TAILIEUCHUNG - Database Encryption – An Overview of Contemporary Challenges and Design Considerations

Bush posited Memex as “a device in which an individual stores all his books, records, and communications, and which is mechanized so that it may be consulted with exceeding speed and flexibility. It is an enlarged intimate supplement to his memory.” Memex was to be built into a desk with a keyboard, microphone, and display surfaces. Its interface could copy photos or papers, or could be written on. However, “most of the Memex contents are purchased on microfilm ready for insertion.” In a typical use scenario, the user “moves about and observes, he photographs and comments. Time is automatically. | Database Encryption - An Overview of Contemporary Challenges and Design Considerations Erez Shmueli Deutsche Telekom Laboratories and the Department of Information Systems Engineering Ben-Gurion University. Beer Sheva Israel Ronen Vaisenberg School of Computer Science University of California. Irvine CA USA1 Yuval Elovici Deutsche Telekom Laboratories and the Department of Information Systems Engineering Ben-Gurion University. Beer Sheva Israel Chanan Glezer Deutsche Telekom Laboratories at Ben-Gurion University. Beer Sheva Israel erezshmu@ ronen@ elovici@ chanan@ ABSTRACT This article describes the major challenges and design considerations pertaining to database encryption. The article first presents an attack model and the main relevant challenges of data security encryption overhead key management and integration footprint. Next the article reviews related academic work on alternative encryption configurations pertaining to encryption locus indexing encrypted data and key management. Finally the article concludes with a benchmark using the following design criteria encryption configuration encryption granularity and keys storage. Categories and Subject Descriptors H. Database Management Database Administration - Security integrity and protection. General Terms Security Keywords Database Encryption Security Privacy. I. INTRODUCTION Conventional database security solutions and mechanisms are divided into three layers physical security operating system security and DBMS Database Management System security 1 . With regard to the security of stored data access control . 1 Research performed while at the Department of Information Systems Engineering Ben-Gurion University . authentication and authorization has proved to be useful as long as that data is accessed using the intended system interfaces. However access control is useless if the attacker simply gains access to the raw database data bypassing the traditional .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.