The Experts below are selected from a list of 6159129 Experts worldwide ranked by ideXlab platform
Vasily Sidorov - One of the best experts on this subject based on the ideXlab platform.
-
transparent Data encryption for Data in Use and Data at rest in a cloud based Database as a service solution
World Congress on Services, 2015Co-Authors: Vasily SidorovAbstract:With high and growing supply of Database-as-a-Service solutions from cloud platform vendors, many enterprises still show moderate to low demand for them. Even though migration to a DaaS solution might result in a significantly reduced bill for IT maintenance, Data security and privacy issues are among the reasons of low popularity of these services. Such a migration is also often only justified if it could be done seamlessly, with as few changes to the system as possible. Transparent Data Encryption could help, but solutions for TDE shipped with major Database systems are limited to securing only Data-at-rest, and appear to be Useless if the machine could be physically accessed by the adversary, which is a probable risk when hosting in the cloud. This paper proposes a different approach to TDE, which takes into account cloud-specific risks, extends encryption to cover Data-in-Use and partly Data-in-motion, and is capable of executing large subsets of SQL including heavy relational operations, complex operations over attributes, and transactions.
Ng, Wee Keong - One of the best experts on this subject based on the ideXlab platform.
-
Transparent Data Encryption for Data-in-Use and Data-at-Rest in a Cloud-Based Database-as-a-Service Solution
'Institute of Electrical and Electronics Engineers (IEEE)', 2015Co-Authors: Sidorov Vasily, Ng, Wee KeongAbstract:With high and growing supply of Database-as-a-Service solutions from cloud platform vendors, many enterprises still show moderate to low demand for them. Even though migration to a DaaS solution might result in a significantly reduced bill for IT maintenance, Data security and privacy issues are among the reasons of low popularity of these services. Such a migration is also often only justified if it could be done seamlessly, with as few changes to the system as possible. Transparent Data Encryption could help, but solutions for TDE shipped with major Database systems are limited to securing only Data-at-rest, and appear to be Useless if the machine could be physically accessed by the adversary, which is a probable risk when hosting in the cloud. This paper proposes a different approach to TDE, which takes into account cloud-specific risks, extends encryption to cover Data-in-Use and partly Data-in-motion, and is capable of executing large subsets of SQL including heavy relational operations, complex operations over attributes, and transactions.Accepted versio
Vallipuram Muthukkumarasamy - One of the best experts on this subject based on the ideXlab platform.
-
a survey on Data leakage prevention systems
Journal of Network and Computer Applications, 2016Co-Authors: Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram MuthukkumarasamyAbstract:Protection of confidential Data from being leaked to the public is a growing concern among organisations and individuals. Traditionally, confidentiality of Data has been preserved using security procedures such as information security policies along with conventional security mechanisms such as firewalls, virtual private networks and intrusion detection systems. Unfortunately, these mechanisms lack pro-activeness and dedication towards protecting confidential Data, and in most cases, they require predefined rules by which protection actions are taken. This can result in serious consequences, as confidential Data can appear in different forms in different leaking channels. Therefore, there has been an urge to mitigate these drawbacks using more efficient mechanisms. Recently, Data leakage prevention systems (DLPSs) have been introduced as dedicated mechanisms to detect and prevent the leakage of confidential Data in Use, in transit and at rest. DLPSs Use different techniques to analyse the content and the context of confidential Data to detect or prevent the leakage. Although DLPSs are increasingly being designed and developed as standalone products by IT security vendors and researchers, the term still ambiguous. in this study, we have carried out a comprehensive survey on the current DLPS mechanisms. We explicitly define DLPS and categorise active research directions in this field. in addition, we suggest future directions towards developing more consistent DLPSs that can overcome some of the weaknesses of the current ones. This survey is an updated reference on DLPSs, that can benefit both academics and professionals.
Sidorov Vasily - One of the best experts on this subject based on the ideXlab platform.
-
Transparent Data Encryption for Data-in-Use and Data-at-Rest in a Cloud-Based Database-as-a-Service Solution
'Institute of Electrical and Electronics Engineers (IEEE)', 2015Co-Authors: Sidorov Vasily, Ng, Wee KeongAbstract:With high and growing supply of Database-as-a-Service solutions from cloud platform vendors, many enterprises still show moderate to low demand for them. Even though migration to a DaaS solution might result in a significantly reduced bill for IT maintenance, Data security and privacy issues are among the reasons of low popularity of these services. Such a migration is also often only justified if it could be done seamlessly, with as few changes to the system as possible. Transparent Data Encryption could help, but solutions for TDE shipped with major Database systems are limited to securing only Data-at-rest, and appear to be Useless if the machine could be physically accessed by the adversary, which is a probable risk when hosting in the cloud. This paper proposes a different approach to TDE, which takes into account cloud-specific risks, extends encryption to cover Data-in-Use and partly Data-in-motion, and is capable of executing large subsets of SQL including heavy relational operations, complex operations over attributes, and transactions.Accepted versio
Sultan Alneyadi - One of the best experts on this subject based on the ideXlab platform.
-
a survey on Data leakage prevention systems
Journal of Network and Computer Applications, 2016Co-Authors: Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram MuthukkumarasamyAbstract:Protection of confidential Data from being leaked to the public is a growing concern among organisations and individuals. Traditionally, confidentiality of Data has been preserved using security procedures such as information security policies along with conventional security mechanisms such as firewalls, virtual private networks and intrusion detection systems. Unfortunately, these mechanisms lack pro-activeness and dedication towards protecting confidential Data, and in most cases, they require predefined rules by which protection actions are taken. This can result in serious consequences, as confidential Data can appear in different forms in different leaking channels. Therefore, there has been an urge to mitigate these drawbacks using more efficient mechanisms. Recently, Data leakage prevention systems (DLPSs) have been introduced as dedicated mechanisms to detect and prevent the leakage of confidential Data in Use, in transit and at rest. DLPSs Use different techniques to analyse the content and the context of confidential Data to detect or prevent the leakage. Although DLPSs are increasingly being designed and developed as standalone products by IT security vendors and researchers, the term still ambiguous. in this study, we have carried out a comprehensive survey on the current DLPS mechanisms. We explicitly define DLPS and categorise active research directions in this field. in addition, we suggest future directions towards developing more consistent DLPSs that can overcome some of the weaknesses of the current ones. This survey is an updated reference on DLPSs, that can benefit both academics and professionals.