Security and Encryption at Modern Databases

被引:3
|
作者
Ocenas, Martin [1 ]
Homoliak, Ivan [1 ]
Hanacek, Petr [1 ]
Malinka, Kamil [1 ]
机构
[1] Brno Univ Technol, Brno, Czech Republic
关键词
Database; DBMS; Encryption; Security; Threat; Performance; SQL;
D O I
10.1145/3377644.3377662
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data is a most valuable part of most of nowadays system. A lot of hackers and criminals are trying to steal this data all the time. Due to that data should also be the best protected part of every company's systems. We would like our systems to be impenetrable, but that is not possible. If we want to protect the data, in case our system is compromised, we need to use encryption. This article describes traditional ways of database encryption, modern concept of securing data and some possible concepts how to secure the data using encryption. All of these approaches are discussed from high-level point of view to show their impact on security of entire system.
引用
收藏
页码:19 / 23
页数:5
相关论文
共 50 条
  • [31] Homomorphic encryption with CCA security
    Prabhakaran, Manoj
    Rosulek, Mike
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 667 - 678
  • [32] Video encryption for security surveillance
    Huang, Jun
    Qian, Hongxuan
    [J]. 41ST ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2007, : 207 - +
  • [33] Security of signed ElGamal encryption
    Schnorr, CP
    Jakobsson, M
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 73 - 89
  • [34] Database Security Using Encryption
    Singh, Prabhsimran
    Kaur, Kuljit
    [J]. 2015 1ST INTERNATIONAL CONFERENCE ON FUTURISTIC TRENDS ON COMPUTATIONAL ANALYSIS AND KNOWLEDGE MANAGEMENT (ABLAZE), 2015, : 353 - 358
  • [35] Security Issues in NoSQL Databases
    Okman, Lior
    Gal-Oz, Nurit
    Gonen, Yaron
    Gudes, Ehud
    Abramov, Jenny
    [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 541 - 547
  • [36] The security of databases: the Access case
    David, Baptiste
    Larget, Dorian
    Scherrer, Thibaut
    [J]. JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2013, 9 (02): : 95 - 107
  • [37] Security processor for bulk encryption
    Ahmed, Z
    Rahmatullah, MM
    Jamal, H
    [J]. 16TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS, PROCEEDINGS, 2004, : 446 - 449
  • [38] Security Issues of Biometric Encryption
    Stoianov, A.
    Kevenaar, T.
    van der Veen, M.
    [J]. IEEE TIC-STH 09: 2009 IEEE TORONTO INTERNATIONAL CONFERENCE: SCIENCE AND TECHNOLOGY FOR HUMANITY, 2009, : 34 - 39
  • [39] On the security of the WinRAR encryption method
    Yeo, GSW
    Phan, RCW
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 402 - 416
  • [40] Security of medical image databases
    Tzelepi, S
    Pangalos, G
    Khair, M
    [J]. MEDICAL INFORMATICS EUROPE '97: PARTS A & B, 1997, 43 : 470 - 474