Security and Encryption at Modern Databases

被引:3
|
作者
Ocenas, Martin [1 ]
Homoliak, Ivan [1 ]
Hanacek, Petr [1 ]
Malinka, Kamil [1 ]
机构
[1] Brno Univ Technol, Brno, Czech Republic
关键词
Database; DBMS; Encryption; Security; Threat; Performance; SQL;
D O I
10.1145/3377644.3377662
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data is a most valuable part of most of nowadays system. A lot of hackers and criminals are trying to steal this data all the time. Due to that data should also be the best protected part of every company's systems. We would like our systems to be impenetrable, but that is not possible. If we want to protect the data, in case our system is compromised, we need to use encryption. This article describes traditional ways of database encryption, modern concept of securing data and some possible concepts how to secure the data using encryption. All of these approaches are discussed from high-level point of view to show their impact on security of entire system.
引用
收藏
页码:19 / 23
页数:5
相关论文
共 50 条
  • [1] Ensuring Data Security in Databases Using Format Preserving Encryption
    Gupta, Shikha
    Jain, Satbir
    Agarwal, Mohit
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 214 - 218
  • [2] Security Maturity in NoSQL Databases - Are they Secure Enough to Haul the Modern IT Applications?
    Srinivas, Sethuraman
    Nair, Archana
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 739 - 744
  • [3] RECORD ENCRYPTION IN DISTRIBUTED DATABASES
    HARDJONO, T
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 386 - 395
  • [4] Encryption and security: the advanced encryption standard
    Allman, S
    [J]. EDN, 2002, 47 (24) : 26 - +
  • [5] Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases
    Kerschbaum, Florian
    Harterich, Martin
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 325 - 336
  • [6] Cryptanalysis of a Fast Encryption Scheme for Databases
    Jacob, Stephane
    [J]. 2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 2468 - 2472
  • [7] Framework for Searchable Encryption with SQL Databases
    Azraoui, Monir
    Onen, Melek
    Molva, Refik
    [J]. CLOSER: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2018, : 57 - 67
  • [8] Encryption models for patient record databases
    Hidalgo, Alejandro
    Monteagudo, Maria
    Rishe, Naphtali
    Graham, Scott
    Adjouadi, Malek
    Barreto, Armando
    Steinhoff, Robert
    Pierre, Kiesha
    Canas, Carlos
    [J]. 3RD INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS, AND APPLICAT/4TH INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, 2006, : 1 - 4
  • [9] Randomly Partitioned Encryption for Cloud Databases
    Sanamrad, Tahmineh
    Braun, Lucas
    Kossmann, Donald
    Venkatesan, Ramarathnam
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 307 - 323
  • [10] Vehicle Security Encryption Based on Unlicensed Encryption
    Huang, Haomin
    Song, Jing
    Xu, Zhijia
    Ding, Xiaoke
    Deng, Wei
    [J]. MIPPR 2017: REMOTE SENSING IMAGE PROCESSING, GEOGRAPHIC INFORMATION SYSTEMS, AND OTHER APPLICATIONS, 2018, 10611