execution of range queries without severe performance degradation and without leakage of information other than order information.
Proceedings ArticleDOI
12 Jun 2015
TL;DR: This paper describes the architecture based on placing the Elliptical curve cryptography module inside database management software (DBMS), just above the database cache, which allows us to achieve very strong data security using ECC and increase performance using cache.
Abstract: A database is a vast collection of data which helps us to collect, retrieve, organize and manage the data in an efficient and effective manner. Databases are critical assets. They store client details, financial information, personal files, company secrets and other data necessary for business. Today people are depending more on the corporate data for decision making, management of customer service and supply chain management etc. Any loss, corrupted data or unavailability of data may seriously affect its performance. The database security should provide protected access to the contents of a database and should preserve the integrity, availability, consistency, and quality of the data This paper describes the architecture based on placing the Elliptical curve cryptography module inside database management software (DBMS), just above the database cache. Using this method only selected part of the database can be encrypted instead of the whole database. This architecture allows us to achieve very strong data security using ECC and increase performance using cache.
Proceedings ArticleDOI
28 Aug 2014
TL;DR: A novel scheme for encrypting relational databases called ESRQ1, which uses a deterministic encryption scheme along with bitmap indices to encrypt a relational database and proves its security in the specified model.
Abstract: Privacy of data stored at un-trusted servers is an important problem of today. A solution to this problem can be achieved by encrypting the outsourced data, but simple encryption does not allow efficient query processing. In this paper we propose a novel scheme for encrypting relational databases so that range queries can be efficiently executed on the encrypted data. We formally define the syntax and security of the problem and specify a scheme called ESRQ1. ESRQ1 uses a deterministic encryption scheme along with bitmap indices to encrypt a relational database. We provide details of the functionality of ESRQ1 and prove its security in the specified model.

Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
70% related
Authentication
74.7K papers, 867.1K citations
68% related
Wireless sensor network
142K papers, 2.4M citations
67% related
Mobile computing
51.3K papers, 1M citations
67% related
Cryptography
37.3K papers, 854.5K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20214
202013
201923
201821
201718
201614