Database Encryption

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 921 Experts worldwide ranked by ideXlab platform

Wen Yonggang - One of the best experts on this subject based on the ideXlab platform.

  • ICCCRI - StealthyCRM: A Secure Cloud CRM System Application that Supports Fully Homomorphic Database Encryption
    2015 International Conference on Cloud Computing Research and Innovation (ICCCRI), 2015
    Co-Authors: Miguel Rodel Felipe, Xia Ye, Khin Mi Mi Aung, Wen Yonggang
    Abstract:

    Customer Relationship Management (CRM) system improves companies' profitability by helping companies focus on the relationships with customers, colleagues or suppliers. By having strong initiative to move applications to cloud, enterprises are hindered by cloud security and reliability issues [1], especially when it comes to financial industries. To provide a practical and secure solution to these enterprises, this project aims to build a cloud CRM system that enables fully homomorphic Encryption. In order to explore the potential of this, the project integrates three key components: Open source CRM system Sugar CRM, partial homomorphic Database system Crypt DB and fully homomorphic Encryption library HElib. By leveraging the structure based on our previous work [2], Stealthy CRM successfully integrates fully homomorphic Encryption support on top of Crypt DB Database Encryption environment. Besides that, Stealthy CRM enables a transparent and seamless integration to any CRM system by using a modified My SQL proxy to listen to, encrypt the queries and interact with Crypt DB and HElib subsystems. An evaluation of TPC-C and TPC-H queries is conducted on Stealthy CRM system. The result shows Stealthy CRM has 14%-28% throughput overhead for most of the CRM queries, compared with unmodified My SQL server. For complex TPC-H queries involving multiplication and composition of computation, Stealthy CRM is able to execute the query between 1.75 min to 11.7 min. Although the time takes to complete a fully homomorphic query in CRM system is still long, Stealthy CRM provided a prototype for researchers and other business application developers to explore the potential.

  • StealthyCRM: A Secure Cloud CRM System Application that Supports Fully Homomorphic Database Encryption
    2015 International Conference on Cloud Computing Research and Innovation (ICCCRI), 2015
    Co-Authors: Miguel Rodel Felipe, Xia Ye, Khin Mi Mi Aung, Wen Yonggang
    Abstract:

    Customer Relationship Management (CRM) system improves companies' profitability by helping companies focus on the relationships with customers, colleagues or suppliers. By having strong initiative to move applications to cloud, enterprises are hindered by cloud security and reliability issues [1], especially when it comes to financial industries. To provide a practical and secure solution to these enterprises, this project aims to build a cloud CRM system that enables fully homomorphic Encryption. In order to explore the potential of this, the project integrates three key components: Open source CRM system Sugar CRM, partial homomorphic Database system Crypt DB and fully homomorphic Encryption library HElib. By leveraging the structure based on our previous work [2], Stealthy CRM successfully integrates fully homomorphic Encryption support on top of Crypt DB Database Encryption environment. Besides that, Stealthy CRM enables a transparent and seamless integration to any CRM system by using a modified My SQL proxy to listen to, encrypt the queries and interact with Crypt DB and HElib subsystems. An evaluation of TPC-C and TPC-H queries is conducted on Stealthy CRM system. The result shows Stealthy CRM has 14%-28% throughput overhead for most of the CRM queries, compared with unmodified My SQL server. For complex TPC-H queries involving multiplication and composition of computation, Stealthy CRM is able to execute the query between 1.75 min to 11.7 min. Although the time takes to complete a fully homomorphic query in CRM system is still long, Stealthy CRM provided a prototype for researchers and other business application developers to explore the potential.

Mohsen Guizani - One of the best experts on this subject based on the ideXlab platform.

