scispace - formally typeset
Search or ask a question
Topic

Database encryption

About: Database encryption is a research topic. Over the lifetime, 320 publications have been published within this topic receiving 10685 citations.


Papers
More filters
Patent
07 Mar 2018
TL;DR: In this article, a database encryption processing apparatus for supporting the life-cycle management of an encryption key for a large database and an operating method thereof are disclosed, and a validity period corresponding to each of a plurality of encryption keys for use in data encryption is determined.
Abstract: A database encryption processing apparatus for supporting the life-cycle management of an encryption key for a large database and an operating method thereof are disclosed. A validity period corresponding to each of a plurality of encryption keys for use in data encryption is determined. After that, when an encryption key update command for a plurality of data inserted in the specific field of a data table stored in a database is applied, Only data not encrypted with the latest encryption key among the plurality of data are newly encrypted by the latest encryption key to perform update. So, it is possible to prevent security threats due to the use of old encryption keys and to support the quick processing of an encryption key update operation for a large database.
01 Jan 2015
TL;DR: This thesis proposes a RSA-based Key Compromised Resistant Protocol (KCR) to effectively address the problem of database re-encryption when a key is compromised.
Abstract: Data communication and networking are essential in our daily lives. Companies rely on computer networks and internetworks to exchange information that is normally stored in large databases, with their customers. Nonetheless, it is not guaranteed that all networks are reliable; therefore, database content should be protected against any unauthorized access. One of the most powerful strategies that has been used in existing database security systems to protect databases is database encryption. Few of these systems are practical to be used with large databases since one important issue is not satisfactorily addressed which is concerning key management. It may take days to encrypt the huge databases. Imagine how the situation will be when a key is compromised! Straightforward solutions to address this problem demand that the keys used in database encryption to be replaced with new keys. Consequently, a database re-encryption process has to be executed. In this thesis, we propose "RSA-based Key Compromised Resistant Protocol (KCR)" to effectively address this problem.
Proceedings ArticleDOI
04 Sep 2013
TL;DR: This paper introduces a secure scheme against frequency attack for pattern query on encrypted string data that provides searching of arbitrary patterns in the fields' content and supposes that the database management server is untrusted and must be prevented from viewing the sensitive data.
Abstract: Using database encryption to protect data in some situations where access control is not solely enough is inevitable. Database encryption provides an additional layer of protection to conventional access control techniques. It prevents unauthorized users, including intruders breaking into a network, from viewing the sensitive data. As a result data remains protected even in the event that database is successfully attacked or stolen. However, encryption and decryption of data result in database performance degradation. In the situation where all the information is stored in encrypted form, one cannot make the selection on the database content any more. Data should be decrypted first, so an unwilling tradeoff between the security and the performance is normally forced. The appropriate approaches to increase the performance are methods to deal directly with the encrypted data without firstly decrypting them. This paper introduces a secure scheme against frequency attack for pattern query on encrypted string data. Proposed scheme provides searching of arbitrary patterns in the fields' content and supposes that the database management server is untrusted and must be prevented from viewing the sensitive data.
Patent
18 Jan 2019
TL;DR: In this paper, a method for acquiring geographic position information by scanning door number, includes the following steps: data acquisition, geo-location information standards calibration and inputting, data comparison and regularization, database encryption, two-dimensional code generation, business development and application, the implementation of the method is conducive to the management of various government departments and the development of services for the people.
Abstract: The invention discloses a method for acquiring geographic position information by scanning door number, includes the following steps: data acquisition, geo-location information standards calibration and inputting, data comparison and regularization, database encryption, two-dimensional code generation, business development and application, the implementation of the method is conducive to the management of various government departments and the development of services for the people, the implementation of the method also makes all walks of life closer to people's lives, promotes the developmentof all walks of life, and makes people's lives more convenient at the same time

Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
70% related
Authentication
74.7K papers, 867.1K citations
68% related
Wireless sensor network
142K papers, 2.4M citations
67% related
Mobile computing
51.3K papers, 1M citations
67% related
Cryptography
37.3K papers, 854.5K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20214
202013
201923
201821
201718
201614