Providing database encryption as a scalable enterprise infrastructure service

被引:0
|
作者
Mattsson, UT
机构
关键词
isolation; intrusion tolerance; database security; encryption; privacy; VISA CISP; GLBA; HIPAA;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As databases become networked in more complex multi-tiered applications, their vulnerability to external attack grows. We address scalability as a particularly vital problem and propose alternative solutions for data encryption as an enterprise IT infrastructure component. In this paper we explore a new approach for data privacy and security in which a security administrator protecting privacy at the level of individual fields and records, and providing seamless mechanisms to create, store, and securely access databases. Such a model alleviates the need for organizations to purchase expensive hardware, deal with software modifications, and hire professionals for encryption key management development tasks. Although access control has been deployed as a security mechanism almost since the birth of large database systems, many still look at database security as a problem to be addressed as the need arises - this is often after threats to the secrecy and integrity of data have occurred. Instead of building walls around servers or hard drives, a protective layer of encryption is provided around specific sensitive data items or objects. This prevents outside attacks as well as infiltration from within the server itself This also allows the security administrator to define which data stored in databases are sensitive and thereby focusing the protection only on the sensitive data, which in turn minimizes the delays or burdens on the system that may occur from other bulk encryption methods.
引用
收藏
页码:371 / 380
页数:10
相关论文
共 50 条
  • [1] Providing database as a service
    Hacigümüs, H
    Iyer, B
    Mehrotra, S
    [J]. 18TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2002, : 29 - 38
  • [2] Providing Scalable Database Services on the Cloud
    Chen, Chun
    Chen, Gang
    Jiang, Dawei
    Ooi, Beng Chin
    Vo, Hoang Tam
    Wu, Sai
    Xu, Quanqing
    [J]. WEB INFORMATION SYSTEM ENGINEERING-WISE 2010, 2010, 6488 : 1 - +
  • [3] SPIRIT: Service for Providing Infrastructure Recommendations for IT
    Lall, Ashwin
    Sailer, Anca
    Brodie, Mark
    [J]. 2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, : 875 - +
  • [4] Providing an infrastructure for a cross database management tool
    Charlot, R
    [J]. INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, PROCEEDINGS, 2002, : 196 - 200
  • [5] Providing Data Anonymity for a Secure Database Infrastructure
    Popeea, Traian
    Constantinescu, Anca
    Rughinis, Razvan
    [J]. 2013 ROEDUNET INTERNATIONAL CONFERENCE (ROEDUNET): NETWORKING IN EDUCATION, 11TH EDITION, 2013,
  • [6] A scalable service architecture for providing strong service guarantees
    Christin, N
    Liebeherr, J
    [J]. SCALABILITY AND TRAFFIC CONTROL IN IP NETWORKS II, 2002, 4868 : 31 - 42
  • [7] Efficient Database Encryption Scheme for Database-as-a-Service Environment
    Joo, Hankyu
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05): : 195 - 203
  • [8] An Adaptive Enterprise Service Bus Infrastructure for Service Based Systems
    Gonzalez, Laura
    Laborde, Jorge Luis
    Galnares, Matias
    Fenoglio, Mauricio
    Ruggia, Raul
    [J]. SERVICE-ORIENTED COMPUTING - ICSOC 2013 WORKSHOPS, 2014, 8377 : 480 - 491
  • [9] Encryption as a Service for Smart Grid Advanced Metering Infrastructure
    Hasan, Md. Mahmud
    Mouftah, Hussein T.
    [J]. 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, : 216 - 221
  • [10] IT Infrastructure for Providing Energy-as-a-Service to Electric Vehicles
    Sarangi, Smruti R.
    Dutta, Partha
    Jalan, Komal
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2012, 3 (02) : 594 - 604