Database Encryption In Database Security

2064 Words5 Pages

1. Introduction:
Globalization and advancements in the internet and information technology laid paths to new ways of communication. Countries separated through oceans united through Internet and Web. Gone are the days where data and information was stored on papers. Now, everything is stored electronically which is more reliable and secure.
As the data is growing in multiple folds, Security issues are also growing at the same speed raising the concerns about its security. Though, Regulatory bodies have come up with strict guidelines and policies with constant amendments being made to keep the data and information secure and preventing it from falling into wrong hand, still data breaches continue to happen putting the people and businesses at great risks.
Hence, it is the hour of the need that data must be secured at the root level and Data Encryption fits appropriately in accomplishing this task and protects data at rest.
This paper focuses on Database encryption for database security, different methods and levels of database encryption and its advantages over other methods of data protection.
It also discusses on the performance issues associated with data encryption and best practices to minimize the performance over head on the database server due to encryption.

2. Database security - Encryption:
Database security is securing the data on a centralized database against the compromises of their confidentiality, integrity and availability. It is achieved through various information security controls or processes which include Access control, Authentication, Auditing, Integrity controls, backups and Encryption.
Databases have been protected at a higher level through network security measures such as firewalls and n...

... middle of paper ...

.... doi:10.1109/TPDS.2013.154

3. Sharma, M., Chaudhary, A., & Kumar, S. (2013) Query Processing Performance and Searching over Encrypted Data by using an Efficient Algorithm. International Journal of Computer Applications 62(10), 4, 5-8. doi: arXiv:1308.4687v1 [cs.DB]

4. Oracle Corporation. (2012). Transparent Data Encryption Best Practices. Retrieved from http://www.oracle.com/technetwork/database/security/twp-transparent-data-encryption-bes-130696.pdf

5. Hsueh, S. Microsoft Corporation. (2008). Database Encryption in SQL Server 2008 Enterprise Edition. Retrieved from http://technet.microsoft.com/enus/library/cc278098(v=sql.100).aspx

6. Keshavamurthy, B., Khan, A., & Toshniwal, D. (2013). Privacy preserving association rule mining over distributed databases using genetic algorithm. Neural Computing & Applications, 22351-364. doi:10.1007/s00521-013-1343-9.

Open Document