  • GLOBECOM - Cloud Database Encryption Technology Based on Combinatorial Encryption
    2019 IEEE Global Communications Conference (GLOBECOM), 2019
    Co-Authors: Meng Chen, Xiao Fu, Xiaojiang Du, Mohsen Guizani
    Abstract:

    Traditional cloud Database directly stores user plaintext information, information security is directly related to the security of Cloud server, which will create a great security risk. The user's information security is not guaranteed. In this paper, a Database Encryption technology is designed, which can balance the problem of information security and use efficiency well. In this paper, a simplified onion Encryption model is designed and implemented, which can realize the full homomorphic Encryption on the cloud Database to a certain extent, and improve the efficiency of ciphertext operation to a certain extent. Keywords-cloud; Database; full homomorphic Encryption

  • Cloud Database Encryption Technology Based on Combinatorial Encryption
    2019 IEEE Global Communications Conference (GLOBECOM), 2019
    Co-Authors: Meng Chen, Xiao Fu, Xiaojiang Du, Mohsen Guizani
    Abstract:

    Traditional cloud Database directly stores user plaintext information, information security is directly related to the security of Cloud server, which will create a great security risk. The user's information security is not guaranteed. In this paper, a Database Encryption technology is designed, which can balance the problem of information security and use efficiency well. In this paper, a simplified onion Encryption model is designed and implemented, which can realize the full homomorphic Encryption on the cloud Database to a certain extent, and improve the efficiency of ciphertext operation to a certain extent. Keywords-cloud; Database; full homomorphic Encryption

Jinxiang Dong - One of the best experts on this subject based on the ideXlab platform.

  • A Database Encryption SchemeforEnhancedSecurity andEasySharing
    2020
    Co-Authors: Jinxiang Dong
    Abstract:

    Database Encryption isa crucial technique inthe security mechanisms of Database. It iswidely recognized as one ofthekeyissues ofdatasecurity. Current techniques ofsharing thekeysandthe encrypted dataforDatabases are neither convenient nor flexible intherealapplications. Inspired bythe PGP technique, we propose a novelDatabase Encryption scheme forenhanced datasharing inside a Database, whilepreserving dataprivacy. It is characterized by boththefastspeedof the conventional Encryption andtheconvenience of key distribution ofpublic keyEncryption. Italso provides secured storage forsecurity related dataandeffective keymanagement, whichenables theencrypted datato be sharedconveniently. The schemehasbeen implemented andsuccessfully applied on Oscar, a commercial DBMSdeveloped byus.

  • A Database Encryption Scheme for Enhanced Security and Easy Sharing
    2006 10th International Conference on Computer Supported Cooperative Work in Design, 2006
    Co-Authors: Gang Chen, Ke Chen, Jinxiang Dong
    Abstract:

    Database Encryption is a crucial technique in the security mechanisms of Database. It is widely recognized as one of the key issues of data security. Current techniques of sharing the keys and the encrypted data for Databases are neither convenient nor flexible in the real applications. Inspired by the PGP technique, we propose a novel Database Encryption scheme for enhanced data sharing inside a Database, while preserving data privacy. It is characterized by both the fast speed of the conventional Encryption and the convenience of key distribution of public key Encryption. It also provides secured storage for security related data and effective key management, which enables the encrypted data to be shared conveniently. The scheme has been implemented and successfully applied on Oscar, a commercial DBMS developed by us

  • CSCWD - A Database Encryption Scheme for Enhanced Security and Easy Sharing
    2006 10th International Conference on Computer Supported Cooperative Work in Design, 2006
    Co-Authors: Gang Chen, Ke Chen, Jinxiang Dong
    Abstract:

    Database Encryption is a crucial technique in the security mechanisms of Database. It is widely recognized as one of the key issues of data security. Current techniques of sharing the keys and the encrypted data for Databases are neither convenient nor flexible in the real applications. Inspired by the PGP technique, we propose a novel Database Encryption scheme for enhanced data sharing inside a Database, while preserving data privacy. It is characterized by both the fast speed of the conventional Encryption and the convenience of key distribution of public key Encryption. It also provides secured storage for security related data and effective key management, which enables the encrypted data to be shared conveniently. The scheme has been implemented and successfully applied on Oscar, a commercial DBMS developed by us.

Yuval Elovici - One of the best experts on this subject based on the ideXlab platform.

