This article describes the major challenges and design considerations pertaining to database encryption. The article first presents an attack model and the main relevant challenges of data security, encryption overhea...
详细信息
This article describes the major challenges and design considerations pertaining to database encryption. The article first presents an attack model and the main relevant challenges of data security, encryption overhead, key management, and integration footprint. Next, the article reviews related academic work on alternative encryption configurations pertaining to encryption locus;indexing encrypted data;and key management. Finally, the article concludes with a benchmark using the following design criteria: encryption configuration, encryption granularity and keys storage.
Recently, the requirement of database encryption has increased. But many companies are not willing to adopt the use of encryption in their existing DBs due to the degradation in performance. In this paper, we proposed...
详细信息
ISBN:
(纸本)9780769547275
Recently, the requirement of database encryption has increased. But many companies are not willing to adopt the use of encryption in their existing DBs due to the degradation in performance. In this paper, we proposed and implemented a high speed database encryption model using Graphics Processing Units(GPU) that can perform parallel data processing. As a result, there was a performance improvement of about 40% to 60% compared to the CPU case. We expect our paper can be used to increase the encryption performance of database.
database encryption is essential for cloud database systems. For a large database, decryption could take a lot of computational time. Therefore, verifying an encryption that contains a correct plaintext without decryp...
详细信息
database encryption is essential for cloud database systems. For a large database, decryption could take a lot of computational time. Therefore, verifying an encryption that contains a correct plaintext without decryption becomes significant for a large database system. Plaintext-checkable encryption (PCE) is a potential tool for such database systems, which is first proposed by Canard et al. in CT-RSA 2012. Although the generic PCE in the random oracle model has been studied intensively, the generic PCE in the standard model and its efficient implementation are still challenging problems. This paper presents the first generic PCE in the standard model using smooth projective hash function (SPHF) and prove its s-priv1-cca security, which is independent of current unlink security. Based on the instantiated SPHF from DDH assumption, we obtain the most efficient PCE in the standard model, without any pairing operation. Finally, we improve two existing generic constructions in the random oracle model so that they are secure under chosen ciphertext attack. (C) 2017 Elsevier Inc. All rights reserved.
At present, there are many research achievements in the field of block cipher. Especially, the AES (Advanced encryption Standard) algorithm should be considered the excellent representative of all the researches. When...
详细信息
ISBN:
(纸本)9783642233449
At present, there are many research achievements in the field of block cipher. Especially, the AES (Advanced encryption Standard) algorithm should be considered the excellent representative of all the researches. When the data encryption standard was replaced by the advanced encryption standard, the whole world was putting light on the AES algorithm. Some research showed that the AES algorithm can be implemented fastly by shifting, xor and looking up tables. In this paper, we studied the implement of the fast AES algorithm in database system because database encryption technology was paid more attention. Through testing, we can see that the use of fast AES algorithm on the database system has little effect upon the efficiency of the database.
With the popularity of mobile terminals in our life, Including education, entertainment, industry and other fields. People have been thinking about it, initially, People want enterprise-database for the purpose of pro...
详细信息
ISBN:
(纸本)9781467382663
With the popularity of mobile terminals in our life, Including education, entertainment, industry and other fields. People have been thinking about it, initially, People want enterprise-database for the purpose of processing large amounts of data to be used directly embedded devices, however, because their resources are extremely limited. So this idea had to be abandoned, only use embedded database design. Considering the fact that most of the embedded database management system (EDBMS) are do not perfect in the information security of the data, We studied encryption principle of the embedded database management system (EDBMS) on the basis of the practical application, and implemented the system requirements such like real-time performance, high efficiency and high reliability. Finally we designed and realize the function of database encryption based on the embedded database
With the rapid development of computer network technology, more and more units and individuals share abundant data resources, and information security has become the primary problem to be solved by network information...
