Data in Use

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 6159129 Experts worldwide ranked by ideXlab platform

Vasily Sidorov - One of the best experts on this subject based on the ideXlab platform.

  • transparent Data encryption for Data in Use and Data at rest in a cloud based Database as a service solution
    World Congress on Services, 2015
    Co-Authors: Vasily Sidorov
    Abstract:

    With high and growing supply of Database-as-a-Service solutions from cloud platform vendors, many enterprises still show moderate to low demand for them. Even though migration to a DaaS solution might result in a significantly reduced bill for IT maintenance, Data security and privacy issues are among the reasons of low popularity of these services. Such a migration is also often only justified if it could be done seamlessly, with as few changes to the system as possible. Transparent Data Encryption could help, but solutions for TDE shipped with major Database systems are limited to securing only Data-at-rest, and appear to be Useless if the machine could be physically accessed by the adversary, which is a probable risk when hosting in the cloud. This paper proposes a different approach to TDE, which takes into account cloud-specific risks, extends encryption to cover Data-in-Use and partly Data-in-motion, and is capable of executing large subsets of SQL including heavy relational operations, complex operations over attributes, and transactions.

Ng, Wee Keong - One of the best experts on this subject based on the ideXlab platform.

  • Transparent Data Encryption for Data-in-Use and Data-at-Rest in a Cloud-Based Database-as-a-Service Solution
    'Institute of Electrical and Electronics Engineers (IEEE)', 2015
    Co-Authors: Sidorov Vasily, Ng, Wee Keong
    Abstract:

    With high and growing supply of Database-as-a-Service solutions from cloud platform vendors, many enterprises still show moderate to low demand for them. Even though migration to a DaaS solution might result in a significantly reduced bill for IT maintenance, Data security and privacy issues are among the reasons of low popularity of these services. Such a migration is also often only justified if it could be done seamlessly, with as few changes to the system as possible. Transparent Data Encryption could help, but solutions for TDE shipped with major Database systems are limited to securing only Data-at-rest, and appear to be Useless if the machine could be physically accessed by the adversary, which is a probable risk when hosting in the cloud. This paper proposes a different approach to TDE, which takes into account cloud-specific risks, extends encryption to cover Data-in-Use and partly Data-in-motion, and is capable of executing large subsets of SQL including heavy relational operations, complex operations over attributes, and transactions.Accepted versio

Vallipuram Muthukkumarasamy - One of the best experts on this subject based on the ideXlab platform.

  • a survey on Data leakage prevention systems
    Journal of Network and Computer Applications, 2016
    Co-Authors: Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy
    Abstract:

    Protection of confidential Data from being leaked to the public is a growing concern among organisations and individuals. Traditionally, confidentiality of Data has been preserved using security procedures such as information security policies along with conventional security mechanisms such as firewalls, virtual private networks and intrusion detection systems. Unfortunately, these mechanisms lack pro-activeness and dedication towards protecting confidential Data, and in most cases, they require predefined rules by which protection actions are taken. This can result in serious consequences, as confidential Data can appear in different forms in different leaking channels. Therefore, there has been an urge to mitigate these drawbacks using more efficient mechanisms. Recently, Data leakage prevention systems (DLPSs) have been introduced as dedicated mechanisms to detect and prevent the leakage of confidential Data in Use, in transit and at rest. DLPSs Use different techniques to analyse the content and the context of confidential Data to detect or prevent the leakage. Although DLPSs are increasingly being designed and developed as standalone products by IT security vendors and researchers, the term still ambiguous. in this study, we have carried out a comprehensive survey on the current DLPS mechanisms. We explicitly define DLPS and categorise active research directions in this field. in addition, we suggest future directions towards developing more consistent DLPSs that can overcome some of the weaknesses of the current ones. This survey is an updated reference on DLPSs, that can benefit both academics and professionals.

Sidorov Vasily - One of the best experts on this subject based on the ideXlab platform.

  • Transparent Data Encryption for Data-in-Use and Data-at-Rest in a Cloud-Based Database-as-a-Service Solution
    'Institute of Electrical and Electronics Engineers (IEEE)', 2015
    Co-Authors: Sidorov Vasily, Ng, Wee Keong
    Abstract:

    With high and growing supply of Database-as-a-Service solutions from cloud platform vendors, many enterprises still show moderate to low demand for them. Even though migration to a DaaS solution might result in a significantly reduced bill for IT maintenance, Data security and privacy issues are among the reasons of low popularity of these services. Such a migration is also often only justified if it could be done seamlessly, with as few changes to the system as possible. Transparent Data Encryption could help, but solutions for TDE shipped with major Database systems are limited to securing only Data-at-rest, and appear to be Useless if the machine could be physically accessed by the adversary, which is a probable risk when hosting in the cloud. This paper proposes a different approach to TDE, which takes into account cloud-specific risks, extends encryption to cover Data-in-Use and partly Data-in-motion, and is capable of executing large subsets of SQL including heavy relational operations, complex operations over attributes, and transactions.Accepted versio

Sultan Alneyadi - One of the best experts on this subject based on the ideXlab platform.

  • a survey on Data leakage prevention systems
    Journal of Network and Computer Applications, 2016
    Co-Authors: Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy
    Abstract:

    Protection of confidential Data from being leaked to the public is a growing concern among organisations and individuals. Traditionally, confidentiality of Data has been preserved using security procedures such as information security policies along with conventional security mechanisms such as firewalls, virtual private networks and intrusion detection systems. Unfortunately, these mechanisms lack pro-activeness and dedication towards protecting confidential Data, and in most cases, they require predefined rules by which protection actions are taken. This can result in serious consequences, as confidential Data can appear in different forms in different leaking channels. Therefore, there has been an urge to mitigate these drawbacks using more efficient mechanisms. Recently, Data leakage prevention systems (DLPSs) have been introduced as dedicated mechanisms to detect and prevent the leakage of confidential Data in Use, in transit and at rest. DLPSs Use different techniques to analyse the content and the context of confidential Data to detect or prevent the leakage. Although DLPSs are increasingly being designed and developed as standalone products by IT security vendors and researchers, the term still ambiguous. in this study, we have carried out a comprehensive survey on the current DLPS mechanisms. We explicitly define DLPS and categorise active research directions in this field. in addition, we suggest future directions towards developing more consistent DLPSs that can overcome some of the weaknesses of the current ones. This survey is an updated reference on DLPSs, that can benefit both academics and professionals.