Multilevel secure database encryption with subkeys
Data & Knowledge Engineering
A database encryption system with subkeys
ACM Transactions on Database Systems (TODS)
On the encipherment of search trees and random access files
ACM Transactions on Database Systems (TODS) - Special issue: papers from the international conference on very large data bases: September 22–24, 1975, Framingham, MA
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
Executing SQL over encrypted data in the database-service-provider model
Proceedings of the 2002 ACM SIGMOD international conference on Management of data
Database Security and Integrity
Database Security and Integrity
Cryptography and Relational Database Management Systems
IDEAS '01 Proceedings of the International Database Engineering & Applications Symposium
Practical Techniques for Searches on Encrypted Data
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Balancing confidentiality and efficiency in untrusted relational DBMSs
Proceedings of the 10th ACM conference on Computer and communications security
A Database Record Encryption Scheme Using the RSA Public Key Cryptosystem and Its Master Keys
ICCNMC '03 Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing
Order preserving encryption for numeric data
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
GBDE: GEOM based disk encryption
BSDC'03 Proceedings of the BSD Conference 2003 on BSD Conference
Chip-secured data access: confidential data on untrusted servers
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
GnatDb: a small-footprint, secure database system
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Designing secure indexes for encrypted databases
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Analysis of a database and index encryption scheme – problems and fixes
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Hi-index | 0.01 |
This article describes the major challenges and design considerations pertaining to database encryption. The article first presents an attack model and the main relevant challenges of data security, encryption overhead, key management, and integration footprint. Next, the article reviews related academic work on alternative encryption configurations pertaining to encryption locus; indexing encrypted data; and key management. Finally, the article concludes with a benchmark using the following design criteria: encryption configuration, encryption granularity and keys storage.