详细信息
ISBN:
(纸本)9781665426428
With the rapid development of computer network technology, more and more units and individuals share abundant data resources, and information security has become the primary problem to be solved by network information systems. The database management system comes with a basic security technology strategy, which can solve common database security requirements. However, for some special data security applications, the security technology strategy of the database itself cannot meet the requirements, which requires data encryption. Processing data encryption is the core content of information security research, and database encryption is an important means to improve database security. This paper studies the design of embedded network database system based on BS structure.
Computing-as-a-service is gaining ground. Clients may use the service without purchasing the system supporting the service. database-as-a-Service (DBaaS) is an important area of computing-as-a-service. DBaaS allows cl...
详细信息
Computing-as-a-service is gaining ground. Clients may use the service without purchasing the system supporting the service. database-as-a-Service (DBaaS) is an important area of computing-as-a-service. DBaaS allows clients to use an expensive database management system without purchasing it. In a DBaaS environment, database Tables are stored on servers belonging to a service provider, and hence, they must be encrypted in order to ensure data confidentiality. However, the encryption introduces performance degradation in the execution of queries over encrypted data. The execution of range queries, in particular, undergoes severe performance degradation. Several encryption schemes to alleviate this problem have been proposed. However, most of these schemes leak other information in addition to order information. In this study, a new database encryption scheme for DBaaS is proposed. The proposed scheme enables the execution of range queries without severe performance degradation and without leakage of information other than order information.
Key management is the crucial technique for database encryption. The keys to encryt and decrypt the secret data are generated and administered by the creators who create the secret data. Anyone who makes a request on ...
详细信息
Key management is the crucial technique for database encryption. The keys to encryt and decrypt the secret data are generated and administered by the creators who create the secret data. Anyone who makes a request on the secret data has to register himself in a certificate authority and get his public key certificate. The requestor sends his request on the secret data to the database administrator and the creator of the secret data. The database administrator verifies the identity of the requestor and forwards the request to the creator. After the creator compares the two requests, he sends the keys to the requestor. The schmen is more safe because the keys is administered by different creators, the secret data saved in database is encrypted with the creator's writing keys and the database administrator's ephemeral keys, the creators' reading and writing keys must be changed periodically and the administrator's ephemeral must be changed after every writing operation.
With the popularity of mobile terminals in our life, Including education, entertainment, industry and other fields. People have been thinking about it, initially, People want enterprise-database for the purpose of pro...
详细信息
ISBN:
(纸本)9781467382670
With the popularity of mobile terminals in our life, Including education, entertainment, industry and other fields. People have been thinking about it, initially, People want enterprise-database for the purpose of processing large amounts of data to be used directly embedded devices, however, because their resources are extremely limited. So this idea had to be abandoned, only use embedded database design. Considering the fact that most of the embedded database management system (EDBMS) are do not perfect in the information security of the data, We studied encryption principle of the embedded database management system (EDBMS) on the basis of the practical application, and implemented the system requirements such like real-time performance, high efficiency and high reliability. Finally we designed and realize the function of database encryption based on the embedded database
Aiming at the problems of long data encryption time and low encryption efficiency in the traditional urban cultural heritage protection database encryption system, an urban cultural heritage protection database encryp...
详细信息
ISBN:
(纸本)9783030945510;9783030945503
Aiming at the problems of long data encryption time and low encryption efficiency in the traditional urban cultural heritage protection database encryption system, an urban cultural heritage protection database encryption system based on blockchain technology is designed. In terms of hardware design, database encryption services were added, and database encryption system hardware was deployed. In terms of software design, based on hardware deployment, design the system application architecture;design system interfaces from the perspectives of encryption and decryption;generate and manage system encryption keys;use blockchain technology to reduce encryption principles. Language composition, adding symbols and terminology, data encryption structure, designing a mixed encryption and decryption flowchart, and realizing the encryption of the urban cultural heritage protection database. The experimental results show that under different tuple pairs, the average time of Setup data encryption is 38 s and 41 s less, and the average dynamic update time consumption is less than 5.77 s, 10.48 s. Under the condition of different number of keywords, Setup data encryption The average time is shorter by 34 s and 96 s, and the average dynamic update time is shorter by 45.19 s and 98.72 s. Has a high encryptiondatabase efficiency.
暂无评论