Providing database encryption as a scalable enterprise infrastructure service

被引:0
|
作者
Mattsson, UT
机构
关键词
isolation; intrusion tolerance; database security; encryption; privacy; VISA CISP; GLBA; HIPAA;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As databases become networked in more complex multi-tiered applications, their vulnerability to external attack grows. We address scalability as a particularly vital problem and propose alternative solutions for data encryption as an enterprise IT infrastructure component. In this paper we explore a new approach for data privacy and security in which a security administrator protecting privacy at the level of individual fields and records, and providing seamless mechanisms to create, store, and securely access databases. Such a model alleviates the need for organizations to purchase expensive hardware, deal with software modifications, and hire professionals for encryption key management development tasks. Although access control has been deployed as a security mechanism almost since the birth of large database systems, many still look at database security as a problem to be addressed as the need arises - this is often after threats to the secrecy and integrity of data have occurred. Instead of building walls around servers or hard drives, a protective layer of encryption is provided around specific sensitive data items or objects. This prevents outside attacks as well as infiltration from within the server itself This also allows the security administrator to define which data stored in databases are sensitive and thereby focusing the protection only on the sensitive data, which in turn minimizes the delays or burdens on the system that may occur from other bulk encryption methods.
引用
收藏
页码:371 / 380
页数:10
相关论文
共 50 条
  • [31] ICT infrastructure for innovation: A case study of the enterprise service bus approach
    Bygstad, Bendik
    Aanby, Hans-Petter
    [J]. INFORMATION SYSTEMS FRONTIERS, 2010, 12 (03) : 257 - 265
  • [32] Blind custodians: A database service architecture that supports privacy without encryption
    Motro, A
    Parisi-Presicce, N
    [J]. DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 338 - 352
  • [33] Stochastic Partitioning Strategies for Providing Scalable of Quality of Service Routing in Large Networks
    Montaser, A. H.
    Woodward, M. E.
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2198 - 2203
  • [34] Providing enterprise solutions
    不详
    [J]. AIRCRAFT ENGINEERING AND AEROSPACE TECHNOLOGY, 1999, 71 (02): : 191 - 192
  • [35] A gateway approach for providing non-stop IP broadcasting service infrastructure
    Hasegawa, T
    Hasegawa, T
    [J]. 7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, : 91 - 95
  • [36] STeP: Scalable Tenant Placement for Managing Database-as-a-Service Deployments
    Taft, Rebecca
    Lang, Willis
    Duggan, Jennie
    Elmore, Aaron J.
    Stonebraker, Michael
    DeWitt, David
    [J]. PROCEEDINGS OF THE SEVENTH ACM SYMPOSIUM ON CLOUD COMPUTING (SOCC 2016), 2016, : 388 - 400
  • [37] PYRAMID-S: A scalable infrastructure for semantic web service publication and discovery
    Pilioura, T
    Kapos, GD
    Tsalgatidou, A
    [J]. 14TH INTERNATIONAL WORKSHOP ON RESEARCH ISSUES ON DATA ENGINEERING: WEB SERVICES FOR E-COMMERCE AND E-GOVERNMENT APPLICATIONS, PROCEEDINGS, 2004, : 15 - 22
  • [38] Scalable Security Analysis using a Partition and Merge Approach in an Infrastructure as a Service Cloud
    Hong, Jin B.
    Eom, Taehoon
    Park, Jong Sou
    Kim, Dong Seong
    [J]. 2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 50 - 57
  • [39] Protecting a Federated Database Infrastructure against Denial-of-Service Attacks
    Ansper, Arne
    Buldas, Ahto
    Freudenthal, Margus
    Willemson, Jan
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2013, 2013, 8328 : 26 - 37
  • [40] A flexible and scalable component-based system architecture for video surveillance as a service, running on infrastructure as a service
    Thanathip Limna
    Pichaya Tandayya
    [J]. Multimedia Tools and Applications, 2016, 75 : 1765 - 1791