  • implementing a Database Encryption solution design and implementation issues
    Computers & Security, 2014
    Co-Authors: Erez Shmueli, Ehud Gudes, Ronen Vaisenberg, Yuval Elovici
    Abstract:

    Abstract In this paper, we analyze and compare five traditional architectures for Database Encryption. We show that existing architectures may provide a high level of security, but have a significant impact on performance and impose major changes to the application layer, or may be transparent to the application layer and provide high performance, but have several fundamental security weaknesses. We suggest a sixth novel architecture that was not considered before. The new architecture is based on placing the Encryption module inside the Database management software (DBMS), just above the Database cache, and using a dedicated technique to encrypt each Database value together with its coordinates. These two properties allow our new architecture to achieve a high level of data security while offering enhanced performance and total transparency to the application layer. We also explain how each architecture can be implemented in a commercial, open source DBMS. We evaluate the performance of the various architectures both analytically and through extensive experimentation. Our performance evaluation results demonstrate that in most realistic scenarios, i.e., where only a part of the Database content is stored in the Database cache, the suggested architecture outperforms the others.

  • Database Encryption an overview of contemporary challenges and design considerations
    International Conference on Management of Data, 2010
    Co-Authors: Erez Shmueli, Yuval Elovici, Ronen Vaisenberg, Chanan Glezer
    Abstract:

    This article describes the major challenges and design considerations pertaining to Database Encryption. The article first presents an attack model and the main relevant challenges of data security, Encryption overhead, key management, and integration footprint. Next, the article reviews related academic work on alternative Encryption configurations pertaining to Encryption locus; indexing encrypted data; and key management. Finally, the article concludes with a benchmark using the following design criteria: Encryption configuration, Encryption granularity and keys storage.

  • a structure preserving Database Encryption scheme
    Very Large Data Bases, 2004
    Co-Authors: Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes
    Abstract:

    A new simple and efficient Database Encryption scheme is presented. The new scheme enables encrypting the entire content of the Database without changing its structure. In addition, the scheme suggests how to convert the conventional Database index to a secure index on the encrypted Database so that the time complexity of all queries is maintained. No one with access to the encrypted Database can learn anything about its content without having the Encryption key.

  • Secure Data Management - A Structure Preserving Database Encryption Scheme
    Lecture Notes in Computer Science, 2004
    Co-Authors: Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes
    Abstract:

    A new simple and efficient Database Encryption scheme is presented. The new scheme enables encrypting the entire content of the Database without changing its structure. In addition, the scheme suggests how to convert the conventional Database index to a secure index on the encrypted Database so that the time complexity of all queries is maintained. No one with access to the encrypted Database can learn anything about its content without having the Encryption key.

Ehud Gudes - One of the best experts on this subject based on the ideXlab platform.

  • implementing a Database Encryption solution design and implementation issues
    Computers & Security, 2014
    Co-Authors: Erez Shmueli, Ehud Gudes, Ronen Vaisenberg, Yuval Elovici
    Abstract:

    Abstract In this paper, we analyze and compare five traditional architectures for Database Encryption. We show that existing architectures may provide a high level of security, but have a significant impact on performance and impose major changes to the application layer, or may be transparent to the application layer and provide high performance, but have several fundamental security weaknesses. We suggest a sixth novel architecture that was not considered before. The new architecture is based on placing the Encryption module inside the Database management software (DBMS), just above the Database cache, and using a dedicated technique to encrypt each Database value together with its coordinates. These two properties allow our new architecture to achieve a high level of data security while offering enhanced performance and total transparency to the application layer. We also explain how each architecture can be implemented in a commercial, open source DBMS. We evaluate the performance of the various architectures both analytically and through extensive experimentation. Our performance evaluation results demonstrate that in most realistic scenarios, i.e., where only a part of the Database content is stored in the Database cache, the suggested architecture outperforms the others.

  • a structure preserving Database Encryption scheme
    Very Large Data Bases, 2004
    Co-Authors: Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes
    Abstract:

    A new simple and efficient Database Encryption scheme is presented. The new scheme enables encrypting the entire content of the Database without changing its structure. In addition, the scheme suggests how to convert the conventional Database index to a secure index on the encrypted Database so that the time complexity of all queries is maintained. No one with access to the encrypted Database can learn anything about its content without having the Encryption key.

  • Secure Data Management - A Structure Preserving Database Encryption Scheme
    Lecture Notes in Computer Science, 2004
    Co-Authors: Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes
    Abstract:

    A new simple and efficient Database Encryption scheme is presented. The new scheme enables encrypting the entire content of the Database without changing its structure. In addition, the scheme suggests how to convert the conventional Database index to a secure index on the encrypted Database so that the time complexity of all queries is maintained. No one with access to the encrypted Database can learn anything about its content without having the Encryption key.